• Earn real money by being active: Hello Guest, earn real money by simply being active on the forum — post quality content, get reactions, and help the community. Once you reach the minimum credit amount, you’ll be able to withdraw your balance directly. Learn how it works.

Reverse Engineering Hex-Rays IDA Pro 7.7.220118 SP 1 x64

Status
Not open for further replies.

itsMe

*KillmeMories*
Staff member
Administrator
Super Moderator
Hacker
Specter
Crawler
Shadow
Joined
Jan 8, 2019
Messages
56,607
Solutions
2
Reputation
32
Reaction score
100,454
Points
2,313
Credits
32,590
‎6 Years of Service‎
 
76%
img-758636.png


IDA Pro
The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.

A powerful disassembler and a versatile debugger

IDA Pro as a disassembler is capable of creating maps of their execution to show the binary instructions that are actually executed by the processor in a symbolic representation (assembly language). Advanced techniques have been implemented into IDA Pro so that it can generate assembly language source code from machine-executable code and make this complex code more human-readable.

The debugging feature augmented IDA with the dynamic analysis. It supports multiple debugging targets and can handle remote applications. Its cross-platform debugging capability enables instant debugging, easy connection to both local and remote processes and support for 64-bit systems and new connection possibilities.

IDA 7.7.220218 (maintenance release)
Improvements:


    + decompiler: improve handling of volatile reads (some were incorrectly propagated)
    + golang: apply reflection function prototypes to methods when available
    + golang: create function types from reflection metadata
    + PDB: support SP-relative local variables
    + UI: speed up Home/End/Digits navigation in sorted choosers


Bugfixes

    BUGFIX: debugger: IDA could lock up if the remote debug server stopped responding
    BUGFIX: decompiler: fix interrs when decompiling functions with >64 arguments
    BUGFIX: decompiler: fixed infinite loop while analyzing some golang binaries
    BUGFIX: decompiler: fixed multiple interrs
    BUGFIX: disassembly: parentheses could be missing in complex offset expressions like "target-(base+N)"
    BUGFIX: golang: fixed an interr caused by slice types with circular dependencies
    BUGFIX: golang: remove unnecessary BUILTIN_SLICE type
    BUGFIX: idaclang would fail to store mangled symbols in the TIL, which means the prototypes would not be detected when loading the TIL with the "Load type library" action)
    BUGFIX: idapython: IDA could crash if None was passed to some API calls
    BUGFIX: kernel: fixed interr 1007 that could occur when processing types with bitfields
    BUGFIX: kernel: get_item_size(BADADDR) could return huge values in some situations (should be 1)
    BUGFIX: UI: on Windows, IDA could produce a fatal error "CreateDIBSection failed" when trying to display a very wide hint
    BUGFIX: UI: Options>Compiler>Arguments setting was not saved in the database


Code:
https://hex-rays.com/ida-pro
To see this hidden content, you must like this content.
 
Status
Not open for further replies.
Back
Top