Summary
Coming into the new year I did a personal review of plugins and frameworks that I currently use. There are also some that I am in the process of experimenting with as I may be able to apply them to work I’m doing. This year will be one of plugin development for me and I’ll be creating some new ones and updating/contributing to existing ones.
The following are a list that I have found useful and that I have confirmed work on IDA Pro 8.4.
Plugins
Name | Flare CAPA Explorer |
Link | https://github.com/mandiant/capa |
Description | Detects capabilities in executable files. |
Install notes | Reference the well-documented install instructions at: https://github.com/mandiant/capa/blob/master/doc/installation.md |
Name | Diaphora |
Link | https://github.com/joxeankoret/diaphora |
Description | An advanced program diff'ing tool integrated into IDA Pro. Can compared two IDB databases and display the differences. |
Name | HexRaysPyTools |
Link | https://github.com/igogo-x86/HexRaysPyTools |
Description | It assists in the creation of classes/structures and detection of virtual tables. |
Name | ClassInformer |
Link | https://github.com/herosi/classinformer |
Description | Parses disassembly to reconstruct classes from RTTI. |
Install notes |
|
Name | idaclu |
Link | https://github.com/harlamism/IdaClu |
Description | It helps you find similarities in functions and group them in bulk. |
Name | auto_dword.py |
Link | https://gist.github.com/herrcore/4595a884345a60d3e9c1b6a8f17f93d9 |
Description | Allows you to highlight raw data and right click and select "Auto-DWORD" to transform it into a list of DWORDS. |
Name | HashDB |
Link | https://github.com/OALabs/hashdb-ida |
Description | Can be used to look up strings that have been hashed in malware (typically to resolve function hashing). |
Name | FindYara |
Link | https://github.com/OALabs/findyara-ida |
Description | Allows you to scan your binary with yara rules. |
Name | HexCopy |
Link | https://github.com/OALabs/hexcopy-ida |
Description | Allows you to quickly copy disassembly as encoded hex bytes. |
Name | Lucid |
Link | https://github.com/gaasedelen/lucid |
Description | Lucid is a developer-oriented IDA Pro plugin for exploring the Hex-Rays microcode. It was designed to provide a seamless, interactive experience for studying microcode transformations in the decompiler pipeline. |
Name | D810 |
Link | https://gitlab.com/eshard/d810 |
Description | D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode. |
Name | Highlight target instructions |
Link | AGDCservices_highlight_target_instructions_plugin.py |
Description | These were two scripts that were original written for Ghidra by somebody else and I converted them into IDA Pro equivalent ones. They will highlight (or unhighlight) call statements as well as many other things related to encryption and math operations. |
Name | Gepetto |
Link | https://github.com/JusticeRage/Gepetto |
Description | A Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables. |
Install notes |
|
Tools and frameworks
Name | Sark Framework |
Link | https://github.com/tmr232/Sark https://sark.readthedocs.io/en/latest/Installation.html |
Description | IDA Plugins & IDAPython Scripting Library. |
Name | Flare-Emu |
Link | https://github.com/mandiant/flare-emu |
Description | An emulation framework to provide an easy to use and flexible interface for scripting emulation tasks. |
Install notes | python -m pip install rzpipe flare-emu unicorn |
Name | Flare-FLOSS |
Link | https://github.com/mandiant/flare-floss |
Description | This is an Obfuscated String Solver that uses advanced static analysis techniques to automatically extract and deobfuscate all strings from malware binaries. |
Install notes |
|
Name | Angr Framework |
Link | https://github.com/angr/angr https://github.com/andreafioraldi/IDAngr https://github.com/andreafioraldi/angrdbg https://github.com/degrigis/awesome-angr |
Description | A platform-agnostic binary analysis framework. |
Install notes | python -m pip install angr angrdbg angr-management capstone-windows |
Name | QScripts |
Link | https://github.com/allthingsida/qscripts |
Description | Allows you to develop and run any supported scripting language (*.py; *.idc, etc.) from the comfort of your own favorite text editor as soon as you save the active script, the trigger file or any of its dependencies. |