{"id":4449,"date":"2019-04-04T17:36:48","date_gmt":"2019-04-04T12:06:48","guid":{"rendered":"http:\/\/kalilinuxtutorials.com\/?p=4449"},"modified":"2019-04-04T17:36:48","modified_gmt":"2019-04-04T12:06:48","slug":"idarling-reverse-engineering-plugin","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/","title":{"rendered":"IDArling : Collaborative Reverse Engineering Plugin for IDA Pro &#038; Hex-Ray"},"content":{"rendered":"\n<p>IDArling is a collaborative reverse engineering plugin for <a href=\"https:\/\/www.hex-rays.com\/products\/ida\/\">IDA Pro<\/a>\nand <a href=\"https:\/\/www.hex-rays.com\/products\/decompiler\/index.shtml\">Hex-Rays<\/a>. It\nallows to synchronize in real-time the changes made to a database by multiple\nusers, by connecting together different instances of IDA Pro.<\/p>\n\n\n\n<p>The main features of IDArling are:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>hooking general user events<\/li><li>structure and enumeration support<\/li><li>Hex-Rays decompiler syncing<\/li><li>replay engine and auto-saving<\/li><li>database loading and saving<\/li><li>interactive status bar widget<\/li><li>user cursors (instructions, functions, navbar)<\/li><li>invite and following an user moves<\/li><li>dedicated server using Qt5<\/li><li>integrated server within IDA<\/li><li>LAN servers discovery<\/li><li>following an user moves in real time<\/li><\/ul>\n\n\n\n<p>If you have any questions not worthy of a bug report, feel free to ping us at <a href=\"https:\/\/kiwiirc.com\/client\/irc.freenode.net\/idarling\">#idarling on freenode<\/a> and ask away.<\/p>\n\n\n\n<p><strong>Also Read &#8211; <a href=\"https:\/\/kalilinuxtutorials.com\/fridaextract\/\" target=\"_blank\" rel=\"noreferrer noopener\" aria-label=\"FridaExtract : Frida.re Based RunPE Extraction Tool (opens in a new tab)\">FridaExtract : Frida.re Based RunPE Extraction Tool<\/a><\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/IDArlingTeam\/IDArling#releases\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Releases<\/strong><\/p>\n\n\n\n<p>This project is under active development. Feel free to send a PR if you would\nlike to help! \ud83d\ude42<\/p>\n\n\n\n<p><strong>It is not really stable in its current state, please stayed tuned for a first\nrelease of the project!<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/IDArlingTeam\/IDArling#installation\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>Install the IDArling client into the IDA plugins folder.<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Copy <code><strong>idarling_plugin.py<\/strong><\/code> and the <code><strong>idarling<\/strong><\/code> folder to the IDA plugins folder. <ul><li>On Windows, the folder is at <code><strong>C:\\Program Files\\IDA 7.x\\plugins<\/strong><\/code><\/li><li>On macOS, the folder is at <code><strong>\/Applications\/IDA\\ Pro\\ 7.x\/idabin\/plugins<\/strong><\/code><\/li><li>On Linux, the folder may be at <code><strong>~\/ida-7.x\/plugins\/<\/strong><\/code> <\/li><\/ul><\/li><li>Alternatively, you can use the &#8220;easy install&#8221; method by copying the following line into the console:<\/li><\/ul>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>import urllib2; exec(urllib2.urlopen(&#8216;https:\/\/raw.githubusercontent.com\/IDArlingTeam\/IDArling\/master\/easy_install.py&#8217;)).read()<\/strong><\/p>\n\n\n\n<p><strong>Warning:<\/strong> The plugin is only compatible with IDA Pro 7.x on Windows, macOS,\nand Linux.<\/p>\n\n\n\n<p>The dedicated server requires PyQt5, which is integrated into IDA. If you&#8217;re using an external Python installation, we recommand using Python 3, which offers a pre-built package that can be installed with a simple <code><strong>pip install PyQt5<\/strong><\/code><strong>.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><a href=\"https:\/\/github.com\/IDArlingTeam\/IDArling#usage\"><\/a><\/h2>\n\n\n\n<p style=\"text-align:center\" class=\"has-background has-light-green-cyan-background-color\"><strong>Usage<\/strong><\/p>\n\n\n\n<p>Open the <em>Settings<\/em> dialog accessible from the right-clicking the widget located in the status bar. Show the servers list by clicking on the <em>Network Settings<\/em> tabs and add your server to it. <\/p>\n\n\n\n<p>Connect to the server by clicking on it after right-clicking the widget again. Finally, you should be able to access the following menus to upload or download a database:<\/p>\n\n\n\n<p class=\"has-text-color has-background has-vivid-green-cyan-color has-very-dark-gray-background-color\"><strong>File &#8211;&gt; Open from server<br>File &#8211;&gt; Save to server<\/strong><\/p>\n\n\n\n<p><strong>Credit:  Alexandre Adamski  &amp;  Joffrey Guilbon<\/strong><\/p>\n\n\n\n<div class=\"wp-block-button aligncenter is-style-squared\"><a class=\"wp-block-button__link has-background has-vivid-cyan-blue-background-color\" href=\"https:\/\/github.com\/IDArlingTeam\/IDArling\"><strong>Download<\/strong><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made to a database by multiple users, by connecting together different instances of IDA Pro. The main features of IDArling are: hooking general user events structure and enumeration support Hex-Rays decompiler syncing replay engine and [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"","fifu_image_alt":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1497,1584,1589,2834],"class_list":["post-4449","post","type-post","status-publish","format-standard","hentry","category-kali","tag-hex-ray","tag-ida-pro","tag-idarling","tag-reverse-engineering"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>IDArling : Collaborative Reverse Engineering Plugin for IDA Pro &amp; Hex-Ray<\/title>\n<meta name=\"description\" content=\"IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IDArling : Collaborative Reverse Engineering Plugin for IDA Pro &amp; Hex-Ray\" \/>\n<meta property=\"og:description\" content=\"IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-04T12:06:48+00:00\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"IDArling : Collaborative Reverse Engineering Plugin for IDA Pro &#038; Hex-Ray\",\"datePublished\":\"2019-04-04T12:06:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/\"},\"wordCount\":373,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"keywords\":[\"Hex-Ray\",\"IDA Pro\",\"IDArling\",\"Reverse Engineering\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/\",\"name\":\"IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"datePublished\":\"2019-04-04T12:06:48+00:00\",\"description\":\"IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray","description":"IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/","og_locale":"en_US","og_type":"article","og_title":"IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray","og_description":"IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made","og_url":"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2019-04-04T12:06:48+00:00","author":"R K","twitter_card":"summary_large_image","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"IDArling : Collaborative Reverse Engineering Plugin for IDA Pro &#038; Hex-Ray","datePublished":"2019-04-04T12:06:48+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/"},"wordCount":373,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"keywords":["Hex-Ray","IDA Pro","IDArling","Reverse Engineering"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/","url":"https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/","name":"IDArling : Collaborative Reverse Engineering Plugin for IDA Pro & Hex-Ray","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"datePublished":"2019-04-04T12:06:48+00:00","description":"IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/idarling-reverse-engineering-plugin\/"]}]},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":19134,"url":"https:\/\/kalilinuxtutorials.com\/efixplorer\/","url_meta":{"origin":4449,"position":0},"title":"efiXplorer : IDA Plugin For UEFI Firmware Analysis And Reverse Engineering Automation","author":"R K","date":"October 13, 2021","format":false,"excerpt":"efiXplorer\u00a0- IDA plugin for UEFI firmware analysis and reverse engineering automation Supported versions of Hex-Rays products:\u00a0everytime we focus on last versions of IDA and Decompiler because we try to use most recent features from new SDK releases. That means we tested only on recent versions of Hex-Rays products and do\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-abKQgAT5nns\/YV2U8pjudVI\/AAAAAAAALCc\/mbPToA7_O3028p6D8wuRaQdFdnErUBHqQCLcBGAsYHQ\/s728\/download%2B%25282%2529.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/1.bp.blogspot.com\/-abKQgAT5nns\/YV2U8pjudVI\/AAAAAAAALCc\/mbPToA7_O3028p6D8wuRaQdFdnErUBHqQCLcBGAsYHQ\/s728\/download%2B%25282%2529.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-abKQgAT5nns\/YV2U8pjudVI\/AAAAAAAALCc\/mbPToA7_O3028p6D8wuRaQdFdnErUBHqQCLcBGAsYHQ\/s728\/download%2B%25282%2529.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/1.bp.blogspot.com\/-abKQgAT5nns\/YV2U8pjudVI\/AAAAAAAALCc\/mbPToA7_O3028p6D8wuRaQdFdnErUBHqQCLcBGAsYHQ\/s728\/download%2B%25282%2529.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":35429,"url":"https:\/\/kalilinuxtutorials.com\/hrtng-ida-plugin-elevating-idas-capabilities-for-advanced-malware-analysis\/","url_meta":{"origin":4449,"position":1},"title":"hrtng IDA Plugin : Elevating IDA&#8217;s Capabilities For Advanced Malware Analysis","author":"Varshini","date":"December 11, 2024","format":false,"excerpt":"hrtng IDA plugin is a collection of tools, ideas and experiments from different sources I've found interesting and useful in my reversing work. A practical guide to the reverse of a complex malware using the example of dissecting a FinSpy module with help of hrtng IDA plugin on securelist There\u2026","rel":"","context":"In &quot;Malware&quot;","block_context":{"text":"Malware","link":"https:\/\/kalilinuxtutorials.com\/category\/malware\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjSjqTCMpgErTwvhs8Pwxrzhh1vlkbosIPdeKSze2DmCM4MeOvJvqX1C704IHUr6OcakNQcjXZEKUTuU0078asNZNCo_DLGHD5cxnFrjWll3-8mNfm-l-aYKpZGLasRc4YX8OllJ_k3Ff1yGnMOLuvTFIj66qxnoaPRtQcGHFdNAWQXR4ui3BNG3EOByYiW\/s1600\/hrtng%20IDA%20Plugin.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjSjqTCMpgErTwvhs8Pwxrzhh1vlkbosIPdeKSze2DmCM4MeOvJvqX1C704IHUr6OcakNQcjXZEKUTuU0078asNZNCo_DLGHD5cxnFrjWll3-8mNfm-l-aYKpZGLasRc4YX8OllJ_k3Ff1yGnMOLuvTFIj66qxnoaPRtQcGHFdNAWQXR4ui3BNG3EOByYiW\/s1600\/hrtng%20IDA%20Plugin.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjSjqTCMpgErTwvhs8Pwxrzhh1vlkbosIPdeKSze2DmCM4MeOvJvqX1C704IHUr6OcakNQcjXZEKUTuU0078asNZNCo_DLGHD5cxnFrjWll3-8mNfm-l-aYKpZGLasRc4YX8OllJ_k3Ff1yGnMOLuvTFIj66qxnoaPRtQcGHFdNAWQXR4ui3BNG3EOByYiW\/s1600\/hrtng%20IDA%20Plugin.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjSjqTCMpgErTwvhs8Pwxrzhh1vlkbosIPdeKSze2DmCM4MeOvJvqX1C704IHUr6OcakNQcjXZEKUTuU0078asNZNCo_DLGHD5cxnFrjWll3-8mNfm-l-aYKpZGLasRc4YX8OllJ_k3Ff1yGnMOLuvTFIj66qxnoaPRtQcGHFdNAWQXR4ui3BNG3EOByYiW\/s1600\/hrtng%20IDA%20Plugin.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjSjqTCMpgErTwvhs8Pwxrzhh1vlkbosIPdeKSze2DmCM4MeOvJvqX1C704IHUr6OcakNQcjXZEKUTuU0078asNZNCo_DLGHD5cxnFrjWll3-8mNfm-l-aYKpZGLasRc4YX8OllJ_k3Ff1yGnMOLuvTFIj66qxnoaPRtQcGHFdNAWQXR4ui3BNG3EOByYiW\/s1600\/hrtng%20IDA%20Plugin.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEjSjqTCMpgErTwvhs8Pwxrzhh1vlkbosIPdeKSze2DmCM4MeOvJvqX1C704IHUr6OcakNQcjXZEKUTuU0078asNZNCo_DLGHD5cxnFrjWll3-8mNfm-l-aYKpZGLasRc4YX8OllJ_k3Ff1yGnMOLuvTFIj66qxnoaPRtQcGHFdNAWQXR4ui3BNG3EOByYiW\/s1600\/hrtng%20IDA%20Plugin.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":32674,"url":"https:\/\/kalilinuxtutorials.com\/nimfilt\/","url_meta":{"origin":4449,"position":2},"title":"Nimfilt &#8211; Unraveling The Secrets Of Nim Binaries With Advanced Analysis Tools","author":"Varshini","date":"April 8, 2024","format":false,"excerpt":"Nimfilt is a collection of modules and scripts to help with analyzing\u00a0Nim\u00a0binaries. It started out as a CLI demangling tool inspired by\u00a0c++filt. It evolved into a larger set of tools for analyzing Nim, but the original name stuck. nimfilt.py: a Python module that implements demangling for Nim. It can also\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCzVk6FZ8F0j-SX-Me_CSkm8yBrqbq0TNXt8RcZu9fKhjRXzuO4bRtxlm6drlNh5NVDTcRn356N5LmUN_VW2BOK6JCgiJFetoEgIYUuU_cVhCFhxJo4gpjZEcaXQMvceJgPXfT41UjjI253CoAc8rFxDbbZf8-SPIwa5RNxsJkoz0M7Pj5bDWWdoqu92tx\/s16000\/Nimfilt%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCzVk6FZ8F0j-SX-Me_CSkm8yBrqbq0TNXt8RcZu9fKhjRXzuO4bRtxlm6drlNh5NVDTcRn356N5LmUN_VW2BOK6JCgiJFetoEgIYUuU_cVhCFhxJo4gpjZEcaXQMvceJgPXfT41UjjI253CoAc8rFxDbbZf8-SPIwa5RNxsJkoz0M7Pj5bDWWdoqu92tx\/s16000\/Nimfilt%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCzVk6FZ8F0j-SX-Me_CSkm8yBrqbq0TNXt8RcZu9fKhjRXzuO4bRtxlm6drlNh5NVDTcRn356N5LmUN_VW2BOK6JCgiJFetoEgIYUuU_cVhCFhxJo4gpjZEcaXQMvceJgPXfT41UjjI253CoAc8rFxDbbZf8-SPIwa5RNxsJkoz0M7Pj5bDWWdoqu92tx\/s16000\/Nimfilt%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCzVk6FZ8F0j-SX-Me_CSkm8yBrqbq0TNXt8RcZu9fKhjRXzuO4bRtxlm6drlNh5NVDTcRn356N5LmUN_VW2BOK6JCgiJFetoEgIYUuU_cVhCFhxJo4gpjZEcaXQMvceJgPXfT41UjjI253CoAc8rFxDbbZf8-SPIwa5RNxsJkoz0M7Pj5bDWWdoqu92tx\/s16000\/Nimfilt%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCzVk6FZ8F0j-SX-Me_CSkm8yBrqbq0TNXt8RcZu9fKhjRXzuO4bRtxlm6drlNh5NVDTcRn356N5LmUN_VW2BOK6JCgiJFetoEgIYUuU_cVhCFhxJo4gpjZEcaXQMvceJgPXfT41UjjI253CoAc8rFxDbbZf8-SPIwa5RNxsJkoz0M7Pj5bDWWdoqu92tx\/s16000\/Nimfilt%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEgCzVk6FZ8F0j-SX-Me_CSkm8yBrqbq0TNXt8RcZu9fKhjRXzuO4bRtxlm6drlNh5NVDTcRn356N5LmUN_VW2BOK6JCgiJFetoEgIYUuU_cVhCFhxJo4gpjZEcaXQMvceJgPXfT41UjjI253CoAc8rFxDbbZf8-SPIwa5RNxsJkoz0M7Pj5bDWWdoqu92tx\/s16000\/Nimfilt%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":33733,"url":"https:\/\/kalilinuxtutorials.com\/ifl-interactive-functions-list\/","url_meta":{"origin":4449,"position":3},"title":"IFL &#8211; Interactive Functions List : Enhancing IDA Pro With Advanced Function Navigation nd Import Features","author":"Varshini","date":"July 9, 2024","format":false,"excerpt":"Discover the power of the IFL - Interactive Functions List, a dynamic plugin designed to elevate your experience with IDA Pro. This user-friendly tool revolutionizes how you navigate between functions and their references, making your analysis more efficient. Whether you're importing reports from tools like PE-sieve or navigating in either\u2026","rel":"","context":"In &quot;Hacking Tools&quot;","block_context":{"text":"Hacking Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/hacking-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg8qsT0oPmpjK5BpdeNVpHRTVSSoYBSZ1y3MnMKPGCak38Lp-lhUCYGkrByY5leE3D66ZO7iQavICqlPuDwMtYL9kTz7GQbUjkarUknACw0m9PJ2Djw_8pMpI5rdlLhZNUTtsS23BX5S6ot7lxxNFxyvYh7c1otqXQkYjbRBhL9tKqjbyzJ0p1ymXx5fJqN\/s16000\/IFL%20-%20Interactive%20Functions%20List%20.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg8qsT0oPmpjK5BpdeNVpHRTVSSoYBSZ1y3MnMKPGCak38Lp-lhUCYGkrByY5leE3D66ZO7iQavICqlPuDwMtYL9kTz7GQbUjkarUknACw0m9PJ2Djw_8pMpI5rdlLhZNUTtsS23BX5S6ot7lxxNFxyvYh7c1otqXQkYjbRBhL9tKqjbyzJ0p1ymXx5fJqN\/s16000\/IFL%20-%20Interactive%20Functions%20List%20.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg8qsT0oPmpjK5BpdeNVpHRTVSSoYBSZ1y3MnMKPGCak38Lp-lhUCYGkrByY5leE3D66ZO7iQavICqlPuDwMtYL9kTz7GQbUjkarUknACw0m9PJ2Djw_8pMpI5rdlLhZNUTtsS23BX5S6ot7lxxNFxyvYh7c1otqXQkYjbRBhL9tKqjbyzJ0p1ymXx5fJqN\/s16000\/IFL%20-%20Interactive%20Functions%20List%20.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg8qsT0oPmpjK5BpdeNVpHRTVSSoYBSZ1y3MnMKPGCak38Lp-lhUCYGkrByY5leE3D66ZO7iQavICqlPuDwMtYL9kTz7GQbUjkarUknACw0m9PJ2Djw_8pMpI5rdlLhZNUTtsS23BX5S6ot7lxxNFxyvYh7c1otqXQkYjbRBhL9tKqjbyzJ0p1ymXx5fJqN\/s16000\/IFL%20-%20Interactive%20Functions%20List%20.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg8qsT0oPmpjK5BpdeNVpHRTVSSoYBSZ1y3MnMKPGCak38Lp-lhUCYGkrByY5leE3D66ZO7iQavICqlPuDwMtYL9kTz7GQbUjkarUknACw0m9PJ2Djw_8pMpI5rdlLhZNUTtsS23BX5S6ot7lxxNFxyvYh7c1otqXQkYjbRBhL9tKqjbyzJ0p1ymXx5fJqN\/s16000\/IFL%20-%20Interactive%20Functions%20List%20.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEg8qsT0oPmpjK5BpdeNVpHRTVSSoYBSZ1y3MnMKPGCak38Lp-lhUCYGkrByY5leE3D66ZO7iQavICqlPuDwMtYL9kTz7GQbUjkarUknACw0m9PJ2Djw_8pMpI5rdlLhZNUTtsS23BX5S6ot7lxxNFxyvYh7c1otqXQkYjbRBhL9tKqjbyzJ0p1ymXx5fJqN\/s16000\/IFL%20-%20Interactive%20Functions%20List%20.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":11205,"url":"https:\/\/kalilinuxtutorials.com\/uefi_retool\/","url_meta":{"origin":4449,"position":4},"title":"UEFI_RETool : A Tool For UEFI Firmware Reverse Engineering","author":"R K","date":"August 12, 2020","format":false,"excerpt":"UEFI_RETool is a tool for UEFI firmware reverse engineering. UEFI firmware analysis with uefi_retool.py script Usage Copy ida_plugin\/uefi_analyser.py script and ida_plugin\/uefi_analyser directory to IDA plugins directoryEdit config.json filePE_DIR is a directory that contains all executable images from the UEFI firmwareDUMP_DIR is a directory that contains all components from the firmware\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":35936,"url":"https:\/\/kalilinuxtutorials.com\/labsync\/","url_meta":{"origin":4449,"position":5},"title":"LabSync : Revolutionizing Collaboration In Laboratories And Reverse Engineering","author":"Varshini","date":"January 31, 2025","format":false,"excerpt":"LabSync is an innovative tool designed to enhance collaboration and efficiency in various laboratory and technical environments. Among the multiple implementations of LabSync, its application as an IDA plugin for reverse engineering stands out for its unique functionality. LabSync For IDA : Synchronizing Reverse Engineering Efforts LabSync serves as a\u2026","rel":"","context":"In &quot;Pentesting Tools&quot;","block_context":{"text":"Pentesting Tools","link":"https:\/\/kalilinuxtutorials.com\/category\/penetration-testing-tools\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LabSync-.webp?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LabSync-.webp?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LabSync-.webp?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LabSync-.webp?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LabSync-.webp?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/01\/LabSync-.webp?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4449","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=4449"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/4449\/revisions"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=4449"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=4449"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=4449"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}