Hex-Rays
hex-rays.com βΊ decompiler
IDA Decompilers: Clear Pseudocode for Binary Analysis
Transform complex machine code into readable C-like pseudocode. No more time-consuming assembly language learning. Make binary analysis straightforward.
GitHub
github.com βΊ REhints βΊ HexRaysCodeXplorer
GitHub - REhints/HexRaysCodeXplorer: Hex-Rays Decompiler plugin for better code navigation
Starred by 2.6K users
Forked by 406 users
Languages Β C++ 88.3% | C 7.6% | CMake 4.1%
Videos
20:33
Introduction to the Hex-Rays Decompiler SDK - YouTube
06:01
Source level and pseudo-code (decompiler) level debugging with ...
01:32:33
Exploring IDA Free 7.6 & HexRays Free Decompiler (Stream) - YouTube
- YouTube
37:36
Maximize the power of hex-rays decompiler - Igor Kirillov - YouTube
07:56
Real-world Decompilation with IDA Pro - Part 1: Introduction - YouTube
Factsheet
Original author Ilfak Guilfanov
Developer Hex-Rays
Initial release May 21, 1991; 34 years ago (1991-05-21)
Original author Ilfak Guilfanov
Developer Hex-Rays
Initial release May 21, 1991; 34 years ago (1991-05-21)
Hex-Rays
hex-rays.com βΊ ida-pro
IDA Pro: Powerful Disassembler, Decompiler & Debugger
Powerful disassembler, decompiler and versatile debugger in one tool. Unparalleled processor support. Analyze binaries in seconds for any platform.
Hex-Rays
hex-rays.com βΊ ida-free
IDA Free: Disassembler & Decompiler at No Cost
Free disassembler and decompiler to learn reverse engineering. Core IDA features at no cost for students and non-commercial use. Download and start today.
GitHub
github.com βΊ ax330d βΊ hrdev
GitHub - ax330d/hrdev: Hex-Rays Decompiler Enhanced View
Hex-Rays Decompiler Enhanced View. Contribute to ax330d/hrdev development by creating an account on GitHub.
Starred by 180 users
Forked by 50 users
Languages Β Python
Hex-rays
hex-rays.co.il βΊ hex-rays-decompiler
Hex-Rays Decompiler β Hex-Rays
We are pleased to present our flagship product, the Hex-Rays Decompiler, which brings binary software analysis within reach of millions of programmers.
Hex-Rays
hex-rays.com
Hex-Rays: State-of-the-Art Binary Code Analysis Tools
β‘οΈ Smarter decompilation Β· β‘οΈ New Dynamic Xref Graph & Xref Tree Β· β‘οΈ Expanded processor support Β· and more ... Release notes Β· Generate low-level assembly code from machine-executable code. Analyze binaries across 60+ processor ...
GitHub
github.com βΊ zengfr βΊ HexRaysCodeXplorer_plugin_for_ida_pro
GitHub - zengfr/HexRaysCodeXplorer_plugin_for_ida_pro: Hex-Rays Decompiler plugin for better code navigation. plugin for IDA Pro.
Hex-Rays Decompiler plugin for better code navigation. plugin for IDA Pro. - zengfr/HexRaysCodeXplorer_plugin_for_ida_pro
Starred by 24 users
Forked by 2 users
Languages Β C++ 88.3% | C 7.7% | CMake 4.0%
Hex-Rays Docs
docs.hex-rays.com βΊ developer-guide βΊ c++-sdk βΊ using-the-decompiler-sdk-decompiler-plug-in
Using the Decompiler SDK: Decompiler plugin | Hex-Rays Docs
* For example, expression like * * funcptr = 0; * * will be displayed as * * funcptr = NULL; * * Due to highly dynamic nature of the decompier output, we must * use the decompiler events to accomplish the task. The plugin will * wait for the ctree structure to be ready in the memory and will * replace zeroes in pointer contexts with NULLs. * */ #include <hexrays.hpp> // Hex-Rays API pointer hexdsp_t *hexdsp = NULL; static bool inited = false; static const char nodename[] = β$ hexrays NULLsβ; static const char null_type[] = βMACRO_NULLβ; //βββββββββββββββββββββββββ // Is the plugin enabled?
Hexrays
hexrays.net βΊ files βΊ productpage.html
Hexrays.net USA
The Hex-Rays Decompiler converts executable programs into a human readable C-like pseudo code text. The pseudo code text is generated on the fly.
GitHub
github.com βΊ patois βΊ xray
GitHub - patois/xray: Hexrays decompiler plugin that colorizes and filters the decompiler's output based on regular expressions
xray is a plugin for the Hexrays ... of the decompiler's output based on configurable regular expressions. This helps highlighting interesting code patterns which can be useful in malware analysis and vulnerability identification. xray installs ...
Starred by 141 users
Forked by 14 users
Languages Β Python
Reddit
reddit.com βΊ r/reverseengineering βΊ ida series, part 1: the hex-rays decompiler
r/ReverseEngineering on Reddit: IDA series, part 1: the Hex-Rays decompiler
June 20, 2017 - To make them RW you need to set RW flags, change name of segment to something not from special list, and maybe change segment type as well from CODE to DATA or UNK or what you want. More info about special cases here: https://www.hex-rays.com/products/decompiler/manual/tricks.shtml#02.
VA
oit.va.gov βΊ Services βΊ TRM βΊ ToolPage.aspx
Hex-Rays Decompiler
Hex-Rays Interactive Disassembler (IDA) - Authorized w/ Constraints (DIVEST)