Summary
Coming into the new year I did a personal review of plugins and frameworks that I currently use. There are also some that I am in the process of experimenting with as I may be able to apply them to work I’m doing. This year will be one of plugin development for me and I’ll be creating some new ones and updating/contributing to existing ones.
The following are a list that I have found useful and that I have confirmed work on IDA Pro 8.4.
Plugins
| Name | Flare CAPA Explorer |
| Link | https://github.com/mandiant/capa |
| Description | Detects capabilities in executable files. |
| Install notes | Reference the well-documented install instructions at: https://github.com/mandiant/capa/blob/master/doc/installation.md |
| Name | Diaphora |
| Link | https://github.com/joxeankoret/diaphora |
| Description | An advanced program diff'ing tool integrated into IDA Pro. Can compared two IDB databases and display the differences. |
| Name | HexRaysPyTools |
| Link | https://github.com/igogo-x86/HexRaysPyTools |
| Description | It assists in the creation of classes/structures and detection of virtual tables. |
| Name | ClassInformer |
| Link | https://github.com/herosi/classinformer |
| Description | Parses disassembly to reconstruct classes from RTTI. |
| Install notes |
|
| Name | idaclu |
| Link | https://github.com/harlamism/IdaClu |
| Description | It helps you find similarities in functions and group them in bulk. |
| Name | auto_dword.py |
| Link | https://gist.github.com/herrcore/4595a884345a60d3e9c1b6a8f17f93d9 |
| Description | Allows you to highlight raw data and right click and select "Auto-DWORD" to transform it into a list of DWORDS. |
| Name | HashDB |
| Link | https://github.com/OALabs/hashdb-ida |
| Description | Can be used to look up strings that have been hashed in malware (typically to resolve function hashing). |
| Name | FindYara |
| Link | https://github.com/OALabs/findyara-ida |
| Description | Allows you to scan your binary with yara rules. |
| Name | HexCopy |
| Link | https://github.com/OALabs/hexcopy-ida |
| Description | Allows you to quickly copy disassembly as encoded hex bytes. |
| Name | Lucid |
| Link | https://github.com/gaasedelen/lucid |
| Description | Lucid is a developer-oriented IDA Pro plugin for exploring the Hex-Rays microcode. It was designed to provide a seamless, interactive experience for studying microcode transformations in the decompiler pipeline. |
| Name | D810 |
| Link | https://gitlab.com/eshard/d810 |
| Description | D-810 is an IDA Pro plugin which can be used to deobfuscate code at decompilation time by modifying IDA Pro microcode. |
| Name | Highlight target instructions |
| Link | AGDCservices_highlight_target_instructions_plugin.py |
| Description | These were two scripts that were original written for Ghidra by somebody else and I converted them into IDA Pro equivalent ones. They will highlight (or unhighlight) call statements as well as many other things related to encryption and math operations. |
| Name | Gepetto |
| Link | https://github.com/JusticeRage/Gepetto |
| Description | A Python plugin which uses various large language models to provide meaning to functions decompiled by IDA Pro (≥ 7.4). It can leverage them to explain what a function does, and to automatically rename its variables. |
| Install notes |
|
Tools and frameworks
| Name | Sark Framework |
| Link | https://github.com/tmr232/Sark https://sark.readthedocs.io/en/latest/Installation.html |
| Description | IDA Plugins & IDAPython Scripting Library. |
| Name | Flare-Emu |
| Link | https://github.com/mandiant/flare-emu |
| Description | An emulation framework to provide an easy to use and flexible interface for scripting emulation tasks. |
| Install notes | python -m pip install rzpipe flare-emu unicorn |
| Name | Flare-FLOSS |
| Link | https://github.com/mandiant/flare-floss |
| Description | This is an Obfuscated String Solver that uses advanced static analysis techniques to automatically extract and deobfuscate all strings from malware binaries. |
| Install notes |
|
| Name | Angr Framework |
| Link | https://github.com/angr/angr https://github.com/andreafioraldi/IDAngr https://github.com/andreafioraldi/angrdbg https://github.com/degrigis/awesome-angr |
| Description | A platform-agnostic binary analysis framework. |
| Install notes | python -m pip install angr angrdbg angr-management capstone-windows |
| Name | QScripts |
| Link | https://github.com/allthingsida/qscripts |
| Description | Allows you to develop and run any supported scripting language (*.py; *.idc, etc.) from the comfort of your own favorite text editor as soon as you save the active script, the trigger file or any of its dependencies. |