
Hex-Rays SA
@HexRaysSA
Followers
8K
Following
861
Media
544
Statuses
1K
We are a hi-tech company focusing on binary software analysis. Our main products are IDA Pro and the Hex-Rays Decompiler. Discourse: https://community.hex-rays
Liège, Belgium
Joined December 2019
New to #malware analysis? Then you’ll definitely want to check out this deep dive into Babuk #ransomware using #IDAPro—the perfect starting point for beginners looking to sharpen their #reverseengineering skills:
1
53
313
More news coming to you from the soon-to-be-released IDA 9.2: we're taking the first step toward making development on top of #IDA more accessible—by open-sourcing the C++ SDK and IDAPython: #ReverseEngineering #DevTools #Infosec #Cybersecurity.
hex-rays.com
We're taking the first step toward making development on top of IDA more open and accessible: we’re open-sourcing the C++ SDK and IDAPython.
6
52
225
Last week, the North American team (+ Igor) attended REcon 2025 (@reconmtl) and it did not disappoint! . Some highlights, in no particular order:.➥ Watching our own Peter Goodman share past research on a panel alongside esteemed peers.➥ Connecting with IDA power users to hear
0
0
7
Power users are taking IDA headless with idalib. Think large-scale diffing, custom UIs, and CI pipelines. all without launching a GUI. 💡 Get inspired:
hex-rays.com
Discover four powerful ways to use idalib, IDA Pro’s headless automation interface, for scalable reverse engineering, CI integration, and more.
0
14
73
👉🏽 Check out this in-depth video of Matt Brown (@nmatt0) reversing the firmware decryption mechanism used in a Hanwha security camera with IDA Pro. Bonus: He's also written an accompanying blog post packed with code samples, screenshots, and more! .
hex-rays.com
Matt Brown reverse-engineers encrypted firmware in a Hanwha security camera, uncovering its predictable decryption scheme with IDA Pro.
0
8
60
🧠 Reverse engineers, your lab just got smarter. IDA Free 9.1 is now preinstalled in FLARE VM — @Mandiant 's open-source malware analysis environment. ➥ Lightweight static analysis with cloud decompilers. ➥ One-click to launch IDA directly. ➥ IDA Plugin ecosystem ready to
2
39
249
🛠️ Real-world RE with IDA . In this video, @bellis1001 uses patch diffing to investigate a CoreAudio vulnerability recently fixed in iOS 18.4.1—believed to have been exploited in the wild. Follow along as they uncover key changes in the binary, trace the source of memory.
0
3
18
RT @Steph3nSims: Thank you to @HexRaysSA for IDA Classroom 9.1 to help teach students. It's made finishing course updates a breeze. The exa….
0
11
0
👋 Please join us in welcoming @RolfRolles as Hex-Rays’ new Chief Scientist!. Rolf brings decades of RE expertise, with standout work in obfuscation, decompilation, and software protection. At Hex-Rays, he’ll lead research into next-gen decompilation and automated program.
0
23
211
♦️ Thank you @offensive_con for several days of great content and connection! .♦️ Congrats @RolfRolles on a successful training, your attendees walked away with so much knowledge. ♦️ And HUGE thanks to everyone who took the time to have feedback sessions with us about #IDA -
1
3
34