IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made to a database by multiple users, by connecting together different instances of IDA Pro.
The main features of IDArling are:
If you have any questions not worthy of a bug report, feel free to ping us at #idarling on freenode and ask away.
Also Read – FridaExtract : Frida.re Based RunPE Extraction Tool
Releases
This project is under active development. Feel free to send a PR if you would like to help! 🙂
It is not really stable in its current state, please stayed tuned for a first release of the project!
Installation
Install the IDArling client into the IDA plugins folder.
idarling_plugin.py
and the idarling
folder to the IDA plugins folder. C:\Program Files\IDA 7.x\plugins
/Applications/IDA\ Pro\ 7.x/idabin/plugins
~/ida-7.x/plugins/
import urllib2; exec(urllib2.urlopen(‘https://raw.githubusercontent.com/IDArlingTeam/IDArling/master/easy_install.py’)).read()
Warning: The plugin is only compatible with IDA Pro 7.x on Windows, macOS, and Linux.
The dedicated server requires PyQt5, which is integrated into IDA. If you’re using an external Python installation, we recommand using Python 3, which offers a pre-built package that can be installed with a simple pip install PyQt5
.
Usage
Open the Settings dialog accessible from the right-clicking the widget located in the status bar. Show the servers list by clicking on the Network Settings tabs and add your server to it.
Connect to the server by clicking on it after right-clicking the widget again. Finally, you should be able to access the following menus to upload or download a database:
File –> Open from server
File –> Save to server
Credit: Alexandre Adamski & Joffrey Guilbon
Playwright-MCP (Model Context Protocol) is a cutting-edge tool designed to bridge the gap between AI…
JBDev is a specialized development tool designed to streamline the creation and debugging of jailbreak…
The Kereva LLM Code Scanner is an innovative static analysis tool tailored for Python applications…
Nuclei-Templates-Labs is a dynamic and comprehensive repository designed for security researchers, learners, and organizations to…
SSH-Stealer and RunAs-Stealer are malicious tools designed to stealthily harvest SSH credentials, enabling attackers to…
Control flow flattening is a common obfuscation technique used by OLLVM (Obfuscator-LLVM) to transform executable…