IDArling is a collaborative reverse engineering plugin for IDA Pro and Hex-Rays. It allows to synchronize in real-time the changes made to a database by multiple users, by connecting together different instances of IDA Pro.
The main features of IDArling are:
If you have any questions not worthy of a bug report, feel free to ping us at #idarling on freenode and ask away.
Also Read – FridaExtract : Frida.re Based RunPE Extraction Tool
Releases
This project is under active development. Feel free to send a PR if you would like to help! 🙂
It is not really stable in its current state, please stayed tuned for a first release of the project!
Installation
Install the IDArling client into the IDA plugins folder.
idarling_plugin.py
and the idarling
folder to the IDA plugins folder. C:\Program Files\IDA 7.x\plugins
/Applications/IDA\ Pro\ 7.x/idabin/plugins
~/ida-7.x/plugins/
import urllib2; exec(urllib2.urlopen(‘https://raw.githubusercontent.com/IDArlingTeam/IDArling/master/easy_install.py’)).read()
Warning: The plugin is only compatible with IDA Pro 7.x on Windows, macOS, and Linux.
The dedicated server requires PyQt5, which is integrated into IDA. If you’re using an external Python installation, we recommand using Python 3, which offers a pre-built package that can be installed with a simple pip install PyQt5
.
Usage
Open the Settings dialog accessible from the right-clicking the widget located in the status bar. Show the servers list by clicking on the Network Settings tabs and add your server to it.
Connect to the server by clicking on it after right-clicking the widget again. Finally, you should be able to access the following menus to upload or download a database:
File –> Open from server
File –> Save to server
Credit: Alexandre Adamski & Joffrey Guilbon
shadow-rs is a Windows kernel rootkit written in Rust, demonstrating advanced techniques for kernel manipulation…
Extract and execute a PE embedded within a PNG file using an LNK file. The…
Embark on the journey of becoming a certified Red Team professional with our definitive guide.…
This repository contains proof of concept exploits for CVE-2024-5836 and CVE-2024-6778, which are vulnerabilities within…
This took me like 4 days (+2 days for an update), but I got it…
MaLDAPtive is a framework for LDAP SearchFilter parsing, obfuscation, deobfuscation and detection. Its foundation is…