参考资料
- 【整理】iOS逆向心得:IDA中的unk的含义
- 【整理】IDA使用心得:常见名称及含义
- 【整理】IDA使用心得:多种显示模式
- 【已解决】IDA中浮动窗口Output Window如何固定到底部
- 【未解决】研究抖音越狱检测逻辑:_RxAnnotationInlineLoader的load
- 【未解决】IDA中用idat64的Batch Mode尝试反编译导出YouTube的Module_Framework全部代码伪代码
- 【整理】学习IDA教程:The IDA Pro Book
- 【整理】IDA中一些功能和选项设置
- 【整理】IDA中的自动分析Autoanalysis
- 【记录】用IDA分析加了符号表的抖音AwemeCore二进制
- 【未解决】搞懂IDA中_D_objc_selrefs qword_38AF870 % 8的含义
- 【记录】iOS的二进制中的__objc_selrefs的含义
- 【已解决】IDA中抖音AwemeCore中字符串const char* qword_3893908的原始字符串
- 【已解决】iOS逆向WhatsApp:用IDA去调试WhatsApp
- 【记录】重新启动IDA调试iOS调试环境
- 【记录】IDA调试iOS的WhatsApp:开始调试
- 【记录】IDA调试iOS的WhatsApp:相关调试界面
- 【未解决】IDA调试iOS程序如何实现类似Xcode中lldb的po打印出对象信息
- 【记录】IDA中符号表相关信息
- 【整理】IDA使用心得:OpCode区
- 【整理】IDA使用心得:auto comments
- 【已解决】IDA中查看ARM汇编的伪代码
- 【已解决】IDA使用心得:IDA汇编代码如何快速找到匹配的Xcode汇编代码
- 【未解决】IDA中开启宏指令比如ADRP和ADD变成ADRL
- Failures and troubleshooting (hex-rays.com)
- Igor’s tip of the week #49: Navigation band – Hex Rays (hex-rays.com)
- tip of week index (hex-rays.com)
- Interactive operation (hex-rays.com)
- IDA_Pro_Shortcuts.pdf (hex-rays.com)
- Download center (hex-rays.com)
- IDA Free
- IDA Evaluation
- BH_Eagle_ida_pro.pdf
- IDA software reverse engineering - Code World (codetd.com)
- IDA Pro Tips to Add to Your Bag of Tricks – PT SWARM (ptsecurity.com)
- Hex-Rays interactive operation: Mark/unmark as decompiled
- Hex-Rays interactive operation: Copy to assembly
- ida - What is the meaning of (_DWORD ) - Reverse Engineering Stack Exchange
- iOS重打包绕过签名校验防护 | La0s
- Interactive operation
- Failures and troubleshooting
- Third-party plugins
- onethawt/idaplugins-list: A list of IDA Plugins
- IDA Help: The Interactive Disassembler Help Index
- 如何将ida中的悬浮窗口恢复原位_TedLau的博客-CSDN博客_ida窗口还原
- The basics of IDA pro - Infosec Resources (infosecinstitute.com)
- IDA Pro7.0使用技巧总结 - 先知社区 (aliyun.com)
- IDA Help: String literal style dialog (hex-rays.com)
- IDA Help: Processor Type (hex-rays.com)
- IDA-Pro-Hex-Rays.pdf (software-sources.com)
- IDA Help: Analysis options (hex-rays.com)
- Objective-C Runtime 分析 | 张不坏的博客 (zhangbuhuai.com)
- x86 - What's the meaning of dword_XXXX and offset dword_XXXX in IDA? - Reverse Engineering Stack Exchange
- IDA 8.1 | Hex-Rays Docs
- IDA 8.2 | Hex-Rays Docs
- IDA 8.2sp1 | Hex-Rays Docs
- IDA 8.3 | Hex-Rays Docs
- IDA 8.4 | Hex-Rays Docs
- IDA 8.4sp1 | Hex-Rays Docs
- IDA 8.4sp2 | Hex-Rays Docs
- IDA 9.0 | Hex-Rays Docs
- [iOS Hacker] IDA 7.0 动态调试 iOS App – exchen's blog
- Tutorial: Debugging iOS Applications with IDA Pro (hex-rays.com)
- ios_debugger_tutorial
- Mickey Jin on X: "I really enjoy debugging everything inside the IDA Pro, because it is awesome and powerful. But I want to use the lldb command, like "po object" when debugging the objc program. Why don't you support lldb ? @HexRaysSA So I just wrote a simple script: https://t.co/BzWLtwwyLK https://t.co/TMDhdrPhqm" / X (twitter.com)
- simulator the lldb command like "po objc_object" inside the IDA debugger. (github.com)
- Quotes of this post / X (twitter.com)
- Tutorial: Debugging iOS Applications with IDA Pro (hex-rays.com)