参考资料
- 【整理】iOS逆向心得:IDA中的unk的含义
- 【整理】IDA使用心得:常见名称及含义
- 【整理】IDA使用心得:多种显示模式
- 【已解决】IDA中浮动窗口Output Window如何固定到底部
- 【未解决】研究抖音越狱检测逻辑:_RxAnnotationInlineLoader的load
- 【未解决】IDA中用idat64的Batch Mode尝试反编译导出YouTube的Module_Framework全部代码伪代码
- 【整理】学习IDA教程:The IDA Pro Book
- 【整理】IDA中一些功能和选项设置
- 【整理】IDA中的自动分析Autoanalysis
- 【记录】用IDA分析加了符号表的抖音AwemeCore二进制
- 【未解决】搞懂IDA中_D_objc_selrefs qword_38AF870 % 8的含义
- 【记录】iOS的二进制中的__objc_selrefs的含义
- 【已解决】IDA中抖音AwemeCore中字符串const char* qword_3893908的原始字符串
- Failures and troubleshooting (hex-rays.com)
- Igor’s tip of the week #49: Navigation band – Hex Rays (hex-rays.com)
- tip of week index (hex-rays.com)
- Interactive operation (hex-rays.com)
- IDA_Pro_Shortcuts.pdf (hex-rays.com)
- Download center (hex-rays.com)
- IDA Free
- IDA Evaluation
- BH_Eagle_ida_pro.pdf
- IDA software reverse engineering - Code World (codetd.com)
- IDA Pro Tips to Add to Your Bag of Tricks – PT SWARM (ptsecurity.com)
- Hex-Rays interactive operation: Mark/unmark as decompiled
- Hex-Rays interactive operation: Copy to assembly
- ida - What is the meaning of (_DWORD ) - Reverse Engineering Stack Exchange
- iOS重打包绕过签名校验防护 | La0s
- Interactive operation
- Failures and troubleshooting
- Third-party plugins
- onethawt/idaplugins-list: A list of IDA Plugins
- IDA Help: The Interactive Disassembler Help Index
- 如何将ida中的悬浮窗口恢复原位_TedLau的博客-CSDN博客_ida窗口还原
- The basics of IDA pro - Infosec Resources (infosecinstitute.com)
- IDA Pro7.0使用技巧总结 - 先知社区 (aliyun.com)
- IDA Help: String literal style dialog (hex-rays.com)
- IDA Help: Processor Type (hex-rays.com)
- IDA-Pro-Hex-Rays.pdf (software-sources.com)
- IDA Help: Analysis options (hex-rays.com)
- Objective-C Runtime 分析 | 张不坏的博客 (zhangbuhuai.com)
- x86 - What's the meaning of dword_XXXX and offset dword_XXXX in IDA? - Reverse Engineering Stack Exchange