Skip to content

An IDAPython script to decompile all the functions of an executable and dump the pseudocode

Notifications You must be signed in to change notification settings

JCGdev/IDAFunctionsDecompiler

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

23 Commits
 
 
 
 
 
 

Repository files navigation

IDAFunctionsDecompiler

An IDAPython script to decompile all the functions of a binary and dump the pseudocode

Table of contents

General info

  • Get the decompiled pseudocode of every function in an executable.
  • Tested on IDA 7.5
  • IDAPython plugin and Hexrays decompiler needed!

Checksums

functionDecompiler.py hashes

MD5 --> e4dcf2dee23bb7d39172441b93e88925

Sha1 --> 5cf1f74791581dbe10e13d848bf80ea9041c7740

Sha256 --> 537683666fa696b4b34bfaed910ce8a913f15e0b96c8d49ea523e848b4c16b28

Setup

Change output path

Edit "outputPath" variable from the script, and specify the path where the pseudocode will be stored

Example:

outputPath = "C:\\Users\Juanjo\\Desktop\\test"

Docs

IDA API

IDA 7.4 Newer API changes

About

An IDAPython script to decompile all the functions of an executable and dump the pseudocode

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages