JCGdev / IDAFunctionsDecompiler

An IDAPython script to decompile all the functions of an executable and dump the pseudocode

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

IDAFunctionsDecompiler

An IDAPython script to decompile all the functions of a binary and dump the pseudocode

Table of contents

General info

  • Get the decompiled pseudocode of every function in an executable.
  • Tested on IDA 7.5
  • IDAPython plugin and Hexrays decompiler needed!

Checksums

functionDecompiler.py hashes

MD5 --> e4dcf2dee23bb7d39172441b93e88925

Sha1 --> 5cf1f74791581dbe10e13d848bf80ea9041c7740

Sha256 --> 537683666fa696b4b34bfaed910ce8a913f15e0b96c8d49ea523e848b4c16b28

Setup

Change output path

Edit "outputPath" variable from the script, and specify the path where the pseudocode will be stored

Example:

outputPath = "C:\\Users\Juanjo\\Desktop\\test"

Docs

IDA API

IDA 7.4 Newer API changes

About

An IDAPython script to decompile all the functions of an executable and dump the pseudocode


Languages

Language:Python 100.0%