About 22,000 results
Open links in new tab
  1. Find all calls of a given function with Ghidra

    Dec 6, 2024 · I would like to know how to find all the explicit calls to a given function with Ghidra. For example, I am looking at the assembly of a function and I would like to list all the calls …

  2. What does XREF mean? - Reverse Engineering Stack Exchange

    Cross References (or simply XREFs) is a feature of disassemblers to show you where certain functions and objects were called from or which functions and objects are used by a specific …

  3. IDA is not recognizing cross references - Reverse Engineering …

    Dec 20, 2015 · Edit -> Global -> Cross-references -> Cross reference depth. Increase as applicable. From the documentation: This value "how many bytes of an object to look at to …

  4. How can I get xrefs to class member variables in IDA?

    Nov 11, 2020 · The other answer is wrong; it's totally possible (assuming the IDB already has a type for the structure in question, and that type has been applied to arguments/variables in …

  5. How to find function calls in IDA Pro?

    Feb 28, 2022 · I'm analyzing some *.DLL, I found a function such as sub_10151561 () and I would like to know which other functions call this function. How to do it? Thank you in advance.

  6. How to get cross-references to a struct type in IDA by IDAPython …

    Stack Variable References The xrefs you are showing are xrefs from stack variables. As you mentioned, when trying to get the xrefs to the struct, you get two types of results: In IDA the …

  7. How can I make IDA see a string reference?

    At 0xC02860F0 hit Alt + A and select unicode to define it as a unicode string. IDA should recognize the reference after you do so.

  8. Ghidra find xref function chain - Reverse Engineering Stack Exchange

    Dec 2, 2024 · Is there a Ghidra feature that lets me see the "chain" of xrefs? Like, potential call stacks? Or the chain of function xref? This feels like something that should be …

  9. ARM (STM32) memory mapping on Ghidra: offset only part of the …

    Nov 22, 2022 · 00000014 25 2c 03 08 addr DAT_08032c25 UsageFault XREF[1]: Entry Point (*) 00000018 25 2c 03 08 addr DAT_08032c25 Notice how all the pointers point to …

  10. Find reference to string in radare2

    answered Dec 20, 2015 at 14:18 880 5 14 2 axt seems to take only an address as input not a string i was able to coax axt to print a xref with axt str.hello_world_n in the hello world.exe but …