IDA plugin for reverse-engineering and dynamic interactions with the Binsec platform


  • Decoding an instruction (in DBA IR)
  • Loading execution traces generated by Pinsec
  • Triggering analyzes on Binsec and retrieving results


  • protobuf
  • ZMQ
  • capstone (for trace disassembly)
  • graphviz (to draw dependency within a formula)
  • pyparsing
  • enum
  • plotly (optional)

Running Idasec

  1. In IDA: Copy the idasec folder in the python directory of IDA and then load with Ctrl+F7
  2. As a standalone app, just run ./ (no yet ready)