IDA Pro Plugin Now Available to the Community

Intezer

The Intezer Analyze IDA Pro plugin is now available to community users!

IDA Pro is the most common reverse engineering platform for disassembling computer software. The Intezer Analyze IDA Pro plugin accelerates reverse engineering by enriching every function of disassembled machine code with information about where the code was seen previously.

  • Save investigation time by filtering out common code and libraries, allowing you to focus only on a file’s malicious and unique code
  • Detect a similar function or part of a function to attribute a malware family or threat actor

With this information, the reverse engineer can immediately focus on the relevant parts of the binary, reducing the analysis time from hours—and sometimes even days—to minutes.

See the Plugin in Action!

Dridex

Take these two simple steps to start using the plugin:

  1. Make sure you have an Intezer Analyze community account. You can quickly register for free here
  2. Click on IDA plugin located at the top right corner

What’s the difference between the community and enterprise plugins?

The community plugin allows for one daily investigation, whereas enterprise users have the ability to process more files.

Get started using the community plugin or upgrade to the enterprise edition

Intezer

Count on Intezer Forensic AI SOC to triage, investigate and respond to every alert at unmatched speed and accuracy.

In this article

Share this article
Recommended Blogs
5MIN READ

AI SOC for teams outgrowing MDR

For teams that have outgrown their MDR, the answer isn’t a better MDR. It’s a different operating model.
3MIN READ

Intezer’s 2025 momentum reflects rapid adoption of AI SOC in global enterprise 

Enterprises are adopting AI SOC as the new model for running security operations. This shift is reflected clearly in Intezer’s momentum over the past year.
8MIN READ

Alert fatigue is costing you: Why your SOC misses 1% of real threats

Our 2026 AI SOC Report, based on the analysis of more than 25M security alerts across live enterprise environments, reveals a critical disconnect between how security teams prioritize alerts and where real threats actually originate.