Dump-GUY

ApplyCalleeType IDA Plugin ๐Ÿค™ โ€” Reborn. Single-file port to IDA Pro 9.3 with right-click menu, live prototype editor, and full SAL/MSDN preprocessing. Compatible IDA 8.x โ†’ 9.3+.

54
6
100% credibility
Found Mar 11, 2026 at 48 stars -- GitGems finds repos before they trend. Get early access to the next one.
Sign Up Free
AI Analysis
Python
AI Summary

An improved plugin for a reverse engineering tool that lets users apply known function signatures to indirect calls for better code readability in disassembly and decompiler views.

How It Works

1
๐Ÿ” Discover the Helper Tool

While searching for ways to make analyzing tricky software code easier in your reverse engineering program, you find this handy plugin on GitHub.

2
๐Ÿ“ฅ Add It to Your Program

Simply copy the single plugin file into your program's add-ons folder and restart to activate it.

3
๐Ÿ–ฅ๏ธ Load a Program to Analyze

Open your reverse engineering software and load the executable file you're investigating.

4
๐Ÿ‘€ Spot a Confusing Call

Navigate to an indirect function call in the code view where arguments look messy or unnamed, slowing down your work.

5
โœจ Apply the Fix with One Shortcut

Place your cursor on the call and press Shift+A (or right-click and select), then pick or enter the function's details.

6
Choose Your Function Details
โœ๏ธ
Type It In

Paste or write the function signature, and it cleans up automatically for easy use.

๐Ÿ“š
Pick from Standard Library

Browse common known functions from built-in libraries.

๐Ÿ 
Use Local Definition

Choose a type already noted in your current analysis.

โœ… Code Clears Up Instantly

Watch the disassembly and pseudocode refresh with proper names, types, and layout, making your analysis flow smoothly.

Sign up to see the full architecture

5 more

Sign Up Free

Star Growth

See how this repo grew from 48 to 54 stars Sign Up Free
Repurpose This Repo

Repurpose is a Pro feature

Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.

Unlock Repurpose
AI-Generated Review

What is ApplyCalleeTypeEx?

ApplyCalleeTypeEx is a Python plugin for IDA Pro that lets you apply known function prototypes to indirect CALL instructions, instantly fixing decompiler and disassembler output for runtime-resolved APIs like those from PEB walks or GetProcAddress stored in local stack variables. Place your cursor on the CALL in disassembly or pseudocode, hit Shift+A or right-click the menu, and pick from manual entry, standard TIL types, or local IDB types. It's a single-file port of the original applycalleetype plugin, compatible with IDA Pro 8.x through 9.3+.

Why is it gaining traction?

This reborn applycalleetypeex stands out with a right-click menu in both disassembly and pseudocode views, a live prototype editor showing preprocessing previews, and full SAL/MSDN/Windows SDK preprocessing that handles messy real-world declarations without manual cleanup. No dependencies, zero install hassleโ€”just drop it in your plugins folder. Developers notice immediate wins in cleaner pseudocode for stubborn indirect calls that IDA can't auto-resolve.

Who should use this?

Malware analysts and vulnerability researchers reversing Windows binaries with dynamic API resolution via LdrGetProcedureAddress or hash tables. IDA Pro users on 8.x or 9.3+ tired of mangled stack args in decomp like v5("calc.exe") instead of ShellExecuteA parameters. Anyone daily fighting local-variable function pointers in packed malware or custom loaders.

Verdict

Grab it if you reverse oftenโ€”45 stars and 1.0% credibility score reflect early maturity, but stellar docs, 210-test suite passing on 8.4/9.3, and PoC binaries make it production-ready. Drop-in upgrade over the broken original.

(198 words)

Sign up to read the full AI review Sign Up Free

Similar repos coming soon.