Twitter | Pretraživanje | |
Ghidra Ninja
Ghidra reverse engineering stuff. Not affiliated with anyone: not an official Ghidra developer, not an official spokesperson, just a guy who likes reversing.
129
Tweetovi
16
Pratim
6.139
Osobe koje vas prate
Tweetovi
Ghidra Ninja 1 h
Odgovor korisniku/ci @anonymo97524790
Also happens to be a specialty of mine :) problem is finding an interesting firmware
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 2 h
Would love to hear what you are the most interested in!
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 5 h
Odgovor korisniku/ci @k_leind
I think one of the best ways is to start by understanding what kind of code a compiler generates, so basically write some simple code and then load it into Ghidra - see whether you can fully understand what you see in Ghidra etc.
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja proslijedio/la je tweet
Gergely Revay 4. velj
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 3. velj
Odgovor korisniku/ci @daniel_bilar @schuran
Haven't seen it, but will take a look! Thanks! When I'm speaking at a conference I basically never see any talks - prep and afterwards relaxing from the stress leading up to it :)
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 3. velj
Odgovor korisniku/ci @SHoltmanns
The problem is that you really want an integrated debugger and do some live analysis for this - so hoping for the debugger release :)
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 2. velj
Odgovor korisniku/ci @schuran
Thanks! Glad you enjoyed it!
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 2. velj
Odgovor korisniku/ci @Sythez2
Thank you! Appreciate it!
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 2. velj
Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 1. velj
Odgovor korisniku/ci @FlUxIuS @halvarflake
There’s a telegram channel with a lot of people in it
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 1. velj
Odgovor korisniku/ci @kahukamau
You have to compile it using gradle and then load it into Ghidra (in the project Windows in the file menu there’s an item named “Load extension” or so)
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 29. sij
If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time!
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 21. sij
Odgovor korisniku/ci @browninfosecguy @hasherezade
Thank you! :)
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 21. sij
Interested in the details of CVE-2020-0601/Curveball? I released a video on Friday going into the technical details of the Microsoft CryptoAPI vulnerability!
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja proslijedio/la je tweet
Graham Bleaney 18. sij
Great explanation of CVE-2020-0601 (aka Curveball aka Whose Curve is it Anyway aka the NSA Microsoft CryptoAPI Vulnerability). It's really accessible and accidentally made me understand ECC properly for the first time
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 17. sij
Odgovor korisniku/ci @_n0p_
Thanks a lot! Haven’t tried yet to be honest, maybe I’ll give it a spin when I have some downtime!
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 17. sij
Odgovor korisniku/ci @G33KatWork @LiveOverflow
Yea indeed, least egoistic person I know
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 17. sij
I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 16. sij
Odgovor korisniku/ci @richinseattle @daveaitel i 4 ostali
Yep, not affiliated with Ghidra at all
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 16. sij
Odgovor korisniku/ci @SecurityJon
Glad you like it!
Reply Retweet Označi sa "sviđa mi se"