Twitter | Pretraživanje | |
Ghidra Ninja
Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
Reply Retweet Označi sa "sviđa mi se" More
FraggleRock613 2. velj
Odgovor korisniku/ci @ghidraninja
I really enjoy your videos. The Wyze camera has been eye opening
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 2. velj
Odgovor korisniku/ci @schuran
Thanks! Glad you enjoyed it!
Reply Retweet Označi sa "sviđa mi se"
Sythez 2. velj
Odgovor korisniku/ci @ghidraninja
Love it, thanks again for making these videos!
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 2. velj
Odgovor korisniku/ci @Sythez2
Thank you! Appreciate it!
Reply Retweet Označi sa "sviđa mi se"
Silke Holtmanns 3. velj
Odgovor korisniku/ci @ghidraninja
cool. did you already started some thinking on how to use ghidra for detection of morphed malware? I.e. introducing a new distance measure for function calls etc.
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 3. velj
Odgovor korisniku/ci @SHoltmanns
The problem is that you really want an integrated debugger and do some live analysis for this - so hoping for the debugger release :)
Reply Retweet Označi sa "sviđa mi se"
Хьюго 2. velj
Odgovor korisniku/ci @ghidraninja
yeah finaly 😍
Reply Retweet Označi sa "sviđa mi se"
Marius 'f0wL' Genheimer 2. velj
Odgovor korisniku/ci @ghidraninja
Well done! :D
Reply Retweet Označi sa "sviđa mi se"
Mike West - OSCP 3. velj
Odgovor korisniku/ci @ghidraninja @LiveOverflow
Awesome videos so far! Nice pace to them!
Reply Retweet Označi sa "sviđa mi se"