| Pretraživanje | Osvježi |
|
Ring3API
@rimpq
|
4. kol |
|
An Introduction To Code Analysis With #Ghidra nzzl.us/dzOcttC
|
||
|
|
||
|
Ghidra
@GHIDRA_RE
|
4. tra |
|
It's finally here - #GHIDRA source code released!
The repository now contains the source for the core framework, the decompiler, features, and extensions.
github.com/NationalSecuri…
|
||
|
|
||
|
Brandon Miller
@zznop_
|
17. ožu |
|
Im releasing two scripts and my first blog post on SEGA Genesis ROM hacking with #GHIDRA zznop.github.io/romhacking/201…
|
||
|
|
||
|
Ghidra Ninja
@ghidraninja
|
2. velj |
|
Finally released part 2 of my »Reversing #WannaCry with #Ghidra« series!
In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
youtube.com/watch?v=Q90uZS…
|
||
|
|
||
|
Ghidra Ninja
@ghidraninja
|
1. tra |
|
The full #Ghidra source-code has finally been released! github.com/ghidraninja/gh…
|
||
|
|
||
|
Andrey Polkovnichenko
@andre_colonel
|
17. ožu |
|
The second post about parsing WebAssembly with ghidra is ready. I describe how to write loader, parse binary format and display it in human readable form.
andr3colonel.github.io/2019/03/17/ghi…
#ghidra #webassembly
|
||
|
|
||
|
Kasif Dekel
@kasifdekel
|
26. ožu |
|
I created a #GHIDRA script to parse windows x64 SEH directory and display it in comments just like in IDA.
when I get more time ill clean the code and probably test more edge cases (not sure that all assumptions are 100% correct). but here it is: bit.ly/2YnH69D pic.twitter.com/3djPNte7uz
|
||
|
||
|
Ghidra
@GHIDRA_RE
|
26. ožu |
|
#GHIDRA 9.0.1 has been released with many bugfixes!
Changelog: ghidra-sre.org/releaseNotes.h…
Download: ghidra-sre.org
|
||
|
|
||
|
Oğuz Kartal
@0ffffffffh
|
18. svi |
|
finally, i have released code coverage visualizer plugin for #ghidra @GHIDRA_RE github.com/0ffffffffh/dra…
|
||
|
|
||
|
Florian Magin
@0x464D
|
21. stu |
|
My blogpost series on setting up a full development environment for #Ghidra is now available at reversing.technology
They cover both writing scripts and extending Ghidra in Java including full debugging support without Eclipse.
|
||
|
|
||
|
Jimmy Wylie
@mayahustle
|
3. tra |
|
How to enable Pcode in #GHIDRA, the intermediate representation used by the decompiler:
1. Edit -> Tool Options -> Listing Fields -> Pcode Field -> Display Raw Pcode
2. Click the Jenga icon in the top right of the listing, enable the Pcode field in Instructions/Data tab pic.twitter.com/46EM19uRZP
|
||
|
|
||
|
reenz0h
@Sektor7Net
|
6. kol |
|
Static RPC exploration with #Ghidra scripting
/CC @_xpn_ @tiraniddo @ghidraninja @GHIDRA_RE
blog.sektor7.net/#!res/2019/RPC… pic.twitter.com/a83helOMNS
|
||
|
||
|
Ghidra Ninja
@ghidraninja
|
27. ožu |
|
Just released part 1 of analyzing #WannaCry in #Ghidra! In this video we will find the killswitch, look at its installation/persistence methods and extract/decrypt the resources contained in the malware! youtu.be/Sv8yu12y5zM
|
||
|
|
||
|
The Captain
@ArrrCaptain
|
20. lis |
|
Thanks everyone so much for following me! Here's a Sunday two-fer for ya:
One, a script that just gets decompiler C output gitlab.com/snippets/19058…
and two, my slides from #JailbreakSec gitlab.com/digital.polygl…
(^ no inline URL! otherwise preview kills browser)
#Ghidra
|
||
|
|
||
|
John Lambert
@JohnLaTwC
|
10. ožu |
|
Proof that #Ghidra is written by devs like the rest of us: pic.twitter.com/IuqnPN6jGC
|
||
|
||
|
William Harvey
@williamharvey07
|
4. lip |
|
|
||
|
Ghidra
@GHIDRA_RE
|
31. ožu |
|
In the next few days, a new paid version of #GHIDRA will be released which includes the debugger, more GDT libs, and much more!
|
||
|
|
||
|
Gergely Revay
@geri_revay
|
4. velj |
|
Awesome #wannacry reversing tutorials from @ghidraninja
Part 1: youtube.com/watch?v=Sv8yu1…
Part 2: youtube.com/watch?v=Q90uZS…
#reverseengineering #malware #ghidra
|
||
|
|
||
|
Shogun Lab
@shogun_lab
|
22. pro |
|
The second part of my Ghidra tutorial series for reversing Windows binaries is up! We look at converting data, function call trees/graphs and the script manager. Along the way, we'll solve CrackMe binaries and a Flare-On 6 CTF challenge: shogunlab.com/blog/2019/12/2… #ghidra #reversing pic.twitter.com/gm2aePpf71
|
||
|
||
|
Sovereignty77 ⭐️⭐️⭐️
@sovereignity77
|
7. lis |
|
#Ghidra #GhidraChan is back! #8Kun ushers in the #Storm! #Deepstate ready for the storm surge? pic.twitter.com/befo7ziRGB
|
||
|
|
||