Twitter | Pretraživanje | |
Pretraživanje Osvježi
Ring3API 4. kol
An Introduction To Code Analysis With
Reply Retweet Označi sa "sviđa mi se"
Ghidra 4. tra
It's finally here - source code released! The repository now contains the source for the core framework, the decompiler, features, and extensions.
Reply Retweet Označi sa "sviđa mi se"
Brandon Miller 17. ožu
Im releasing two scripts and my first blog post on SEGA Genesis ROM hacking with
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 2. velj
Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 1. tra
The full source-code has finally been released!
Reply Retweet Označi sa "sviđa mi se"
Andrey Polkovnichenko 17. ožu
The second post about parsing WebAssembly with ghidra is ready. I describe how to write loader, parse binary format and display it in human readable form.
Reply Retweet Označi sa "sviđa mi se"
Kasif Dekel 26. ožu
I created a script to parse windows x64 SEH directory and display it in comments just like in IDA. when I get more time ill clean the code and probably test more edge cases (not sure that all assumptions are 100% correct). but here it is:
Reply Retweet Označi sa "sviđa mi se"
Ghidra 26. ožu
9.0.1 has been released with many bugfixes! Changelog: Download:
Reply Retweet Označi sa "sviđa mi se"
Oğuz Kartal 18. svi
finally, i have released code coverage visualizer plugin for
Reply Retweet Označi sa "sviđa mi se"
Florian Magin 21. stu
My blogpost series on setting up a full development environment for is now available at They cover both writing scripts and extending Ghidra in Java including full debugging support without Eclipse.
Reply Retweet Označi sa "sviđa mi se"
Jimmy Wylie 3. tra
How to enable Pcode in , the intermediate representation used by the decompiler: 1. Edit -> Tool Options -> Listing Fields -> Pcode Field -> Display Raw Pcode 2. Click the Jenga icon in the top right of the listing, enable the Pcode field in Instructions/Data tab
Reply Retweet Označi sa "sviđa mi se"
reenz0h 6. kol
Reply Retweet Označi sa "sviđa mi se"
Ghidra Ninja 27. ožu
Just released part 1 of analyzing in ! In this video we will find the killswitch, look at its installation/persistence methods and extract/decrypt the resources contained in the malware!
Reply Retweet Označi sa "sviđa mi se"
The Captain 20. lis
Thanks everyone so much for following me! Here's a Sunday two-fer for ya: One, a script that just gets decompiler C output and two, my slides from (^ no inline URL! otherwise preview kills browser)
Reply Retweet Označi sa "sviđa mi se"
John Lambert 10. ožu
Proof that is written by devs like the rest of us:
Reply Retweet Označi sa "sviđa mi se"
William Harvey 4. lip
Reply Retweet Označi sa "sviđa mi se"
Ghidra 31. ožu
In the next few days, a new paid version of will be released which includes the debugger, more GDT libs, and much more!
Reply Retweet Označi sa "sviđa mi se"
Gergely Revay 4. velj
Reply Retweet Označi sa "sviđa mi se"
Shogun Lab 22. pro
The second part of my Ghidra tutorial series for reversing Windows binaries is up! We look at converting data, function call trees/graphs and the script manager. Along the way, we'll solve CrackMe binaries and a Flare-On 6 CTF challenge:
Reply Retweet Označi sa "sviđa mi se"
Sovereignty77 ⭐️⭐️⭐️ 7. lis
Odgovor korisniku/ci @infinitechan
is back! ushers in the ! ready for the storm surge?
Reply Retweet Označi sa "sviđa mi se"