Ghidra

@GHIDRA_RE

Software Reverse Engineering Tool Suite. Here you can get your ghidra tips and updates. This page is not operated by the NSA. Or is it?

Maryland, USA
Joined March 2019
Born February 05

Tweets

You blocked @GHIDRA_RE

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @GHIDRA_RE

  1. Pinned Tweet
    7 Mar 2019

    Let's build a community! Please tag us on tips tweets or any other related post and we'll RT and give credit. Our goal is to make GHIDRA more popular and maintained by the community. Please RT.

    Show this thread
    Undo
  2. Retweeted
    Jan 22

    RUMINT: Ghidra debugger module is in alpha testing; should work out of the box with gdb 8.0.1; more configuration required for Windows

    Undo
  3. Retweeted
    Jan 10

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Undo
  4. Jan 15
    Undo
  5. Jan 1

    We've updated our online versions of the SDK docs:

    Undo
  6. Retweeted
    14 Dec 2019

    We made awesome-ghidra repository. Please share and contribute to it!

    Undo
  7. 12 Dec 2019
    Undo
  8. 12 Dec 2019

    Great talk from "Captain Arrr!-E" about extending Ghidra!

    Undo
  9. Retweeted
    9 Dec 2019

    Reversing a Pokémon-themed pwnable challenge with

    Undo
  10. Retweeted
    21 Nov 2019

    We just released ghidra-pyi-generator, a tool to generate typing stubs for the Ghidra APIs. Grab the stubs from our release, and get autocompletion & docs inside PyCharm.

    Undo
  11. Retweeted

    Our FREE community Server now running v9.1 - go grab the latest client and spread the word for new potential users to take a look at

    Undo
  12. Retweeted
    17 Nov 2019

    Finally I manage to finish training part 3 from the INDEX, analysis of stack1 and stack2 with free tools. You can find it in here: Using: 's IDA Free, and I hope you enjoy it.

    Show this thread
    Undo
  13. Retweeted
    24 Nov 2019

    Do you want to reverse some SPU code? There is a work in progress support: (Was useful for reversing KELF algorithm.)

    Undo
  14. 24 Sep 2019

    GHIDRA 9.1 is out! release notes:

    Undo
  15. 6 Sep 2019

    We are happy to see that more and more projects started integrating Ghidra's decompiler to their applications! We'd love to see more of these coming

    Undo
  16. Retweeted
    6 Aug 2019
    Undo
  17. Retweeted
    23 Jul 2019

    Close to releasing my native interface for PoC. I just tried to compile on Linux and OS X and everything worked like a charm out of the box, not even a build issue. :) That's good motivation to make one final effort until release...

    Undo
  18. 30 Jun 2019

    Debugging support for GHIDRA might be released this summer! Stay tuned!

    Undo
  19. Retweeted
    18 Jun 2019

    awesome work on Sysmon evasion + the use of

    Undo
  20. Retweeted
    17 Jun 2019

    It looks like we are seeing a generational shift here. All players completing the challenge (3/4) used !

    Undo
  21. Retweeted
    12 Jun 2019

    When using a decompilier to reverse code, comparing between and , Ghidra is the winner by a landslide.

    Show this thread
    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·