Ghidra

@GHIDRA_RE

Software Reverse Engineering Tool Suite. Here you can get your ghidra tips and updates. This page is not operated by the NSA. Or is it?

Maryland, USA
Vrijeme pridruživanja: ožujak 2019.
Rođen/a 05. veljače

Tweetovi

Blokirali ste korisnika/cu @GHIDRA_RE

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @GHIDRA_RE

  1. Prikvačeni tweet
    7. ožu 2019.

    Let's build a community! Please tag us on tips tweets or any other related post and we'll RT and give credit. Our goal is to make GHIDRA more popular and maintained by the community. Please RT.

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    22. sij

    RUMINT: Ghidra debugger module is in alpha testing; should work out of the box with gdb 8.0.1; more configuration required for Windows

    Poništi
  3. proslijedio/la je Tweet
    10. sij

    I'm releasing ghidra scripts that I made for pwn and reversing tasks, starting with this set of scripts to replace linux/libc magic numbers with readable names for aarch64, amd64/i386, arm/thumb, hppa, m68k, mips, ppc, ppc64, sh, sh4, sparc and sparc64.

    Poništi
  4. 15. sij
    Poništi
  5. 1. sij

    We've updated our online versions of the SDK docs:

    Poništi
  6. proslijedio/la je Tweet
    14. pro 2019.

    We made awesome-ghidra repository. Please share and contribute to it!

    Poništi
  7. 12. pro 2019.
    Poništi
  8. 12. pro 2019.

    Great talk from "Captain Arrr!-E" about extending Ghidra!

    Poništi
  9. proslijedio/la je Tweet
    9. pro 2019.

    Reversing a Pokémon-themed pwnable challenge with

    Poništi
  10. proslijedio/la je Tweet
    21. stu 2019.

    We just released ghidra-pyi-generator, a tool to generate typing stubs for the Ghidra APIs. Grab the stubs from our release, and get autocompletion & docs inside PyCharm.

    Poništi
  11. proslijedio/la je Tweet
    25. stu 2019.

    Our FREE community Server now running v9.1 - go grab the latest client and spread the word for new potential users to take a look at

    Poništi
  12. proslijedio/la je Tweet
    17. stu 2019.

    Finally I manage to finish training part 3 from the INDEX, analysis of stack1 and stack2 with free tools. You can find it in here: Using: 's IDA Free, and I hope you enjoy it.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    24. stu 2019.

    Do you want to reverse some SPU code? There is a work in progress support: (Was useful for reversing KELF algorithm.)

    Poništi
  14. 24. ruj 2019.

    GHIDRA 9.1 is out! release notes:

    Poništi
  15. 6. ruj 2019.

    We are happy to see that more and more projects started integrating Ghidra's decompiler to their applications! We'd love to see more of these coming

    Poništi
  16. proslijedio/la je Tweet
    6. kol 2019.
    Poništi
  17. proslijedio/la je Tweet
    23. srp 2019.

    Close to releasing my native interface for PoC. I just tried to compile on Linux and OS X and everything worked like a charm out of the box, not even a build issue. :) That's good motivation to make one final effort until release...

    Poništi
  18. 30. lip 2019.

    Debugging support for GHIDRA might be released this summer! Stay tuned!

    Poništi
  19. proslijedio/la je Tweet
    18. lip 2019.

    awesome work on Sysmon evasion + the use of

    Poništi
  20. proslijedio/la je Tweet
    17. lip 2019.

    It looks like we are seeing a generational shift here. All players completing the challenge (3/4) used !

    Poništi
  21. proslijedio/la je Tweet
    12. lip 2019.

    When using a decompilier to reverse code, comparing between and , Ghidra is the winner by a landslide.

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·