Ghidra Ninja

@ghidraninja

Ghidra reverse engineering stuff. Not affiliated with anyone: not an official Ghidra developer, not an official spokesperson, just a guy who likes reversing.

Vrijeme pridruživanja: ožujak 2019.

Tweetovi

Blokirali ste korisnika/cu @ghidraninja

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @ghidraninja

  1. prije 23 sata

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

    Poništi
  2. 29. sij

    If you are into C++ reverse engineering and never tried OOAnalyzer you are missing out big time!

    Poništi
  3. 21. sij

    Interested in the details of CVE-2020-0601/Curveball? I released a video on Friday going into the technical details of the Microsoft CryptoAPI vulnerability!

    Poništi
  4. proslijedio/la je Tweet
    18. sij

    Great explanation of CVE-2020-0601 (aka Curveball aka Whose Curve is it Anyway aka the NSA Microsoft CryptoAPI Vulnerability). It's really accessible and accidentally made me understand ECC properly for the first time

    Poništi
  5. 17. sij

    I just published a video explaining the details of CVE-2020-0601 aka Curveball: The Microsoft CryptoAPI vulnerability that was reported by the NSA.

    Poništi
  6. proslijedio/la je Tweet
    16. sij

    This is well worth a watch. Easy to understand, covers the backdooring process and rammifications in a clear manner.

    Poništi
  7. proslijedio/la je Tweet
    15. sij

    Ghidra Script that sets the names for missing function names by looking for relevant patterns in the binary! Hope that will help you too :)

    Poništi
  8. proslijedio/la je Tweet
    14. sij

    Also, there are still some seats left for my hands-on IoT hacking training in February in Berlin! You can use code TWITTER for 10% off!

    Poništi
  9. proslijedio/la je Tweet

    Just one month left until our inaugural event in Berlin. One week left to get our holiday rates. Don't miss out! Use code TWITTER for an extra 10% off!

    Poništi
  10. proslijedio/la je Tweet
    14. sij

    My talk on breaking TrustZone-M on a variety of ARMv8-M processors can now be watched here:

    Poništi
  11. 13. sij

    No Ghidra in this video, but I'll promise that there will be more Ghidra videos soon :)

    Prikaži ovu nit
    Poništi
  12. 13. sij

    Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!

    Prikaži ovu nit
    Poništi
  13. 12. sij

    Finally filming again!

    Poništi
  14. proslijedio/la je Tweet
    12. lis 2019.

    Soldering & testing the first batch of my Debug’n’Dump PCBs - FT232H based and supports JTAG, SWD, I2C, SPI (and SPI flashes) and UART. SOIC-8 Clips/sockets can directly be plugged in the board, and it can power targets with 3.3 and 5.0V.

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    16. ruj 2019.

    Another great addition to the Ghidra community!

    Poništi
  16. proslijedio/la je Tweet
    16. ruj 2019.

    Super excited to finally release SVD-Loader for Ghidra: A tool to make bare-metal ARM firmware reverse-engineering much easier by automatically annotating all peripherals - for over 650 different microcontrollers!

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    5. ruj 2019.

    I just published a blog-post on how to use machine-learning and an RF side-channel to steal PINs from thin air.

    Poništi
  18. 30. lip 2019.

    A debugger for Ghidra might be released (in a beta version) this summer according to their talk at

    Poništi
  19. 30. lip 2019.

    Also coming: A Sleigh emulator for easier development

    Poništi
  20. 30. lip 2019.

    System-call decompilation is coming to Ghidra in 9.1! Awesome

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·