-
To kick off 2019, we launched a free powerful reverse-engineering framework
#Ghidra. It gives users a way to improve cybersecurity and provides a set of capabilities that would otherwise be unavailable to many in the community. *reposted to fix inaccuracy of release date* https://twitter.com/NSAGov/status/1220100344677568512 … -
I'm creating a very detailed course on Reverse Engineering with
#Ghidra on@Hakin9. If you would like to learn about RE and want to get started with learning Malware Analysis, make sure to check it out. https://hakin9.org/course/reverse-engineering-with-ghidra-w50/ … cc:@binitamshah@ghidraninja -
Okay random
#ghidra question which may be a matter of me not knowing enough of PE calling conventions. I have a function that seems to be "void foo(char*)" But somehow, the char* is discarded quickly. Instead a new stack variable is never initialized, but used. Second arg? -
on @YouTube: Reversing WannaCry Part 2 - Diving into the malware with#Ghidra https://youtu.be/Q90uZS3taG0 -
@Volatile_Life thank you! We are so happy to have this chance and work with you on this amazing course!#Ghidra is such a powerful tool, with great potential! And having such a skilled instructor, we are confident that all students will gain new skills about RE and Ghidra! -
We
@VDOOSecurity just released KotlinScriptProvider, an extension that allows running Kotlin scripts in Ghidra. https://github.com/VDOO-Connected-Trust/KotlinScriptProvider …#ghidra#kotlin -
I played with
#Ghidra lately and it's niiice! I especially like the decompiler view but that's because I never tried Hex-Rays.. Next step: learn how to create new function IDs for lib recognition. pic.twitter.com/OrgzM5X9io
-
#Ghidra pro tip : you can force pointer size when you choose a custom data type i.e. "my_struct_t *32" in a 64bit project.
@Ghidra_tips -
Finally released part 2 of my »Reversing
#WannaCry with#Ghidra« series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra. https://www.youtube.com/watch?v=Q90uZS3taG0 … -
pretty sure freenode has
#ghidra -
#ShmooCon: find me before 5:20 and say “Arrr, show me your booty” and you get a sticker, prize, and overly enthusiastic talk
about @Ghidrology#Ghidra#training -
There is a
#ghidra at http://matrix.org -
http://192.168.4.1:8080
@Ghidrology mini#CTF#Ghidra more hints coming
-
@Ghidrology mini#CTF activated! Come find the WAP and win a prize!#Ghidra#ShmooConpic.twitter.com/8NaIcdClLt
-
IBM Developer Podcast Series: A conversation with The National Security Agency's community outreach team about open source software, learning new skills, and sharing tech origin stories
#opensource#ghidra https://ibm.co/2u2UJAP pic.twitter.com/k7GkwL0dh2
-
These are, in no uncertain terms, hotter than hell. Well done
#ghidra team! @RGB_Lightspic.twitter.com/LGfvTuYwsA
-
if you want a humbling experience, try to write python scripts in the Ghidra Script Manager. Let's see if you accidentally forget to decrement i in a loop more than once.
#ghidra -
Everyone knows the sign of the Ouroboros Infinity Seal is literal proof of
#Ghidra's efficacy/quality/legit origin, it's like Shaolin Forearm Branding. Nuff said. Plug it in. -
Scripting in Ghidra - during this module you'll some advanced capabilities that are available (for example learn about python3 bridge) https://hakin9.org/product/reverse-engineering-with-ghidra-w50/ …
#infosec#hacking#hackers#Pentesting#programming#pentest#opensource#ghidra#malwareanalysis#malware#Python
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.