-
-
It's finally here -
#GHIDRA source code released! The repository now contains the source for the core framework, the decompiler, features, and extensions. https://github.com/NationalSecurityAgency/ghidra … -
Im releasing two scripts and my first blog post on SEGA Genesis ROM hacking with
#GHIDRA https://zznop.github.io/romhacking/2019/03/14/sega-genesis-rom-hacking-with-ghidra.html … -
Finally released part 2 of my »Reversing
#WannaCry with#Ghidra« series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra. https://www.youtube.com/watch?v=Q90uZS3taG0 … -
The full
#Ghidra source-code has finally been released! https://github.com/ghidraninja/ghidra_source_rel/ … -
The second post about parsing WebAssembly with ghidra is ready. I describe how to write loader, parse binary format and display it in human readable form. https://andr3colonel.github.io/2019/03/17/ghidra-wasm-loader-part2/ …
#ghidra#webassembly -
I created a
#GHIDRA script to parse windows x64 SEH directory and display it in comments just like in IDA. when I get more time ill clean the code and probably test more edge cases (not sure that all assumptions are 100% correct). but here it is: https://bit.ly/2YnH69D pic.twitter.com/3djPNte7uz
-
#GHIDRA 9.0.1 has been released with many bugfixes! Changelog: https://ghidra-sre.org/releaseNotes.html … Download: https://ghidra-sre.org/ -
finally, i have released code coverage visualizer plugin for
#ghidra@GHIDRA_REhttps://github.com/0ffffffffh/dragondance … -
My blogpost series on setting up a full development environment for
#Ghidra is now available at http://reversing.technology They cover both writing scripts and extending Ghidra in Java including full debugging support without Eclipse. -
How to enable Pcode in
#GHIDRA, the intermediate representation used by the decompiler: 1. Edit -> Tool Options -> Listing Fields -> Pcode Field -> Display Raw Pcode 2. Click the Jenga icon in the top right of the listing, enable the Pcode field in Instructions/Data tab pic.twitter.com/46EM19uRZPPrikaži ovu nit -
Static RPC exploration with
#Ghidra scripting /CC@_xpn_@tiraniddo@ghidraninja@GHIDRA_RE https://blog.sektor7.net/#!res/2019/RPC-parser.md …pic.twitter.com/a83helOMNS
-
Just released part 1 of analyzing
#WannaCry in#Ghidra! In this video we will find the killswitch, look at its installation/persistence methods and extract/decrypt the resources contained in the malware! https://youtu.be/Sv8yu12y5zM -
Thanks everyone so much for following me! Here's a Sunday two-fer for ya: One, a script that just gets decompiler C output https://gitlab.com/snippets/1905812 … and two, my slides from
#JailbreakSec https://gitlab.com/digital.polyglot/presentations/raw/84a718695d4cbff0d0720dacc14da20f34cbfc76/2019%20Jailbreak%20Sec%20Extending%20Ghidra.pdf?inline=false … (^ no inline URL! otherwise preview kills browser)#Ghidra -
Proof that
#Ghidra is written by devs like the rest of us: pic.twitter.com/IuqnPN6jGC
-
#Ghidra, A Powerful#Cybersecurity Tool By#NSA https://hackercombat.com/ghidra-a-powerful-cybersecurity-tool-by-nsa/ …@YuHelenYu@DrJDrooghaag@antgrasso@jblefevre60@dinisguarda@MikeQuindazzi@HeinzVHoenen@Ronald_vanLoon@SpirosMargaris@sallyeaves@kuriharan#Cyberattack#infosec#fintech#btc
#iot#AI -
In the next few days, a new paid version of
#GHIDRA will be released which includes the debugger, more GDT libs, and much more! -
Awesome
#wannacry reversing tutorials from@ghidraninja Part 1: https://www.youtube.com/watch?v=Sv8yu12y5zM … Part 2: https://www.youtube.com/watch?v=Q90uZS3taG0 …#reverseengineering#malware#ghidra -
The second part of my Ghidra tutorial series for reversing Windows binaries is up! We look at converting data, function call trees/graphs and the script manager. Along the way, we'll solve CrackMe binaries and a Flare-On 6 CTF challenge: https://www.shogunlab.com/blog/2019/12/22/here-be-dragons-ghidra-1.html …
#ghidra#reversingpic.twitter.com/gm2aePpf71
-
#Ghidra#GhidraChan is back!#8Kun ushers in the#Storm!#Deepstate ready for the storm surge?pic.twitter.com/befo7ziRGB
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.