Rezultati pretraživanja
  1. 4. kol 2019.

    An Introduction To Code Analysis With

  2. 4. tra 2019.

    It's finally here - source code released! The repository now contains the source for the core framework, the decompiler, features, and extensions.

  3. 17. ožu 2019.

    Im releasing two scripts and my first blog post on SEGA Genesis ROM hacking with

  4. 2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

  5. 1. tra 2019.

    The full source-code has finally been released!

  6. The second post about parsing WebAssembly with ghidra is ready. I describe how to write loader, parse binary format and display it in human readable form.

  7. 26. ožu 2019.

    I created a script to parse windows x64 SEH directory and display it in comments just like in IDA. when I get more time ill clean the code and probably test more edge cases (not sure that all assumptions are 100% correct). but here it is:

  8. 26. ožu 2019.

    9.0.1 has been released with many bugfixes! Changelog: Download:

  9. 17. svi 2019.

    finally, i have released code coverage visualizer plugin for

  10. 21. stu 2019.

    My blogpost series on setting up a full development environment for is now available at They cover both writing scripts and extending Ghidra in Java including full debugging support without Eclipse.

  11. 3. tra 2019.

    How to enable Pcode in , the intermediate representation used by the decompiler: 1. Edit -> Tool Options -> Listing Fields -> Pcode Field -> Display Raw Pcode 2. Click the Jenga icon in the top right of the listing, enable the Pcode field in Instructions/Data tab

    Prikaži ovu nit
  12. 6. kol 2019.
  13. 27. ožu 2019.

    Just released part 1 of analyzing in ! In this video we will find the killswitch, look at its installation/persistence methods and extract/decrypt the resources contained in the malware!

  14. 20. lis 2019.

    Thanks everyone so much for following me! Here's a Sunday two-fer for ya: One, a script that just gets decompiler C output and two, my slides from (^ no inline URL! otherwise preview kills browser)

  15. 10. ožu 2019.

    Proof that is written by devs like the rest of us:

  16. 3. lip 2019.
  17. 31. ožu 2019.

    In the next few days, a new paid version of will be released which includes the debugger, more GDT libs, and much more!

  18. 4. velj
  19. 22. pro 2019.

    The second part of my Ghidra tutorial series for reversing Windows binaries is up! We look at converting data, function call trees/graphs and the script manager. Along the way, we'll solve CrackMe binaries and a Flare-On 6 CTF challenge:

  20. Odgovor korisniku/ci

    is back! ushers in the ! ready for the storm surge?

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.