Rezultati pretraživanja
  1. prije 8 sati

    Reverse Engineering with Ghidra online course will start next week!!! We are so close! And you can still join the group, take your chance and dive into the world of Ghidra!

  2. prije 14 sati

    Blogs, social media, Reddit, and more! Reversing WannaCry Part 2 - Diving into the malware with - YouTube

  3. 6. velj
  4. 5. velj

    keeps freezing up on me after about 10 minutes and I don't understand why and can't find any answers. The file browser is also really really really slow. It's driving me crazy because I much prefer Ghidra over for what I am doing.

  5. 5. velj

    We are hosting our with workshop - room is ready, cheatsheet is ready. This will be a great community event.

  6. 4. velj

    Reversing WannaCry Part 2 - Diving deeper into the malware with

  7. 4. velj

    Did you enjoy our / string decryption tutorial ... But you wish we had used instead of 🧐 Check out this awesome tutorial from 🙌

  8. 4. velj
  9. 4. velj

    Hakin9: Volatile_Life binitamshah ghidraninja Volatile_Life thank you! We are so happy to have this chance and work with you on this amazing course! is such a powerful tool, with great potential! And having such a skilled instructor, we are confident that all stude…

  10. 4. velj

    Hakin9: RT Volatile_Life: I'm creating a very detailed course on Reverse Engineering with on Hakin9. If you would like to learn about RE and want to get started with learning Malware Analysis, make sure to check it out. cc: binitamshah ghidranin…

  11. 4. velj

    Yet another source project released by the VDOO team!

  12. 3. velj
  13. 3. velj

    Okay random question which may be a matter of me not knowing enough of PE calling conventions. I have a function that seems to be "void foo(char*)" But somehow, the char* is discarded quickly. Instead a new stack variable is never initialized, but used. Second arg?

  14. 3. velj

    👍 on : Reversing WannaCry Part 2 - Diving into the malware with

  15. 3. velj

    Reversing WannaCry Part 2 - Diving into the malware with via

  16. 3. velj

    thank you! We are so happy to have this chance and work with you on this amazing course! is such a powerful tool, with great potential! And having such a skilled instructor, we are confident that all students will gain new skills about RE and Ghidra!

  17. 3. velj

    I'm creating a very detailed course on Reverse Engineering with on . If you would like to learn about RE and want to get started with learning Malware Analysis, make sure to check it out. cc:

  18. 3. velj

    We just released KotlinScriptProvider, an extension that allows running Kotlin scripts in Ghidra.

  19. 3. velj

    I played with lately and it's niiice! I especially like the decompiler view but that's because I never tried Hex-Rays.. Next step: learn how to create new function IDs for lib recognition.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.