-
Reverse Engineering with Ghidra online course will start next week!!! We are so close! And you can still join the group, take your chance and dive into the world of Ghidra! https://hakin9.org/product/reverse-engineering-with-ghidra-w50/ …
#infosec#hacking#hackers#Pentesting#programming#pentest#opensource#Ghidra -
Blogs, social media, Reddit, and more! https://www.hackerpom.com/feed Reversing WannaCry Part 2 - Diving into the malware with
#Ghidra - YouTube https://www.youtube.com/watch?v=Q90uZS3taG0 …#TTPs#osint -
I just posted "Reversing WannaCry Part 2 - Diving into the malware with
#Ghidra" on Reddit https://www.reddit.com/r/CyberSpaceVN/comments/ezpp67/reversing_wannacry_part_2_diving_into_the_malware/?utm_content=post&utm_medium=twitter&utm_source=share&utm_name=submit&utm_term=t3_ezpp67 … -
http://anonymous.bravehost.com/main/2020/02/05/reversing-wannacry-part-2-diving-deeper-into-the-malware-with-ghidra/ … Reversing WannaCry Part 2 - Diving deeper into the malware with
#Ghidra -
@GHIDRA_RE#Ghidra keeps freezing up on me after about 10 minutes and I don't understand why and can't find any answers. The file browser is also really really really slow. It's driving me crazy because I much prefer Ghidra over#IDAPro for what I am doing. -
We are hosting our
#malwareanalysis with#ghidra workshop@DCSO_de - room is ready, cheatsheet is ready. This will be a great community event.pic.twitter.com/UikVXJ2aWC
-
Reversing WannaCry Part 2 - Diving deeper into the malware with
#Ghidra https://www.youtube.com/watch?v=Q90uZS3taG0&feature=youtu.be … -
Did you enjoy our
#REvil /#Sodinokibi string decryption tutorial ... But you wish we had used#Ghidra instead of#IDAPro
Check out this awesome tutorial from @larsborn
https://blag.nullteilerfrei.de/2020/02/02/defeating-sodinokibi-revil-string-obfuscation-in-ghidra/ … -
Awesome
#wannacry reversing tutorials from@ghidraninja Part 1: https://www.youtube.com/watch?v=Sv8yu12y5zM … Part 2: https://www.youtube.com/watch?v=Q90uZS3taG0 …#reverseengineering#malware#ghidra -
Hakin9: Volatile_Life binitamshah ghidraninja Volatile_Life thank you! We are so happy to have this chance and work with you on this amazing course!
#Ghidra is such a powerful tool, with great potential! And having such a skilled instructor, we are confident that all stude… -
Hakin9: RT Volatile_Life: I'm creating a very detailed course on Reverse Engineering with
#Ghidra on Hakin9. If you would like to learn about RE and want to get started with learning Malware Analysis, make sure to check it out. https://hakin9.org/course/reverse-engineering-with-ghidra-w50/ … cc: binitamshah ghidranin… -
Yet another
#opensource source project released by the VDOO team!#ghidra#kotlinhttps://twitter.com/tmr232/status/1224277597309362176 … -
Okay random
#ghidra question which may be a matter of me not knowing enough of PE calling conventions. I have a function that seems to be "void foo(char*)" But somehow, the char* is discarded quickly. Instead a new stack variable is never initialized, but used. Second arg? -
on @YouTube: Reversing WannaCry Part 2 - Diving into the malware with#Ghidra https://youtu.be/Q90uZS3taG0 -
Reversing WannaCry Part 2 - Diving into the malware with
#Ghidra https://youtu.be/Q90uZS3taG0 via@YouTube -
@Volatile_Life thank you! We are so happy to have this chance and work with you on this amazing course!#Ghidra is such a powerful tool, with great potential! And having such a skilled instructor, we are confident that all students will gain new skills about RE and Ghidra! -
I'm creating a very detailed course on Reverse Engineering with
#Ghidra on@Hakin9. If you would like to learn about RE and want to get started with learning Malware Analysis, make sure to check it out. https://hakin9.org/course/reverse-engineering-with-ghidra-w50/ … cc:@binitamshah@ghidraninja -
We
@VDOOSecurity just released KotlinScriptProvider, an extension that allows running Kotlin scripts in Ghidra. https://github.com/VDOO-Connected-Trust/KotlinScriptProvider …#ghidra#kotlin -
I played with
#Ghidra lately and it's niiice! I especially like the decompiler view but that's because I never tried Hex-Rays.. Next step: learn how to create new function IDs for lib recognition. pic.twitter.com/OrgzM5X9io
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.