-
I just released a short introductory/quickstart tutorial for
#Ghidra: Solving a simple crackme. https://www.youtube.com/watch?v=fTGTnrgjuGA … -
Blogs, social media, Reddit, and more! https://www.hackerpom.com/feed Reversing WannaCry Part 2 - Diving into the malware with
#Ghidra - YouTube https://www.youtube.com/watch?v=Q90uZS3taG0 …#TTPs#osint -
Reversing WannaCry Part 2 - Diving deeper into the malware with
#Ghidra https://www.youtube.com/watch?v=Q90uZS3taG0&feature=youtu.be … -
Awesome
#wannacry reversing tutorials from@ghidraninja Part 1: https://www.youtube.com/watch?v=Sv8yu12y5zM … Part 2: https://www.youtube.com/watch?v=Q90uZS3taG0 …#reverseengineering#malware#ghidra -
Finally released part 2 of my »Reversing
#WannaCry with#Ghidra« series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra. https://www.youtube.com/watch?v=Q90uZS3taG0 … -
My solution for MugatuWare from Flare-On 2019 is out
https://youtu.be/xVBQHVQrmCE With a special thank you to @megabeets_#flareon#reversing#reverseengineering#mugatu#ghidra#x32dbg -
So
@gynvael has just finished streaming 7th installment of solving PicoCTF challenges and I've finished editing part 2 of solving Hitcon's CoreDumb with Ghidra so if you don't have yet enough
https://youtu.be/fPGcoo9d4kA #ghidra#reversing#hitcon#reversengineering -
It was supposed to be just a solution but it ended up being a step by step tutorial so here's "Hitchhiker's guide to Ghidra - Solving Hitcon Core Dumb - Part 1" (uff that's long title) https://youtu.be/x5Eu2CDWfz4
#ghidra#hitcon#reversing#reverseengineering -
What's your RE tool of choice:
#IDA,#BinaryNinja,#Ghidra?
Discover why Three Heads are Better Than One - https://vimeo.com/335158460
Then master reversing with Ghidra at #Ringzer0 with@0xJeremy &@jensensec. Don't forget your Early Bird ticket
http://bit.ly/ringzero-ghidra pic.twitter.com/P86pip4z0T
-
Folks, here's why you should follow
@lazybinding: 18 years (!) on#Ghidra,@BlackHatEvents speaker, amazing forward and reverse engineer, superb instructor. Check out his#BlackHat talk: https://youtu.be/kx2xp7IQNSc pic.twitter.com/xhE4ieQrc1
-
Our talk from
#r2con2019 has just been uploaded!
Earlier this month we gave this talk in which we presented Cutter and introduced our native integration with the #Ghidra Decompiler. Enjoy watching!
https://www.youtube.com/watch?v=eHtMiezr7l8 …
CC @megabeets_,@xarkes_,@thestr4ng3r,@radareorg -
cool @GHIDRA_RE feature I missed so far: If you aren't able to see which sub-window gets focused, after hitting a button -#Ghidra happily helps you if you hit the button again ... and again ... and again ... and again pic.twitter.com/KwEPJNkpg7Prikaži ovu nit -
Excited to share my first video on malware analysis topics. The
#Ghidra hype is real, so let's get started there: https://youtu.be/QLnqwAf7Ldo -
The RSA
#Ghidra talk by@RGB_Lights has been uploaded to YouTube:https://www.youtube.com/watch?v=r3N13ig8H7s …Prikaži ovu nit -
The Infiltrate workshop on
#Ghidra given by@0xAlexei & Jeremy Blackthrone is out!https://vimeo.com/335158460 -
In
#GHIDRA, simply enabling the pcode field is enough to display the Pcode, checking "Raw Pcode" displays a more verbose version of it. H/T to@0xAlexei for pointing this out to me yesterday. Thanks, dude!pic.twitter.com/ZYSLae8VorPrikaži ovu nit -
How to enable Pcode in
#GHIDRA, the intermediate representation used by the decompiler: 1. Edit -> Tool Options -> Listing Fields -> Pcode Field -> Display Raw Pcode 2. Click the Jenga icon in the top right of the listing, enable the Pcode field in Instructions/Data tab pic.twitter.com/46EM19uRZPPrikaži ovu nit -
GhidraでWannaCryランサムウェア解析 https://m.youtube.com/watch?v=Sv8yu12y5zM …
#マルウェア解析#Ghidra -
Just released part 1 of analyzing
#WannaCry in#Ghidra! In this video we will find the killswitch, look at its installation/persistence methods and extract/decrypt the resources contained in the malware! https://youtu.be/Sv8yu12y5zM -
Discovered this gem in
#ghidra yesterday, what a great use of old PowerPoint-style animations
@GHIDRA_RE Even better with the graph view.pic.twitter.com/IOiNTIvSjI
Čini se da učitavanje traje već neko vrijeme.
Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.