Rezultati pretraživanja
  1. prije 9 sati

    I'm creating a very detailed course on Reverse Engineering with on . If you would like to learn about RE and want to get started with learning Malware Analysis, make sure to check it out. cc:

  2. 27. sij

    To kick off 2019, we launched a free powerful reverse-engineering framework . It gives users a way to improve cybersecurity and provides a set of capabilities that would otherwise be unavailable to many in the community. *reposted to fix inaccuracy of release date*

  3. 2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

  4. prije 13 sati

    We just released KotlinScriptProvider, an extension that allows running Kotlin scripts in Ghidra.

  5. prije 4 sata
  6. prije 4 sata

    Okay random question which may be a matter of me not knowing enough of PE calling conventions. I have a function that seems to be "void foo(char*)" But somehow, the char* is discarded quickly. Instead a new stack variable is never initialized, but used. Second arg?

  7. prije 6 sati

    👍 on : Reversing WannaCry Part 2 - Diving into the malware with

  8. prije 9 sati

    thank you! We are so happy to have this chance and work with you on this amazing course! is such a powerful tool, with great potential! And having such a skilled instructor, we are confident that all students will gain new skills about RE and Ghidra!

  9. prije 14 sati

    I played with lately and it's niiice! I especially like the decompiler view but that's because I never tried Hex-Rays.. Next step: learn how to create new function IDs for lib recognition.

  10. prije 16 sati

    pro tip : you can force pointer size when you choose a custom data type i.e. "my_struct_t *32" in a 64bit project. 🤘

  11. 1. velj
    Odgovor korisniku/ci

    pretty sure freenode has

  12. 1. velj

    : find me before 5:20 and say “Arrr, show me your booty” and you get a sticker, prize, and overly enthusiastic talk 😆 about

  13. 1. velj
    Odgovor korisniku/ci
  14. 1. velj

    http://192.168.4.1:8080 mini more hints coming 😄

  15. 1. velj

    My solution for MugatuWare from Flare-On 2019 is out 📺 👉 With a special thank you to

  16. 1. velj

    mini activated! Come find the WAP and win a prize!

  17. IBM Developer Podcast Series: A conversation with The National Security Agency's community outreach team about open source software, learning new skills, and sharing tech origin stories

  18. 30. sij

    These are, in no uncertain terms, hotter than hell. Well done team! ⁦

  19. 28. sij

    if you want a humbling experience, try to write python scripts in the Ghidra Script Manager. Let's see if you accidentally forget to decrement i in a loop more than once.

  20. 28. sij

    Started using it. Made sure to leave a note on the desktop reminding the that this is now a shared computing space and they should not hog all my resources ;) In seriousness though, awesome tool.

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.