Rezultati pretraživanja
  1. 4. tra 2019.

    It's finally here - source code released! The repository now contains the source for the core framework, the decompiler, features, and extensions.

  2. 4. kol 2019.

    An Introduction To Code Analysis With

  3. 17. ožu 2019.

    Im releasing two scripts and my first blog post on SEGA Genesis ROM hacking with

  4. 1. tra 2019.

    The full source-code has finally been released!

  5. 2. velj

    Finally released part 2 of my »Reversing with « series! In this video we reverse engineer some of the integrated decryption methods and see how we can easily analyze C++ code in Ghidra.

  6. 26. ožu 2019.

    9.0.1 has been released with many bugfixes! Changelog: Download:

  7. The second post about parsing WebAssembly with ghidra is ready. I describe how to write loader, parse binary format and display it in human readable form.

  8. 26. ožu 2019.

    I created a script to parse windows x64 SEH directory and display it in comments just like in IDA. when I get more time ill clean the code and probably test more edge cases (not sure that all assumptions are 100% correct). but here it is:

  9. 17. svi 2019.

    finally, i have released code coverage visualizer plugin for

  10. 3. tra 2019.

    How to enable Pcode in , the intermediate representation used by the decompiler: 1. Edit -> Tool Options -> Listing Fields -> Pcode Field -> Display Raw Pcode 2. Click the Jenga icon in the top right of the listing, enable the Pcode field in Instructions/Data tab

    Prikaži ovu nit
  11. 21. stu 2019.

    My blogpost series on setting up a full development environment for is now available at They cover both writing scripts and extending Ghidra in Java including full debugging support without Eclipse.

  12. 3. lip 2019.
  13. 20. lis 2019.

    Thanks everyone so much for following me! Here's a Sunday two-fer for ya: One, a script that just gets decompiler C output and two, my slides from (^ no inline URL! otherwise preview kills browser)

  14. 6. kol 2019.
  15. 31. ožu 2019.

    In the next few days, a new paid version of will be released which includes the debugger, more GDT libs, and much more!

  16. 27. ožu 2019.

    Just released part 1 of analyzing in ! In this video we will find the killswitch, look at its installation/persistence methods and extract/decrypt the resources contained in the malware!

  17. 10. ožu 2019.

    Proof that is written by devs like the rest of us:

  18. Odgovor korisniku/ci

    is back! ushers in the ! ready for the storm surge?

  19. 21. ožu 2019.

    New version of released from . Looks like they bundled up and some other additions in this release. Happy hunting.

  20. prije 8 sati

    Reverse Engineering with Ghidra online course will start next week!!! We are so close! And you can still join the group, take your chance and dive into the world of Ghidra!

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.