Search results for #ghidra
Understanding and Improving The Ghidra UI for Malware Analysis embee-research.ghost.io/understanding-… #malware #análisis #Ghidra #tool
Now imagine if you were a cybersecurity engineer and had to use #Ghidra to reverse engineer and look at the assembly code. You wouldn’t be finding JavaScript that bad, so cheer up mate.
Now imagine if you were a cybersecurity engineer and had to use #Ghidra to reverse engineer and look at the assembly code. You wouldn’t be finding JavaScript that bad, so cheer up mate.
Decompiler Explorer takes a binary and shows decompiler output from popular tools such as #idapro, #binaryninja, and #ghidra: dogbolt.org Helps compare output from popular #reversing tools!
@2stage_Link 合計何バイトなんだろう?16進数かなとか思った。 #Ghidra #Ghidraで解析か
The 3rd part of our Ghidra scripting tutorial is out now! This time, I talked about how to create a call graph using Ghidra. Check it out! youtu.be/QKXBeU0QhPk #Ghidra #Scripting
Getting started with Ghidra debugger (Official Ghidra documentation): github.com/NationalSecuri… #ghidra #reverseengineering
[New Blog Post] DWARF Verification via Ghidra and CBMC #ghidra #verification #binaryanalysis #compiler philipzucker.com/pcode2c-dwarf/
Advanced Static Analysis. Check it out! tryhackme.com/r/room/advance… #Cybersecurity #InfoSec #Malware #tryhackme #StaticAnalysis #Ghidra via @RealTryHackMe
Prochain MontreHack sur l'internet des objets! Rendez-vous au Nordelec à Montréal ou de n'importe où dans le monde sur Twitch et Discord :) Next event is on IoT, join us in person in Montreal or online. Date: April 17, 6-9 Details: montrehack.ca/2024/04/17/csg… #IoT #ghidra #decompile
🎉 Ghidra 11.0.3 has been released 1 hour ago with some minor fixes! 😋 👉 Ghidra: github.com/NationalSecuri… 👉 Change History: htmlpreview.github.io/?https://githu… 👉 Installation guide: htmlpreview.github.io/?https://githu… 🔥 I hope you enjoy this new version :) #ghidra #malware #reverseengineering
🔐 365 days of CTF @RealTryHackMe 🔐 {Day 12}: Compiled ⚙️ Difficulty: Easy Tags: #reverseengineering #strings #ghidra
You've just finished installing #ghidra, what is the first thing you do?
embeeresearch.io/ghidra-basics-… Useful guide when dealing with encrypted strings. #ghidra #reverseengineering #malware
Useful blog post for beginners approaching ghidra for the first time by @byte_how byte.how/posts/what-are… #ghidra #cybersecurity
Compiled. Check it out! tryhackme.com/r/room/compiled #binary #strings #tryhackme #ReverseEngineering #ghidra via @RealTryHackMe
🚨 Learning reverse engineering often starts with being able to identify the basics. In this video, we'll explore how to identify loops in the disassembler and decompiler using #ghidra 🐉 youtu.be/Y2qd0m4_4ZM
Only few spots left to grab this discount! The course has over 45 hands-on labs that guide you how to analyze #malware. Course covers using #IDA and #Ghidra, so it will be up to you to decide which tool to use and not us. More labs are being added too!! #DFIR #Cybersecurity #C5W
“#OpenSourceSofware - what, how and why?” - @radomirpolach at @InstallFest_SH #InstallFest2024 Heh - @Ghidra_Server made by #NSA (#NationalSecurityAgency). Learn more: ghidra-sre.org #OpenSource #Linux #FLOSS #FOSS #Ghidra #SoftwareReverseEngineering #SRE