Hackernews posts about Ghidra
Ghidra is a software reverse engineering suite of tools developed by the National Security Agency (NSA) to assist in analyzing and understanding malware and other complex software.
- Using Ghidra and Python to reverse engineer Ecco the Dolphin (32bits.substack.com)
- Ghidra 11.2.1 Released (github.com)
- Viewing macOS system libraries in Ghidra (www.scriptalert.one)
- Fixing an Elgato HD60 S HDMI capture device with the help of Ghidra (www.downtowndougbrown.com)
- NSA Ghidra software reverse engineering framework (github.com)
- Show HN: Ghidra Plays Mario (github.com)
- Debugger Ghidra Class (github.com)
- NSA Ghidra open-source reverse engineering framework (ghidra-sre.org)
- Ghidra 11.0 Released (github.com)
- Ghidra 10.3 has been released (github.com)
- Reverse Engineering an Omnivision Driver with Ghidra (serhack.me)
- Reviving an Analog Polysynth with an Arduino, Ghidra, and Python (blog.petersobot.com)
- GptHidra – A Ghidra Plugin (github.com)
- Reviving an Analog Polysynth with an Arduino, Ghidra, and Python (blog.petersobot.com)
- Fixing an Elgato HD60 S HDMI capture device with the help of Ghidra (www.downtowndougbrown.com)
- Reviving an Analog Polysynth with an Arduino, Ghidra, and Python (blog.petersobot.com)
- Ghidra, Pyhidra (Via Jpype), and Callgraphs Oh My (clearbluejar.github.io)
- Reviving an Analog Polysynth with an Arduino, Ghidra, and Python (blog.petersobot.com)
- Ghidriff: Ghidra Binary Diffing Engine (clearbluejar.github.io)
- Synchronizing Ida, Ghidra, and Binja with BinSync (github.com)
- Ghidra to the Rescue (neuviemeporte.github.io)
- NSA releases Ghidra version 10.3.3 (github.com)
- Reverse engineering Android: viszualizing executed code in Ghidra (datalocaltmp.github.io)
- Disassembling a Cortex-M raw binary file with Ghidra (blog.feabhas.com)
- Automating binary vulnerability discovery with Ghidra and Semgrep (2022) (security.humanativaspa.it)
- Ghidra in Minecraft (github.com)
- What's New in Ghidra 11.0 (htmlpreview.github.io)