Hackernews posts about Ghidra
Ghidra is a software reverse engineering suite of tools developed by the National Security Agency (NSA) to assist in analyzing and understanding malware and other complex software.
- Reverse Engineering a DOS Game with Ghidra and Codex (alexbevi.com)
- Reverse Engineering with AI IDEs (Ghidra-No-MCP) (github.com)
- Fixing an Elgato HD60 S HDMI capture device with the help of Ghidra (www.downtowndougbrown.com)
- Using Ghidra and Python to reverse engineer Ecco the Dolphin (32bits.substack.com)
- Ghidra by NSA (github.com)
- MCP server for Ghidra (github.com)
- NSA Ghidra open-source reverse engineering framework (ghidra-sre.org)
- A better Ghidra MCP server – GhidrAssistMCP (github.com)
- GhidraMCP: Now AI can reverse malware [video] (www.youtube.com)
- Reverse Engineering keyboard firmware with Ghidra (blog.usedbytes.com)
- Using Ghidra to patch my keyboard's firmware (packet.delivery)
- AI-Assisted Binary Reverse Engineering with Ghidra (github.com)
- Using Ghidra to correct the record on a 24 year old PlayStation game (32bits.substack.com)
- Ghidra 11.2.1 Released (github.com)
- Fixing an Elgato HD60 S HDMI capture device with the help of Ghidra (www.downtowndougbrown.com)
- GhidrAssist – AI assisted reverse engineering (github.com)
- Ghidra 11.3 has been released (github.com)
- Ghidra to the Rescue (neuviemeporte.github.io)
- AI-Assisted Reverse Engineering with Ghidra (github.com)
- AI-Assisted Reverse Engineering with Ghidra (github.com)
- A new graph viewer for Ghidra (twitter.com)
- "Verified" "Compilation" of "Python" with Knuckledragger, GCC, and Ghidra (www.philipzucker.com)
- Nvidia/Mellanox ConnectX-5: Making a Custom Ghidra Processor Module for iRISC (irisc-research-syndicate.github.io)