Hackernews posts about Ghidra
Ghidra is a software reverse engineering suite of tools developed by the National Security Agency (NSA) to assist in analyzing and understanding malware and other complex software.
- Fixing an Elgato HD60 S HDMI capture device with the help of Ghidra (www.downtowndougbrown.com)
- Fixing an Elgato HD60 S HDMI capture device with the help of Ghidra (www.downtowndougbrown.com)
- NSA Ghidra software reverse engineering framework (github.com)
- Show HN: Ghidra Plays Mario (github.com)
- Debugger Ghidra Class (github.com)
- NSA Ghidra open-source reverse engineering framework (ghidra-sre.org)
- Ghidra: Software reverse engineering suite developed by NSA (ghidra-sre.org)
- Ghidra 11.0 Released (github.com)
- Ghidra 10.3 has been released (github.com)
- Ghidra 10.2 (github.com)
- Reverse Engineering an Omnivision Driver with Ghidra (serhack.me)
- Reviving an Analog Polysynth with an Arduino, Ghidra, and Python (blog.petersobot.com)
- GptHidra – A Ghidra Plugin (github.com)
- Reviving an Analog Polysynth with an Arduino, Ghidra, and Python (blog.petersobot.com)
- Reviving an Analog Polysynth with an Arduino, Ghidra, and Python (blog.petersobot.com)
- Ghidra, Pyhidra (Via Jpype), and Callgraphs Oh My (clearbluejar.github.io)
- Reviving an Analog Polysynth with an Arduino, Ghidra, and Python (blog.petersobot.com)
- Ghidriff: Ghidra Binary Diffing Engine (clearbluejar.github.io)
- Synchronizing Ida, Ghidra, and Binja with BinSync (github.com)
- Ghidra to the Rescue (neuviemeporte.github.io)
- NSA releases Ghidra version 10.3.3 (github.com)
- Reverse engineering Android: viszualizing executed code in Ghidra (datalocaltmp.github.io)
- Disassembling a Cortex-M raw binary file with Ghidra (blog.feabhas.com)
- Ghidra in Minecraft (github.com)
- What's New in Ghidra 11.0 (htmlpreview.github.io)
- PCode2C: Steps Towards Translation Validation with Ghidra and CBMC (www.philipzucker.com)
- Introduction to Reverse Engineering with Ghidra (wrongbaud.github.io)