#EverydayGhidra virtual course with
@_ringzer0
just wrapped up! 😅 Huge shoutout to my stellar students 🤓 who crushed a jam-packed CTF. Next stop: Austin, TX for my in-person #PatchDiffingInTheDark course next week. See you at #Bootstrap25 Conference next weekend! 🤠🎯

🚀 Taking a quick dive into Ghidra 11.2’s stack-based string handling! 🛠️

Check out the improvements from version 11.1.2 to the new release. Stack strings have been a long time coming, but Ghidra is ever improving! 👏 #Ghidra #ReverseEngineering #everydayghidra

Everyday Ghidra: Symbols — Automatic Symbol Acquisition with Ghidra — Part 2

This post, another lesson from the “Everyday Ghidra” series, walks through the process of configuring Ghidra to automatically download symbols from well known public symbol servers for several types…

Medium

Symbols breathe life into reverse engineering and bring hope to the reverse engineer. 🙃

https://medium.com/@clearbluejar/everyday-ghidra-symbols-prescription-lenses-for-reverse-engineers-part-1-d3efe9279a0b 👀

#everydayghidra #ghidra

Everyday Ghidra: Symbols — Prescription Lenses for Reverse Engineers — Part 1

In reverse engineering a closed-source binary using Ghidra or other software reverse engineering frameworks, a key objective is to retrieve information that clarifies the disassembled code. This…

Medium