Lots of exciting work happening around the MISP project, we’ll reveal more once things are ready πŸ‘€

Meanwhile, a new MISP extension for Ghidra is under active development and steadily growing with awesome new features.

https://github.com/MISP/misp-ghidra

#ghidra #misp #cybersecurity #threatintel #reversing

@misp
@circl

GitHub - MISP/misp-ghidra: Ghidra and MISP

Ghidra and MISP. Contribute to MISP/misp-ghidra development by creating an account on GitHub.

GitHub
@joseli yo conocΓ­a #ghidra, que es su herramienta de "reverse engineering". Hace poco vi unos vΓ­deos de cΓ³mo usarlo para modificar juegos, como en los viejos tiempos.
Reverse Engineering A Dash Robot With Ghidra

One of the joys of browsing secondhand shops is the possibility of finding old, perhaps restorable or hackable, electronics at low prices. Admittedly, they usually seem to be old flat-screen TVs, c…

Hackaday

@clathetic Yeah, all those #AI #TechBros are just #grifters...

  • Next thing they gonna sell us some #Skiddie in India or Parkistan fucking around with #Ghidra as "hands-on, multi-year experienced reverse-engineers" for "consultation on #Malware" in an "#Enterprise Plan".

    • Which admittedly wouldn't even be a straight-up lie unless they just get some random dropouts who don't even know what "BreachForums" is...

Seriously, #AIslop needs to be outlawed because it's worse for the envoirment than #Tetraethyllead, #Asbestos and #NuclearPower together!

#Ghidra 12.0.3 released:

https://github.com/NationalSecurityAgency/ghidra/blob/Ghidra_12.0.3_build/Ghidra/Configurations/Public_Release/src/global/docs/ChangeHistory.md

Looks like a fix to a cute little vulnerability too: it seems you could make users execute your commands via @execute annotations in Listings :)
OpenBSD port for Ghidra (software reverse engineering framework) finally updated to the latest version 12.0.2 - Work by Kurt Miller kurt@ #OpenBSD #Ghidra https://github.com/openbsd/ports/commit/02b9da50d1741d8bee62c11807ec0ea3f6f25231
Remove BROKEN and update to 12.0.2: Β· openbsd/ports@02b9da5

* In order to get the debugger/egdb working patch all uses of protobuf, jna and protobuf_java versions to use our ports built protobuf and jna. Also copy the Linux Pty implementation and patch ...

GitHub

Claude can code, but can it read machine code?

We gave AI agents access to Ghidra (a decompiler by the NSA) and tasked them with finding hidden backdoors in servers - working solely from binaries, without any access to source code.

See our BinaryAudit: https://quesma.com/blog/introducing-binaryaudit/

All tasks are open source - feel free to run them with other models or agents. We are open to contributions!

#NSA #Ghidra #ReverseEngineering #InfoSec #Radare2 #Claude #Gemini #AI #Benchmark

The Ghidra reverse engineering tool/decompiler has returned to #OpenBSD ports! β€‹

Thanks to Kurt Miller (kurt@), #Ghidra 12.0.2 is now in -current! β€‹

https://marc.info/?l=openbsd-ports-cvs&m=177069535911042&w=2

Ghidra was originally ported to OpenBSD back in 2019, but due to major changes upstream, updates stagnated until 2023, when it was disabled to avoid shipping an outdated package.

'CVS: cvs.openbsd.org: ports' - MARC

I'm not a Ghidra user but I do think it's awesome that Binary Ninja supports exporting to Ghidra.

#Ghidra #BinaryNinja