Advertisement · 728 × 90
#
Hashtag
#Ghidra
Advertisement · 728 × 90
Preview
GitHub - mytechnotalent/G-Pulley: Ghidra processor module for Pulley — Wasmtime's portable bytecode interpreter ISA (v43.0.0). Disassembles and decompiles Pulley bytecode found in compiled WebAssembly... Ghidra processor module for Pulley — Wasmtime's portable bytecode interpreter ISA (v43.0.0). Disassembles and decompiles Pulley bytecode found in compiled WebAssembly modules (cwasm). - mytechn...

To the #Rust #Wasm community, I wrote a #Pulley #Ghidra plugin to help advance the usage and #ReverseEngineering of the work.

github.com/mytechnotale...

1 0 0 0
Preview
CVE-2026-4946: CWE-78 Improper neutralization of special elements used in an OS CVE-2026-4946 is an OS command injection vulnerability classified under CWE-78 that affects NSA's Ghidra software, a widely used reverse engineering framework. The vulnerability exists in versions prior to 12.0.3 due to improper neutralizat

NSA Ghidra <12.0.3 hit by HIGH severity OS command injection. Malicious binaries can execute code if analysts click crafted UI annotations. Upgrade to 12.0.3+ ASAP. Details: radar.offseq.com/threat/cve-2026-4946-cwe... #OffSeq #Ghidra #Vuln

0 0 0 0
I tried to bring a dead MMO back to life
I tried to bring a dead MMO back to life YouTube video by bearlikelion (Mark)

I tried to bring a dead MMO back to life
www.youtube.com/watch?v=PFal...

#Crowfall #gamedev #reverseengineering #ghidra #unity #indiegame #mmorpg #mmo #programming

8 3 0 0
Reviving the Legendary Puzzle Game Reviving the Legendary Puzzle Game

[JP] 20年前の伝説的パズル『Chromatron』をAIとGhidraで現代に復刻!
[EN] Reviving the Legendary Puzzle Game

ai-minor.com/blog/en/2026-03-09-17730...

#Ghidra #リバースエンジニアリング #レトロゲーム #AI #Tech

0 0 0 0
Reviving the Legendary Puzzle Game Reviving the Legendary Puzzle Game

[JP] 20年前の伝説的パズル『Chromatron』をAIとGhidraで現代に復刻!
[EN] Reviving the Legendary Puzzle Game

ai-minor.com/blog/en/2026-03-09-17730...

#Ghidra #リバースエンジニアリング #レトロゲーム #AI #Tech

1 0 0 0

#Ghidra 12.0.4 released, mostly with bugfixes:


github.com ->


Original->

0 0 0 0

I just realized that my cyclomatic complexity calculator breaks with PyGhidra so I pushed some fixes:


github.com ->

#Ghidra #ReverseEngineering


Original->

0 0 0 0
Original post on infosec.exchange

Lots of exciting work happening around the MISP project, we’ll reveal more once things are ready 👀

Meanwhile, a new MISP extension for Ghidra is under active development and steadily growing with awesome new features.

https://github.com/MISP/misp-ghidra

#ghidra #misp #cybersecurity […]

0 2 0 0
Post image

Reverse engineering the Dash learning robot Jonathan Diamond brushed up on Ghidra to add to the open source interface for a Dash robot found at a thrift shop. Much to their credit, the MakeWonder c...

#reverse #engineering #robotics #software #Ghidra #Make #Robot #Friend

Origin | Interest | Match

0 0 0 0
Preview
Reverse Engineering A Dash Robot With Ghidra One of the joys of browsing secondhand shops is the possibility of finding old, perhaps restorable or hackable, electronics at low prices. Admittedly, they usually seem to be old flat-screen TVs, cheap speakers, and Blu-ray players, but sometimes you find something like the Dash, an educational toy robot. When [Jonathan] came across one of these, he decided to use it as a turtle robot. However, he found the available Python libraries insufficient, and improving on them required some reverse-engineering. While [Jonathan] was rather impressed with the robot as it was – it had a good set of features, and thought had clearly been put into the design – he wanted a more open way to control it. There was already a quite useful, official Python program to control the robot over a BLE connection, but it only worked with Python 2 on OS X ([Jonathan] theorizes that it might have been written as a development tool, open-sourced, and not diligently supported afterwards). There were also a few third-party libraries ported to Python 3, but they all seemed to be missing some important features. All the newer libraries were limited because the official library passed commands to an OS X binary, which handled the actual communication, so anyone wanting to do everything in Python would have to reverse-engineer the communications protocol. [Jonathan] therefore used Ghidra to decompile the binary. He first found the JSON structure used for message data, followed by a function that reads command information and sets up packets, and a mapping between Python command names and command IDs. Once he found the section that creates packets from data, he was able to port the program to Python 3. Interestingly, examining the binary revealed some previously unknown commands that appear to be capable of defining autonomous behavior. We’ve previously seen Ghidra used on devices ranging from a camera to a router; if you’d like to learn more, there’s a HackadayU course on it.

Reverse Engineering a Dash Robot with Ghidra One of the joys of browsing secondhand shops is the possibility of finding old, perhaps restorable or hackable, electronics at low prices. Admittedly, t...

#Reverse #Engineering #Robots #Hacks #dash #educational #robot #Ghidra

Origin | Interest | Match

0 0 0 0
Preview
Reverse Engineering a Dash Robot with Ghidra One of the joys of browsing secondhand shops is the possibility of finding old, perhaps restorable or hackable, electronics at low prices. Admittedly, they usually seem to be old flat-screen …read more

Reverse Engineering a Dash Robot with Ghidra One of the joys of browsing secondhand shops is the possibility of finding old, perhaps restorable or hackable, electronics at low prices. Admittedly, t...

#Reverse #Engineering #Robots #Hacks #dash #educational #robot #Ghidra

Origin | Interest | Match

0 0 0 0

#Ghidra 12.0.3 released:


github.com ->

Looks like a fix to a cute little vulnerability too: it seems you could make users execute your commands via @execute annotations in Listings :)


Original->

0 0 0 0
Preview
Remove BROKEN and update to 12.0.2: · openbsd/ports@02b9da5 * In order to get the debugger/egdb working patch all uses of protobuf, jna and protobuf_java versions to use our ports built protobuf and jna. Also copy the Linux Pty implementation and patch ...

OpenBSD port for Ghidra (software reverse engineering framework) finally updated to the latest version 12.0.2 - Work by Kurt Miller kurt@ #OpenBSD #Ghidra github.com/openbsd/port...

0 0 0 0

The Ghidra reverse engineering tool/decompiler has returned to #OpenBSD ports!

Thanks to Kurt Miller (kurt@), #Ghidra 12.0.2 is now in -current!

marc.info?l=openbsd-po...

Ghidra was originally ported to OpenBSD back in 2019, but due to major changes upstream was removed in 2023.

4 2 0 0

The core feature is normalized function hashing to port annotations across different software versions. But how effective is it? Is this better than Ghidra's existing FunctionID or Binary Ninja's WARP? That's the key technical debate. #ghidra 2/4

0 0 1 0
AI×リバースエンジニアリング!110の武器を持つ「Ghidra MCP Server」が公開 Ghidraの強力な解析機能をAIエージェントから利用可能にするMCPサーバーが登場。110種類のツールを搭載し、バイナリ解析の自動化を劇的に加速させます。

[JP] AI×リバースエンジニアリング!110の武器を持つ「Ghidra MCP Server」が公開
[EN] AI Meets Reverse Engineering! Introducing the Ghidra MCP Server with 110 Tools

ai-minor.com/blog/ja/2026-02-04-17701...

#Ghidra #MCP #リバースエンジニアリング #AIエージェント #Tech

0 0 0 0
Preview
Amiga reverse engineering tools: IRA, MonAm, Ghidra, and the art of machine code Reverse engineering sounds intimidating until you actually sit down and do it. Then it starts to feel less like hacking and more like listening—listening to

#Amiga reverse engineering tools: #IRA, MonAm, #Ghidra, and the art of machine code www.generationamiga.com/2026/02/03/a...

2 1 0 0
Post image

Думал что дебаггер, а на деле HexEdit: Основы работы с опкодами и патчинга для начинающих Привет Хабр, и всем чит...

#реверс-инжиниринг #дебаггинг #hex-коды #reverse-engineering #опкоды #ассемблер #си #ghidra #байт-код #hex #редакор

Origin | Interest | Match

0 0 0 0
Post image

Думал что дебаггер, а на деле HexEdit: Основы работы с опкодами и патчинга для начинающих Привет Хабр, и всем чит...

#реверс-инжиниринг #дебаггинг #hex-коды #reverse-engineering #опкоды #ассемблер #си #ghidra #байт-код #hex #редакор

Origin | Interest | Match

0 0 0 0

Generated documentation for #Ghidra 12.0.2 now available at:


scrapco.de ->

(Note that the URLs changed recently so docs for both the latest version 11 and 12 are browsable)


Original->

1 0 0 0

#Ghidra 12.0.2 released

Change History:


github.com ->


Original->

0 0 0 0
Post image

Binary patching in ghidra in three easy steps:
1) Clear ghidra's idea of what the bytes are
2) Inspect the raw bytes and plan with what to overwrite
3) Overwrite e.g. with NOP and see ghidra eliminate an if-clause

#ctf #cybersecurity #ghidra #binaryreverseengineering #patch

0 0 0 0
Post image

Reverse engineering River Raid with Claude, Ghidra, and MCP This blog post was authored by Rafal Strzalinski. Can an AI agent navigate Ghidra, the NSA’s open-source reverse… The post Reverse en...

#Software #ai #claude #ghidra #mcp #prodsens #live

Origin | Interest | Match

0 0 0 0
Post image

Спасаем Бингус, и как я поправил ИИ помощника. Мануал для новичков Ещё одна очередная задачка! На этот раз на...

#реверс-инжиниринг #декодирование #reverse-engineering #reversing #ghidra #crackme #скриптинг #си

Origin | Interest | Match

0 0 0 0

Live now hunting the QuasarRAT malware! In the last stream we got their command and control taken down!

bsky.app/profile/cybe...

twitch.tv/cyberkaida

#malware #VTuber #Ghidra #ThreatIntel #QuasarRAT

3 1 0 0
Post image

Очередной CrackMe или Как я мучался с Ghidra. Мануал для новичков Думаю, новички в реверс-инжиниринге всегда хотел...

#Ghidra #Crackme #Static #Analysis #reverse-engineering #linux #decompilation #декомпиляция #реверс-инжиниринг #ассемблер #си

Origin | Interest | Match

0 0 0 0

#Ghidra 12.0.1 released, Change History:


github.com ->


Original->

0 0 0 0

Searching for more samples of this now on Twitch!

twitch.tv/cyberkaida

#Malware #Stealer #VTuber #Ghidra

1 0 0 0

Continuing this analysis! Let's look at the next stage GoLang payload and the GitHub staging.

twitch.tv/cyberkaida

#Ghidra #Malware #ReverseEngineering #VTuber

1 0 0 0

Demo video of moving types and symbols from #IDA to #Ghidra with REshare:


video.infosec.exchange ->

#ReverseEngineering


Original->

2 0 2 0