Our @hackaday #ghidra course hit over 50k views on YouTube. I'm glad that folks are still finding the materials useful. I'm slowly (but surely!) mapping out new materials https://www.youtube.com/watch?v=d4Pgi5XML8E Course resources can be found here: https://hackaday.io/course/172292-introduction-to-reverse-engineering-with-ghidra https://twitter.com/wrongbaud/status/1383066008072622084
Ghidra 9.2.3 is out and works with BinExport. https://github.com/google/binexport/releases/tag/v12-20210416-rc3 #BinDiff #Ghidra @GHIDRA_RE https://twitter.com/AdmVonSchneider/status/1383052868794642435
#Ghidra 9.2.1 has been released! Visit https://ghidra-sre.org/ to download a copy. https://twitter.com/NSACyber/status/1341022818021093379
Today our #Ghidra team pushed a preview debugger on @GitHub. #Developers and testers, check out this long awaited feature: https://github.com/NationalSecurityAgency/ghidra/tree/debugger https://twitter.com/NSACyber/status/1339652646513291264
🧰 A new tool released! #Ghidra users can now enjoy the same (and more!) benefits available in IDA Pro from #VirusTotal's VTGrep plugin with this open-source plugin from #SentinelLabs. By @kasifdekel https://labs.sentinelone.com/introducing-sentinelones-ghidra-plugin-for-virustotal/ #infosec #Ghidra #opensource @virustotal #VTGrep https://twitter.com/SentinelOne/status/1338545021704781824
#VTGrep #opensource #infosec #SentinelLabs #VirusTotal #Ghidra
RT @NSAGov@twitter.com
#Ghidra 9.2 has been released!
This version has improvements to analysis, the user interface, new open source based graphing, decompiler quality enhancements, and more!
To try out these new capabilities, head over to http://Ghidra-sre.org