Hacker News
- NSA Ghidra open-source reverse engineering framework https://ghidra-sre.org/ 61 comments
- Ghidra: Software reverse engineering suite developed by NSA https://ghidra-sre.org 42 comments
- Ghidra: A software reverse engineering suite of tools developed by the NSA https://ghidra-sre.org/ 142 comments
Lobsters
- Ghidra - A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate https://ghidra-sre.org/ 16 comments release , reversing
- What’s the difference between dynamic and static analysis http://ghidra-sre.org 2 comments reverseengineering
- Which one is better for fever engineering I’m completely new but have coding experience with C++ http://ghidra-sre.org 9 comments reverseengineering
- Ghidra 9.2.4 and 10.0 beta releases https://ghidra-sre.org/ 5 comments reverseengineering
- Ghidra Public Release https://ghidra-sre.org 91 comments netsec
Linking pages
- How I cut GTA Online loading times by 70% https://nee.lv/2021/02/28/How-I-cut-GTA-Online-loading-times-by-70/ 2156 comments
- Reversing UK mobile rail tickets https://eta.st/2023/01/31/rail-tickets.html 250 comments
- Legalizing Gay Marriage in Crusader Kings III with Ghidra | by Waffle Ironer | Medium https://waffleironer.medium.com/legalizing-gay-marriage-in-crusader-kings-iii-with-ghidra-2602e6aa8689 212 comments
- Reverse engineering software licensing from early-2000s abandonware â Part 1 https://yingtongli.me/blog/2021/08/29/drm5-1.html 193 comments
- Full disclosure: 0day vulnerability (backdoor) in firmware for Xiaongmai-based DVRs, NVRs and IP cameras / Habr https://habr.com/en/post/486856/ 155 comments
- Under the microscope: Ecco the Dolphin — Defender of the Future https://32bits.substack.com/p/under-the-microscope-ecco-the-dolphin 135 comments
- Hacking Reolink cameras for fun and profit • &> /dev/null https://www.thirtythreeforty.net/posts/2020/05/hacking-reolink-cameras-for-fun-and-profit/ 123 comments
- GitHub - analysis-tools-dev/static-analysis: ⚙️ A curated list of static analysis (SAST) tools and linters for all programming languages, config files, build tools, and more. The focus is on tools which improve code quality. https://github.com/analysis-tools-dev/static-analysis 112 comments
- I made a NES emulator in Rust using generators | ~kylewlacy https://kyle.space/posts/i-made-a-nes-emulator/ 108 comments
- Should We Chat, Too? Security Analysis of WeChat’s MMTLS Encryption Protocol - The Citizen Lab https://citizenlab.ca/2024/10/should-we-chat-too-security-analysis-of-wechats-mmtls-encryption-protocol/ 92 comments
- Compromising Garmin's Sport Watches: A Deep Dive into GarminOS and its MonkeyC Virtual Machine - Anvil Secure https://www.anvilsecure.com/blog/compromising-garmins-sport-watches-a-deep-dive-into-garminos-and-its-monkeyc-virtual-machine.html 88 comments
- GitHub - ChrisMiuchiz/Plasma-Writeup: Restoring Picroma Plasma Without Patching it and Reverse Engineering an Unknown Instruction Set https://github.com/ChrisMiuchiz/Plasma-Writeup 86 comments
- Hacking Super Monkey Ball Part 2 – Decompilation with Ghidra – Smoking on a Bike https://www.smokingonabike.com/2021/02/28/hacking-super-monkey-ball-part-2-decompilation-with-ghidra/ 69 comments
- Emulating an iPod Touch 1G and iPhoneOS 1.0 using QEMU (Part I) | Martijn de Vos https://devos50.github.io/blog/2022/ipod-touch-qemu/ 62 comments
- GitHub - gorisanson/pikachu-volleyball: Pikachu Volleyball implemented into JavaScript by reverse engineering the original game https://github.com/gorisanson/pikachu-volleyball 61 comments
- GitHub - hikari-no-yume/touchHLE: High-level emulator for iPhone OS apps. This repo is used for issues, releases and CI. Submit patches at: https://review.gerrithub.io/q/project:hikari-no-yume/touchHLE+status:open https://github.com/hikari-no-yume/touchHLE 60 comments
- Local license key verification - Theory https://matradomski.com/posts/local_license_key_verification_theory/ 57 comments
- The right thing for the wrong reasons: FLOSS doesn't imply security https://seirdy.one/2022/02/02/floss-security.html 54 comments
- G-3PO: A Protocol Droid for Ghidra | by Olivia Lucca Fraser | Tenable TechBlog | Medium https://medium.com/tenable-techblog/g-3po-a-protocol-droid-for-ghidra-4b46fa72f1ff 52 comments
- Patching an Embedded OS from 1996 with Ghidra http://blog.petersobot.com/patching-the-k2500 42 comments
Would you like to stay up to date with C & C++? Checkout C & C++
Weekly.