Главная
Study mode:
on
You
History
Saved
In progress
0 courses
compleat
0 courses
#Art & Design
#Adobe
#ChatGPT
#GitHub
#Ghidra
Showing:
26
courses
Sort by Relevancy
Highest rated
Lowest rated
Most recently added
Reverse Engineering Tutorials
0
rewiews
Explore Android app reverse engineering techniques, from decompilation to vulnerability detection, using tools like GHIDRA for software analysis and security testing.
Add to list
6
Lesons
1 hour 30 minutes
On-Demand
Free-Video
Current Malware Analysis
0
rewiews
Comprehensive malware analysis techniques covering tools, unpacking methods, and real-world examples for cybersecurity professionals and enthusiasts.
Add to list
17
Lesons
4 hours 30 minutes
On-Demand
Free-Video
Reverse Engineering and Malware Analysis
0
rewiews
Learn essential reverse engineering and malware analysis skills using Ghidra, including crackme challenges, WannaCry analysis, and malware detection with Sysinternals Process Explorer.
Add to list
7
Lesons
1 hour 30 minutes
On-Demand
Free-Video
HackerSploit
Malware Analysis With Ghidra - Stuxnet Analysis
0
rewiews
Explore Ghidra's features for malware analysis through a hands-on examination of Stuxnet, demonstrating reverse engineering techniques and tool capabilities.
Add to list
8
Lesons
31 minutes
On-Demand
Free-Video
Robert Feranec
Hacking Hardware - Samy Kamkar
0
rewiews
Explore hardware hacking techniques, from credit card manipulation to wireless keyboard emulation, with insights on cryptography, fault injection, and firmware reverse engineering tools.
Add to list
14
Lesons
1 hour 1 minute
On-Demand
Free-Video
Colin O'Flynn
Ghidra Setup and Intro
0
rewiews
Learn to set up and use Ghidra, a powerful reverse engineering tool. Explore file import, code browsing, decompilation, and memory mapping through hands-on examples.
Add to list
8
Lesons
30 minutes
On-Demand
Free-Video
Hackaday
Reverse Engineering with Ghidra
0
rewiews
Explore software reverse engineering fundamentals, x86_64 architecture, and Ghidra basics in this comprehensive introduction to analyzing and understanding compiled code.
Add to list
5
Lesons
1 hour 5 minutes
On-Demand
Free-Video
Hackaday
Reverse Engineering with Ghidra - Class 4
0
rewiews
Explore advanced Ghidra features: external libraries, patch diffing, checksums, memory management, PCODE, SLEIGH, extensions, and scripting for enhanced reverse engineering capabilities.
Add to list
8
Lesons
53 minutes
On-Demand
Free-Video
Hackaday
Reverse Engineering with Ghidra - Class 3
0
rewiews
Explore advanced reverse engineering techniques using Ghidra, covering structs, pointers, enums, system calls, and file operations. Gain practical tips for efficient analysis and code manipulation.
Add to list
8
Lesons
1 hour 1 minute
On-Demand
Free-Video
Hackaday
Reverse Engineering with Ghidra
0
rewiews
Dive deep into assembly language concepts for reverse engineering, covering control flow, loops, variables, functions, and memory management using the Ghidra software suite.
Add to list
10
Lesons
1 hour
On-Demand
Free-Video
CAE in Cybersecurity Community
Software Reverse Engineering with Ghidra - NSA Codebreaker Challenge Demo
0
rewiews
Explore NSA's Ghidra platform for software reverse engineering through a hands-on demonstration solving real-world challenges and learning basic features.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
SANS
Leveling Up Ghidra - Learn Ghidra Plugins with Game Boy Game Reverse Engineering
0
rewiews
Explore Ghidra plugin development for efficient reverse engineering, using Game Boy games as an engaging example to showcase automation possibilities and enhance RE skills.
Add to list
1
Lesons
31 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Taking Ghidra to the Next Level
0
rewiews
Enhancing Ghidra: BinCraft's modernization efforts, improved decompilation, and integration of advanced techniques like GraalVM for a more powerful reverse engineering tool.
Add to list
19
Lesons
46 minutes
On-Demand
Free-Video
Security BSides San Francisco
A Look at Jython-Enhanced Reverse Engineering with Ghidra
0
rewiews
Explore Jython scripting in Ghidra for efficient malware analysis, using real-world examples to enhance reverse engineering techniques and streamline the process of analyzing obfuscated binaries.
Add to list
1
Lesons
47 minutes
On-Demand
Free-Video
BruCON Security Conference
Automating Binary Analysis with Ghidra's P-Code
0
rewiews
Explore automated binary analysis using Ghidra's P-Code, an intermediate language that enables architecture-independent scripting for reverse engineering and vulnerability research.
Add to list
17
Lesons
44 minutes
On-Demand
Free-Video
Kaspersky
Static Binary Analysis - The Essentials
0
rewiews
Dive into reverse engineering and static malware analysis essentials with Igor Kuznetsov. Learn visual inspection, disassembly techniques, and structure analysis using IDA Pro and Ghidra.
Add to list
31
Lesons
52 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Feeding Gophers to Ghidra
0
rewiews
Improve Golang binary analysis in Ghidra with Java-based scripts. Recover strings, functions, and types for efficient malware research and vulnerability detection.
Add to list
1
Lesons
1 hour
On-Demand
Free-Video
Hack In The Box Security Conference
Firmware Hacking With Ghidra
0
rewiews
Hands-on firmware hacking workshop using Ghidra for reverse engineering ARM Cortex-M architecture, followed by live demonstration of hardware glitching attacks on microcontrollers.
Add to list
1
Lesons
1 hour 31 minutes
On-Demand
Free-Video
Hack In The Box Security Conference
Reversing GO Binaries With Ghidra
0
rewiews
Exploring techniques for reverse engineering Golang binaries using Ghidra, focusing on IoT malware analysis, overcoming Go-specific challenges, and addressing recent obfuscation trends.
Add to list
1
Lesons
37 minutes
On-Demand
Free-Video
44CON Information Security Conference
Ghidriff
0
rewiews
Explore ghidriff, an open-source Python package for efficient binary diffing using Ghidra. Learn about its command-line interface, function matching heuristics, and markdown output for simplified patch analysis and vulnerability research.
Add to list
1
Lesons
42 minutes
On-Demand
Free-Video
DEFCONConference
No Symbols When Reversing? No Problem - Bring Your Own Symbols for Binary Analysis
0
rewiews
Discover efficient techniques for analyzing unknown functions in binaries, focusing on portable symbol creation and management using Ghidra, with practical examples from Golang-based malware analysis.
Add to list
1
Lesons
22 minutes
On-Demand
Free-Video
Black Hat
Ghidra - Journey from Classified NSA Tool to Open Source
0
rewiews
Explore NSA's journey in developing and open-sourcing Ghidra, a powerful software reverse engineering framework. Learn about its features, impact, and future developments.
Add to list
31
Lesons
48 minutes
On-Demand
Free-Video
DEFCONConference
Game Changing Advances in Windows Shellcode Analysis Using SHAREM Framework
0
rewiews
Discover groundbreaking advances in Windows shellcode analysis through SHAREM framework, offering enhanced emulation, complete code coverage, and superior disassembly capabilities for security professionals.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
DEFCONConference
Retro Exploitation - Vintage Computing as a Vulnerability Research Playground
0
rewiews
Explore vulnerability research and exploit development through vintage computing, focusing on the Commodore Amiga platform and practical demonstrations of retro software exploitation techniques.
Add to list
1
Lesons
44 minutes
On-Demand
Free-Video
DEFCONConference
Regenerating Passwords from RoboForm's Password Generator - A Time-Based Attack
0
rewiews
Delve into reverse engineering RoboForm's password generator vulnerability, exploring techniques to regenerate historical passwords and recover locked Bitcoin wallets through systematic analysis.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
DEFCONConference
Reverse Engineering MicroPython Frozen Modules
0
rewiews
Dive into advanced techniques for identifying and reverse engineering frozen MicroPython modules in firmware using Ghidra, focusing on bytecode analysis and module reconstruction methods.
Add to list
1
Lesons
43 minutes
On-Demand
Free-Video
load more...