Reversing CrackMe with Ghidra (Part 1)
Reverse Engineer CrackMe0x00.exe with me using Ghidra!
Fix .text functions names in Ghidra:
https://youtu.be/WENXr6iDu8A
Download CrackMe0x00 at:
https://github.com/Maijin/Workshop2015/tree/master/IOLI-crackme/bin-win32
How to Install Ghidra on Windows:
https://youtu.be/IL60yGDbRGw
Ghidra Overview:
https://youtu.be/Cgukr7v9eg0
Видео Reversing CrackMe with Ghidra (Part 1) канала stryker2k2
Fix .text functions names in Ghidra:
https://youtu.be/WENXr6iDu8A
Download CrackMe0x00 at:
https://github.com/Maijin/Workshop2015/tree/master/IOLI-crackme/bin-win32
How to Install Ghidra on Windows:
https://youtu.be/IL60yGDbRGw
Ghidra Overview:
https://youtu.be/Cgukr7v9eg0
Видео Reversing CrackMe with Ghidra (Part 1) канала stryker2k2
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Reversing CrackMe with Ghidra (Part 2)](https://i.ytimg.com/vi/Eu9YC1Jq1Do/default.jpg)
![Analysing a Firefox Malware browserassist.dll - FLARE-On 2018](https://i.ytimg.com/vi/5cvpGSSUZI0/default.jpg)
![Patching Binaries (with vim, Binary Ninja, Ghidra and radare2) - bin 0x2F](https://i.ytimg.com/vi/LyNyf3UM9Yc/default.jpg)
![IoT Security: Backdooring a smart camera by creating a malicious firmware upgrade](https://i.ytimg.com/vi/hV8W4o-Mu2o/default.jpg)
![Ghidra - Journey from Classified NSA Tool to Open Source](https://i.ytimg.com/vi/kx2xp7IQNSc/default.jpg)
![Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra](https://i.ytimg.com/vi/Sv8yu12y5zM/default.jpg)
![Reversing and Cracking first simple Program - bin 0x05](https://i.ytimg.com/vi/VroEiMOJPm8/default.jpg)
![Reverse Engineering For Beginners: 1. Reversing a simple Crackme + Cutter](https://i.ytimg.com/vi/4GDB4LcJDNg/default.jpg)
![HackadayU: Reverse Engineering with Ghidra Class 1](https://i.ytimg.com/vi/d4Pgi5XML8E/default.jpg)
![Exploit Pack - IDA PRO Tutorial #1 Solving a crackme using conditional breakpoints](https://i.ytimg.com/vi/Q9AHFBgR9iw/default.jpg)
![How Ghidra changed my life - Chris Eagle](https://i.ytimg.com/vi/KL1jE9dxas0/default.jpg)
![البداية مع Ghidra](https://i.ytimg.com/vi/iW3hNA4XiSM/default.jpg)
![Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader](https://i.ytimg.com/vi/q4CxE5P6RUE/default.jpg)
![Ghidra Code Analysis with Anuj Soni](https://i.ytimg.com/vi/NCO9F7U3d6c/default.jpg)
![In-depth: ELF - The Extensible & Linkable Format](https://i.ytimg.com/vi/nC1U1LJQL8o/default.jpg)
![Reversing Statically-Linked Binaries with Function Signatures - bin 0x2D](https://i.ytimg.com/vi/CgGha_zLqlo/default.jpg)
![Ghidra keyGme Reverse Engineer and Keygen](https://i.ytimg.com/vi/ZeUgu8-9B58/default.jpg)
![How to reverse engineer & patch a Game Boy ROM](https://i.ytimg.com/vi/dQLp5i8oS3Y/default.jpg)
![Cutter: Presenting r2ghidra Decompiler | r2con 2019](https://i.ytimg.com/vi/eHtMiezr7l8/default.jpg)
![Getting Started Reversing C++ Objects with Ghidra](https://i.ytimg.com/vi/ir2B1trR0fE/default.jpg)