Concerned About Your Business Cyber Security?

(877) 321--7374

A few Ghidra tips for IDA users, part 0 – automatic comments for API call parameters, (Wed, Apr 3rd)

If you haven’t been living under a rock, you probably heard that the NSA released its reverse-engineering tool, Ghidra, at RSA last month. I’ve been an IDA user for years (it’s the primary disassembler we use when I teach FOR610), but I’ve been trying out Ghidra over the last few days since it is free and other malware analysts have been talking about it. This is the first of several diaries I plan to write with suggestions on how to get Ghidra to do things I’ve come to rely on in IDA. And, being a good computer scientist, I start counting a 0, hence part 0.

Ready For ASuperheroI.T. Solution?

Real Time Web Analytics