Concerned About Your Business Cyber Security?

(877) 321--7374

A few Ghidra tips for IDA users, part 2 – strings and parameters, (Wed, Apr 17th)

Continuing with my preliminary exploration of Ghidra. If we continue with the call to RegOpenKeyExA from last time (yes, I know this code is unreachable as we discussed last time, but let’s keep going anyway).

Ready For ASuperheroI.T. Solution?

Real Time Web Analytics