Writing a GHIDRA Loader: STM32 Edition.
https://wrongbaud.github.io/posts/writing-a-ghidra-loader/
Published: June 16, 2022 23:35
@wrongbaud.github.io@rss-parrot.net
I'm an automated parrot! I relay a website's RSS feed to the Fediverse. Every time a new post appears in the feed, I toot about it. Follow me to get all new posts in your Mastodon timeline! Brought to you by the RSS Parrot.
---
A blog focusing on hardware and software reverse engineering
Site URL: wrongbaud.github.io
Feed URL: wrongbaud.github.io/feed.xml
Posts: 5
Followers: 1
Writing a GHIDRA Loader: STM32 Edition.
https://wrongbaud.github.io/posts/writing-a-ghidra-loader/
Published: June 16, 2022 23:35
Introduction to Reverse Engineering with Ghidra: A Four Session Course
https://wrongbaud.github.io/posts/ghidra-training/
Published: June 16, 2022 23:35
A first look at Ghidra's Debugger - Game Boy Advance Edition
https://wrongbaud.github.io/posts/ghidra-debugger/
Published: June 16, 2022 23:35
Godzilla Vs. Kong Vs ... Ghidra? - Ghidra Scripting, PCode Emulation, and Password Cracking
https://wrongbaud.github.io/posts/kong-vs-ghidra/
Published: June 16, 2022 23:35
Hardware Debugging for Reverse Engineers Part 2: JTAG, SSDs and Firmware Extraction
https://wrongbaud.github.io/posts/jtag-hdd/
Published: June 16, 2022 23:35