|
You are here |
blog.nuculabs.de | ||
| | | | |
blog.red-database-security.com
|
|
| | | | | ||
| | | | |
st4rk.net
|
|
| | | | | [AI summary] The author discusses their reverse engineering efforts on Mega Man Battle Network 6, detailing the process of analyzing the game's ROM using tools like IDA Pro and NO$GBA Debugger. | |
| | | | |
malwaretech.com
|
|
| | | | | Today during RSA Conference, the National Security Agency release their much hyped Ghidra reverse engineering toolkit. Described as "A software reverse engineering (SRE) suite of tools", Ghidra sounded like some kind of disassembler framework.Prior to release, my expectation was something more than Binary Ninja, but lacking debugger integration. I figured the toolkit would be ideal for those interested in reversing, but who lack the funding for an IDA licence. | |
| | | | |
lauramcinerneydotcom.wordpress.com
|
|
| | | Reblogged on WordPress.com | ||