About 169,000 results
Open links in new tab
  1. installation - I tried to install ghidra but i struggle with defining ...

    Oct 3, 2024 · Ghidra appears to be looking for 777 perms or rwxrwxrwx for the directories. I created /usr/java, sudo chmod 777 and then downloaded the tar to the java directory.

  2. Ghidra doesn't find the functions - Stack Overflow

    Aug 9, 2021 · Im pretty new at reverse engineering and I use Ghidra and IDA Pro. But I try to use Ghidra more because of the decompiler. But right now I really don't know what to do because Ghidra doesn't …

  3. Newest 'ghidra' Questions - Stack Overflow

    I've just installed Ghidra and tried to debug a sample program to get a taste of it. I've installed Python 3.12 and the redistributed site-packages with it (from \Ghidra\Debug\Debugger-agent-dbgeng\...

  4. What does CONCAT15 and CONCAT412 mean in ghidra?

    Oct 4, 2021 · I decompiled a file in ghidra and I sawed a lot of CONCAT+RandomNumber in decompiled file! what does they mean ?

  5. Ghidra : unable to find PDB and Couldn't find type info structure

    May 12, 2020 · I downloaded Ghidra about a week ago(I am new to reverse engineering), I did what the tutorial video from Ghidra official site was showing, I made a simple C++ program to Visual Studio, …

  6. Decompiler not working in Ghidra Disassembler - Stack Overflow

    Jan 9, 2022 · I'm kind of new to Ghidra Disassembler so kindly bear with me . I was trying to install Ghidra to analyse an executable. After opening the executable in Ghidra it loads everything fine …

  7. Ghidra function parameter and register names - Stack Overflow

    Jan 19, 2025 · Is this expected behaviour? Is there a workaround? I believe this is related to Why does it seem as though the compiler is repurposing Argc and Argv in my function?, although in that case the …

  8. Detecting symbols in arbitrary binary files - Stack Overflow

    Aug 25, 2024 · Given a program such as Ghidra, Binary Ninja, etc., is there a way to auto-identify a set of data and assign values a symbol based on the pattern of the data? For example, from this …

  9. winapi - Reverse engineer a C++ DLL file - Stack Overflow

    3 Now you can use Ghidra for free, or buying Interactive Disassembler Pro (AKA IDA Pro).

  10. Finding AES Key in binary using Ghidra and FindCrypt

    Sep 20, 2021 · When I open the binary in a hex editor and search for my key I find all 16 bytes in a row. I loaded the binary in Ghidra, installed FindCrypt before and now run the analysis. FindCrypt now finds …