https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/ghidra-101-cursor-text-highlighting/

https://www.tripwire.com/state-of-security/security-data-protection/cyber-security/ghidra-101-loading-windows-symbols-pdb-files/

https://www.tripwire.com/state-of-security/security-data-protection/ghidra-101-loading-windows-symbols-pdb-files-in-ghidra-10-x/

https://www.tripwire.com/state-of-security/security-data-protection/ghidra-101-creating-structures-in-ghidra/

https://spinsel.dev/2020/06/17/ghidra-brainfuck-processor-1.html


 * Rhabdomancer is a simple Ghidra script to assist with vulnerability research
 * tasks based on a candidate point strategy, against closed source software
 * written in C/C++. It locates all calls to potentially insecure functions

https://github.com/0xdea/ghidra-scripts/blob/main/Rhabdomancer.java


specially crafted to help auditors identify potential bugs and locate hotspots in C/C++ code on which to focus their attention.

https://github.com/0xdea/semgrep-rules


 * Haruspex is a simple Ghidra script to assist with reverse engineering
 * and vulnerability research tasks. It extracts all pseudo-code generated
 * by the Ghidra decompiler in a format that should be suitable to be
 * imported into an IDE, such as VS Code, or parsed by static analysis
 * tools, such as Semgrep.

https://github.com/0xdea/ghidra-scripts/blob/main/Haruspex.java

Ghidra analysis plugin to locate cryptographic constants:

https://github.com/TorgoTorgo/ghidra-findcrypt


🌱 Back to Garden