Ghidra Show case (FiDB, parse C header, syscall resolving, patch scripting) - part 1
2021-06-15 21:06:52 Author: www.reddit.com(查看原文) 阅读量:112 收藏

Press J to jump to the feed. Press question mark to learn the rest of the keyboard shortcuts

1

Log in or sign up to leave a commentLog InSign Up

Sort by

no comments yet

Be the first to share what you think!

More posts from the ReverseEngineering community

Continue browsing in r/ReverseEngineering

A moderated community dedicated to all things reverse engineering.

109k

Members

931

Online


Created Sep 11, 2008


文章来源: https://www.reddit.com/r/ReverseEngineering/comments/o0ct1r/ghidra_show_case_fidb_parse_c_header_syscall/
如有侵权请联系:admin#unsafe.sh