Reverse Engineering with Ghidra - Class 3

Reverse Engineering with Ghidra - Class 3

HACKADAY via YouTube Direct link

- x86_64 System Calls

6 of 8

6 of 8

- x86_64 System Calls

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Reverse Engineering with Ghidra - Class 3

Automatically move to the next video in the Classroom when playback concludes

  1. 1 - Intro
  2. 2 - SRE Tool Landscape
  3. 3 - Structs: ASM, Identification and Ghidra Analysis
  4. 4 - Pointers: ASM, Identification and Ghidra Analysis
  5. 5 - Enums: ASM, Identification and Ghidra Analysis
  6. 6 - x86_64 System Calls
  7. 7 - File Operations
  8. 8 - Ghidra Tips: Patching, Bookmarks, Searching, Comments

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.