Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

This is a pretty interesting toe-dip into basic Ghidra usage / Win32 reverse engineering, also highlights some of Ghidra's pitfalls.


Yeah, it's great as an intro tutorial. I wish ghidra fixed some of those issues, or at least surfaced the choices it made so they can be manually fixed. It's like the uncanny valley where it's typically so good that annoyances really stand out for me.


We're all programmers? Ghidra is open source. Have at it?


And we also have work, family, hobbies and other open source projects we work on. So unless you want to take over one of those for me, I don't have extra time to work on Ghidra as well.


Sure I'll take on your hobbies, maybe the family (if good) so you can work on Ghidra ;-) Ok, that's silly, I get your point but maybe put your feedback on their github at least.


Nothing wrong with sometimes "wishing" things without contributing. Yes it's useless chit chat but...


It's a convoluted Java codebase that likely nobody outside of the NSA fully understands. Publicly released early 2019, 184 contributors according to GitHub but a signifigant portion of the contributors only have a couple of commits with most of them being typo fixes or minor bug fixes (likely the result c+p fails or typos in the first place - not major logic flaws). The regular contributors are likely NSA employees.




Consider applying for YC's Summer 2026 batch! Applications are open till May 4

Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: