A first look at Ghidra’s Debugger – Game Boy Advance Edition #Nintendo #ReverseEngineering @NSA @wrongbaud
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.
The latest release includes single-step debugging of a program within Ghidra through a GDB stub or other various debug mechanisms. To celebrate this Wrongbaud’s Blog wanted to review how to build this version of Ghidra and give an example of how to use this debugger on a fun target.
Wrongbaud’s target is the Game Boy Advance game Spiderman: Mysterio’s Menace. The goal is to demonstrate how to properly load this ROM using a custom loader, and connect to an emulator GDB stub using Ghidra’s debugging features.
Have an amazing project to share? The Electronics Show and Tell is every Wednesday at 7:30pm ET! To join, head over to YouTube and check out the show’s live chat and our Discord!
Python for Microcontrollers – Adafruit Daily — Python on Microcontrollers Newsletter: A New Arduino MicroPython Package Manager, How-Tos and Much More! #CircuitPython #Python #micropython @ThePSF @Raspberry_Pi
EYE on NPI – Adafruit Daily — EYE on NPI Maxim’s Himalaya uSLIC Step-Down Power Module #EyeOnNPI @maximintegrated @digikey