Bare-metal ARM firmware reverse engineering with Ghidra and SVD-Loader

13:08
IoT Security: Backdooring a smart camera by creating a malicious firmware upgrade

12:07
Intro to Hardware Reversing: Finding a UART and getting a shell

1:30:37
#HITBLockdown D2 - Virtual Lab - Firmware Hacking With Ghidra - Thomas Roth & Dmitry Nedospasov

12:20
Remote Debugging ARM Chip with SWD/JTAG - Hardware Wallet Research #3

18:41
Extracting Firmware from Embedded Devices (SPI NOR Flash) ⚡

22:31
Reversing WannaCry Part 1 - Finding the killswitch and unpacking the malware in #Ghidra

21:00
Patching Binaries (with vim, Binary Ninja, Ghidra and radare2)

8:38