Table of Contents
- Getting Started with Ghidra
- Automating RE Tasks with Ghidra Scripts
- Ghidra Debug Mode
- Using Ghidra Extensions
- Reversing Malware Using Ghidra
- Scripting Malware Analysis
- Using Ghidra's Headless Analyzer
- Binary Diffing
- Auditing Program Binaries
- Scripting Binary Audits
- Developing Ghidra Plugins
- Incorporating New Binary Formats
- Analyzing Processor Modules
- Contributing to the Ghidra Community
- Extending Ghidra for Advanced Reverse-Engineering
- Debugging
- Unpacking in-the-Wild Malware
- Reverse-Engineering Ransomware

