gl2gb/public/tags/ghidra/index.xml

26 lines
1.4 KiB
XML

<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
<channel>
<title>ghidra on GoatPr0n.farm</title>
<link>https://goatpr0n.farm/tags/ghidra/</link>
<description>Recent content in ghidra on GoatPr0n.farm</description>
<generator>Hugo -- gohugo.io</generator>
<language>en</language>
<lastBuildDate>Thu, 28 Nov 2019 12:01:53 +0000</lastBuildDate>
<atom:link href="https://goatpr0n.farm/tags/ghidra/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>Reverse Engineering of a Flash Programmer :: EZP2010</title>
<link>https://goatpr0n.farm/posts/reverse-engineering-of-a-flash-programmer-ezp2010/</link>
<pubDate>Thu, 28 Nov 2019 12:01:53 +0000</pubDate>
<guid>https://goatpr0n.farm/posts/reverse-engineering-of-a-flash-programmer-ezp2010/</guid>
<description>Preface In today&amp;rsquo;s adventure I like to take you with me on my journey of reverse engineering another USB device. The EZP2010 is an USB programmer for flash memory as used by mainboard manufactures to store the BIOS, or embedded devices to store the firmware (or settings). When it comes to data recovery on hard drives, or similar storage devices, these flashers can also become handy.
EZP2010 USB-Highspeed programmer
This particular programmer can be bought on many Chinese store or Amazon.</description>
</item>
</channel>
</rss>