File tree Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Expand file tree Collapse file tree 1 file changed +6
-6
lines changed Original file line number Diff line number Diff line change 2121
2222 1.下载ghidra源代码并压缩
2323 2.下载好后打开目录,双击ghidraRun.bat文件运行
24- 
24+ ![ image] ( https://github.com/kingking888/AndroidReverseEngineering/blob/master/Ghidra/src/png/01_ghidra%E8%BF%90%E8%A1%8C.png )
2525
2626 3.如果出现这个界面的话就是配置成功
27- 
27+ ![ image] ( https://github.com/kingking888/AndroidReverseEngineering/blob/master/Ghidra/src/png/02_Ghidra%E8%BF%90%E8%A1%8C%E6%88%90%E5%8A%9F.png )
2828
2929 4.如图所示,我们只需保留主程序窗口就可以了.
30- 
30+ ![ image] ( https://github.com/kingking888/AndroidReverseEngineering/tree/master/Ghidra/src/png/03_使用步骤.png )
3131
3232 5.到此,我们就成功安装好了Ghidra,现在我们就可以使用它了.
3333
3434 如何使用
3535
3636 1.首先,我们来新建一个工程
37- 
37+ ![ image] ( https://github.com/kingking888/AndroidReverseEngineering/tree/master/Ghidra/src/png/04_创建项目.png )
3838
3939 2.我们选择个人项目,然后点击next
40- 
40+ ![ image] ( https://github.com/kingking888/AndroidReverseEngineering/tree/master/Ghidra/src/png/05_创建个人项目.png )
4141
4242 3.填写完之后点击finish
43- 
43+ ![ image] ( https://github.com/kingking888/AndroidReverseEngineering/tree/master/Ghidra/src/png/06_路径设置.png )
4444 ![ image] ( https://github.com/kingking888/AndroidReverseEngineering/tree/master/Ghidra/src/png/07_0项目创建好后.png )
4545
4646 4.导入需要分析的工具,或者直接将文件拖拽进工程
You can’t perform that action at this time.
0 commit comments