
Ghidra - Free Open Source Reverse Engineering Tool by NSA
Discover Ghidra, a free open-source reverse engineering tool developed by the NSA. Released in 2019, Ghidra features a Java Swing GUI, support for various architectures, and emphasizes static analysis with its extensive features. Access code browser GUI and watch informative videos to learn more.
Download Presentation

Please find below an Image/Link to download the presentation.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author. If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.
You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.
The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.
E N D
Presentation Transcript
Ghidra (gee-druh (hard g)) free and open source reverse engineering tool developed by the National Security Agency(NSA) The other Reverse Engineering I(U)DE, As opposed to IDA-Pro/Hex-Rays IDA = Interactive Disassembler
Released 2019, source code comments comments back to 1999 Java Swing GUI C++ disassembler Java/Python plug-ins A work-in-progress
ghidra 11.0.2 download github tarball: https://github.com/NationalSecurityAgency/ghidra/archive/refs/tags/Ghidra_10.1.2_build.tar.gz https://github.com/NationalSecurityAgency/ghidra/archive/refs/tags/Ghidra_11.0.2_build.tar.gz https://github.com/NationalSecurityAgency/ghidra/releases sha256: ac96fbdde7f754e0eb9ed51db020e77208cdb12cf58c08657a2ab87cb2694940
Supported architectures x86 16, 32 and 64 bit ARM and AARCH64 PowerPC 32/64 and VLE MIPS 16/32/64 MicroMIPS 68xxx Java and DEX bytecode PA-RISC PIC 12/16/17/18/24 SPARC 32/64 CR16C Z80 6502 8051 MSP430 AVR8, AVR32 SuperH
Emphasis on static analysis gui/cl script able, comes with 200+ e.g. crypto search, cyclomatic complexity program tree symbol tree data type manager disassembly decompiler control flow graph cross references strings type system continuity across releases (temporal dimension) call graph
Ghidra videos the devs at black hat: https://www.youtube.com/watch?v=kx2xp7IQNSc&t=1601s a start-using-it run through: https://www.youtube.com/watch?v=NCO9F7U3d6c shameless lying: https://www.youtube.com/watch?v=08DW8gEMjpQ