|Initial release||March 5, 2019|
10.2.2 / November 15, 2022
|Written in||Java, C++|
|License||Apache License 2.0 / Public domain|
Ghidra (pronounced gee-druh; //) is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. Ghidra is seen by many security researchers as a competitor to IDA Pro. The software is written in Java using the Swing framework for the GUI. The decompiler component is written in C++, and is therefore usable in a stand-alone form. Ghidra plugins can be developed in Java or in Python (provided via Jython).
Ghidra's existence was originally revealed to the public via WikiLeaks in March 2017, but the software itself remained unavailable until its declassification and official release two years later.
The following architectures or binary formats are supported:
- Ghidra 10.2.2
- "ghidra/NOTICE". GitHub.com. Retrieved 13 April 2019.
- "Frequently asked questions". GitHub.com. Retrieved 7 March 2019.
- "Come Get Your Free NSA Reverse Engineering Tool!". YouTube.com. Archived from the original on 2021-12-15. Retrieved 17 May 2019.
- "The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source". Wired.com. Retrieved 6 March 2019.
- Cimpanu, Catalin. "NSA releases Ghidra, a free software reverse engineering toolkit". ZDNet. Retrieved 2019-03-07.
- e. g. as Plugin for Radare2 oder Rizin.
- "Three Heads are Better Than One: Mastering NSA's Ghidra Reverse Engineering Tool" (PDF). Retrieved 2019-09-30.
- "Ghidra". WikiLeaks. National Security Agency. Retrieved 22 March 2019.
- "Coreboot Project Is Leveraging NSA Software To Help With Firmware Reverse Engineering".
- "Compiled/built Ghidra 9.3 for Windows with Debugger feature by Galician R&D Center in Advanced Telecommunications employees".
- "What's new in Ghidra 10.0".
- "Rob Joyce on Twitter". Twitter.com. Retrieved 6 March 2019.