Disassembly of a file in Ghidra
|Initial release||March 5, 2019|
|Written in||Java, C++|
|License||Apache License 2.0|
Ghidra (pronounced Gee-druh) is a free reverse engineering tool developed by the National Security Agency (NSA). It was released at RSA Conference in March 2019. The NSA stated that it plans to release Ghidra as open source in the "coming future". Ghidra is seen by many security researchers as a competitor to IDA Pro and JEB Decompiler. The software is written in Java using the Swing framework for the GUI. The decompiler component is written in C++. Ghidra uses Jython so plugins can be developed in Python.
Ghidra's existence was originally (though not legally) revealed to the public via WikiLeaks in March of 2017, but the software itself remained unavailable until its declassification and official release two years later.
The following architectures or binary formats are supported:
- 16, 32 and 64 bit x86
- ARM and AARCH64
- PowerPC 32/64 and PowerPC VLE
- MIPS 16/32/64
- DEX bytecode
- PIC 12/16/17/18/24
- Sparc 32/64
- "Frequently asked questions". GitHub.com. Retrieved 7 March 2019.
- "The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source". WIRED.com. Retrieved 6 March 2019.
- Cimpanu, Catalin. "NSA releases Ghidra, a free software reverse engineering toolkit". ZDNet. Retrieved 2019-03-07.
- "Ghidra". WikiLeaks. National Security Agency. Retrieved 22 March 2019.
- "Rob Joyce on Twitter". Twitter.com. Retrieved 6 March 2019.
|This software article is a stub. You can help Wikipedia by expanding it.|
|This free and open-source software article is a stub. You can help Wikipedia by expanding it.|