Ghidra

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
Ghidra
The logo for the Ghidra framework
A screenshot of the Ghidra user interface
Disassembly of a file in Ghidra
Original author(s)NSA
Initial releaseMarch 5, 2019
Repositoryhttps://github.com/NationalSecurityAgency/ghidra
Written inJava, C++
LicenseApache License 2.0
Websitehttps://ghidra-sre.org/

Ghidra (pronounced Gee-druh[1]) is a free reverse engineering tool developed by the National Security Agency (NSA). It was released at RSA Conference in March 2019.[2] The NSA stated that it plans to release Ghidra as open source in the "coming future".[3] Ghidra is seen by many security researchers as a competitor to IDA Pro and JEB Decompiler.[3] The software is written in Java using the Swing framework for the GUI. The decompiler component is written in C++. Ghidra uses Jython so plugins can be developed in Python.[citation needed]

Ghidra's existence was originally (though not legally) revealed to the public via WikiLeaks in March of 2017[4], but the software itself remained unavailable until its declassification and official release two years later.[2]

Supported architectures[edit]

The following architectures or binary formats are supported:[5]

References[edit]

  1. ^ "Frequently asked questions". GitHub.com. Retrieved 7 March 2019.
  2. ^ a b "The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source". WIRED.com. Retrieved 6 March 2019.
  3. ^ a b Cimpanu, Catalin. "NSA releases Ghidra, a free software reverse engineering toolkit". ZDNet. Retrieved 2019-03-07.
  4. ^ "Ghidra". WikiLeaks. National Security Agency. Retrieved 22 March 2019.
  5. ^ "Rob Joyce on Twitter". Twitter.com. Retrieved 6 March 2019.