Ghidra
Ghidra
|
|
---|---|
![]() |
|
![]() Decompiled file in Ghidra |
|
Basic data
|
|
developer | NSA |
Publishing year | 2019 |
Current version |
9.1.2 ( February 12, 2020 ) |
operating system | Platform independence |
programming language | Java, C ++ |
License | Apache license 2.0 |
https://ghidra-sre.org/ |
Ghidra is a free software reverse engineering tool developed by the National Security Agency . The software was released at the RSA conference in March 2019. The application is implemented in Java as well as using the Swing framework . The Decompiler component was written in C ++ .
Architectures
The following architectures are currently supported:
- 16, 32 and 64-bit x86
- ARM and AARCH64
- PowerPC 32/64 and PowerPC VLE
- MIPS 16/32/64 / Micro
- Motorola 68xxx
- Java / DEX bytecode
- PA-RISC
- PIC 12/16/17/18/24
- Sparc 32/64
- CR16C
- Z80
- 6502
- 8051
- MSP430
- AVR8
- AVR32
Web links
Individual evidence
- ↑ www.ghidra-sre.org . (accessed on May 5, 2020).
- ↑ ghidra / LICENSE at master National Security Agency / ghidra. GitHub, accessed June 9, 2019 .
- ^ Moritz Tremmel: NSA tool Ghidra: powerful tool, strange bug. Golem.de, March 6, 2019, accessed June 9, 2019 .
- ^ Lily Hay Newman: The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source. Wired.com, May 3, 2019, accessed June 9, 2019 .
- ↑ Fequently asked questions. Accessed January 27, 2020 (English).