Ghidra Software Reverse Engineering Framework Logo

Ghidra Software Reverse Engineering Framework

0
Free
Visit Website

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra extension components and/or scripts using Java or Python. In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.

FEATURES

ALTERNATIVES

A cutting-edge AI-based IT security platform that identifies malware and cyber-attacks within seconds

Dynamic binary analysis library with various analysis and emulation capabilities.

Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.

A PowerShell module for interacting with VirusTotal to analyze suspicious files and URLs.

A serverless, real-time, and retroactive malware detection tool that scans files with YARA rules and alerts incident response teams.

Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.

Redexer is a reengineering tool for Android app binaries with features like RefineDroid and Dr. Android.

A standalone binary inspection tool for Android developers with support for various formats and dependencies.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved