Visit Website

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra extension components and/or scripts using Java or Python. In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.

FEATURES

ALTERNATIVES

Java decompiler GUI tool for Procyon under Apache License.

Use FindYara, an IDA python plugin, to scan your binary with yara rules and quickly jump to matches.

YARA module for supporting DCSO format bloom filters with hashlookup capabilities.

A collection of YARA rules for public use, built from intelligence profiles and file work.

PINCE is a front-end/reverse engineering tool for the GNU Project Debugger (GDB), focused on games, with CheatEngine-like value type support and memory searching capabilities.

Repository of scripts, signatures, and IOCs related to various malware analysis topics.

Holistic malware analysis platform with interactive sandbox, static analyzer, and emulation capabilities.

Malware sandbox for executing malicious files in an isolated environment with advanced features.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved