The NSA has open-sourced a reverse engineering framework called Ghidra. "This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes." The supported processor instruction sets are X86 16/32/64, ARM/AARCH64, PowerPC 32/64/VLE, MIPS 16/32/64/micro, 68xxx, Java / DEX bytecode, PA-RISC, PIC 12/16/17/18/24, Sparc 32/64, CR16C, Z80, 6502, 8051, MSP430, AVR8, and AVR32.
"Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python." The tool itself is written in Java and you have to have Java 8 on your machine for it to run.
The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source#
reverseengineering #
nsa #
ghidra