Ghidra
Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission.
Here are 382 public repositories matching this topic...
Attempting to fully reverse Soul Reaver PSX game using Ghidra, TDR and PsyX.
-
Updated
Apr 1, 2021 - C
Over Ride is a CTF like challenge about exploiting ELF32 & ELF64 binaries on x86_64 architecture
-
Updated
May 14, 2024 - C
An installer and compiler for Ghidra for MacOS ARM64
-
Updated
May 28, 2024 - Python
Collection of various small Ghidra scripts to assist in reverse engineering
-
Updated
Mar 18, 2023 - Python
Ghidra SledRE is a Ghidra extension able to interact with SledRE API.
-
Updated
Dec 28, 2021 - Java
SN-Systems' DUMPSYM + batch renaming for Ghidra and IDA
-
Updated
Mar 4, 2022 - C#
Simple script for ghidra to rename the default function names into better looking names that can be differed from afar
-
Updated
Nov 7, 2023 - Python
A cargo subcommand that displays ghidra function output through the use of the {rizin, radare2}-ghidra project
-
Updated
May 10, 2022 - Rust
Watch for changes in a binary and output a C-like decompilation
-
Updated
Sep 20, 2023 - Python
A collection of Ghidra scripts I've written to help with reverse engineering
-
Updated
May 17, 2020 - Python
Ghidra Analysis Enhancer 🐉 Python3 version.
-
Updated
Aug 25, 2023 - Python
Export Assembly or C from Ghidra
-
Updated
May 20, 2024 - Python
Created by National Security Agency
Released March 5, 2019
Latest release 6 days ago
- Followers
- 158 followers
- Repository
- NationalSecurityAgency/ghidra
- Website
- ghidra-sre.org
- Wikipedia
- Wikipedia