Find a file
caheckman 612c0d6f3e name to address space map
shortcut to address space map
more adjustments to shortcuts
allow null AddrSpace pointer in raw baselist
holes in the space indices
almost working
GT-2873 decompiler, other, and overlays
GT-2873 added OTHER space to java sleigh compiler, fixed decompiler
exception
isOtherSpace method
isOtherSpace java, addressing code review comments
GT-2873 added null check in decompiler reset
GT-2873 code review changes
Read and write space_other tag in SLA files
Version number for .sla file
GT-2873 fixups after merge
GT-2873 renamed Sparc registers: OTHER->OTHERWIN, WINWSTATE->WSTATE
GT-2873 added option in AddressInput to control OTHER space visibility
GT-2873 OTHER space now global
GT-2873 fixing comments refering to decompiler code in BasicCompilerSpec
2019-08-22 12:30:18 -04:00
.github/ISSUE_TEMPLATE Text Improvements 2019-04-04 10:15:44 -04:00
eclipse Candidate release of source code. 2019-03-26 13:46:51 -04:00
Ghidra name to address space map 2019-08-22 12:30:18 -04:00
GhidraBuild GT-2696: Another idaxml.py memory reference fix (fixes #885) 2019-08-14 14:51:25 -04:00
GhidraDocs Merge remote-tracking branch 'origin/ghidra1_Emulator' 2019-07-12 16:14:17 -04:00
GPL Merge remote-tracking branch 'origin/ghidra1_Emulator' 2019-07-12 16:14:17 -04:00
gradle Gradle - updated gradle to run when not using standard repo names - 2019-08-13 18:31:43 -04:00
licenses Major refactoring of the gradle build system. 2019-04-23 15:20:26 -04:00
.gitattributes Candidate release of source code. 2019-03-26 13:46:51 -04:00
.gitignore Merge remote-tracking branch 'origin/ghidra1_Emulator' 2019-07-12 16:14:17 -04:00
build.gradle Review Tool - 3.1.1 - updated comments table to use column filters; 2019-08-21 18:38:18 -04:00
certification.local.manifest GT-2845: Storing original program bytes in the program database. 2019-07-16 11:31:30 -04:00
CONTRIBUTING.md Merge branch 'TI' of https://github.com/Ebola16/ghidra into GT-2737_Dan_PR-317_Ebola16_TextImprovements 2019-04-04 15:08:13 -04:00
DevGuide.md Address PR suggestions 2019-07-31 22:34:30 +06:00
DISCLAIMER.md fix spelling of commercial (#14) 2019-03-05 22:44:38 -05:00
LICENSE Initial commit 2019-02-28 22:27:49 -05:00
NOTICE Candidate release of source code. 2019-03-26 13:46:51 -04:00
README.md GT-2738: Adding 'U.S. citizen' qualification to README. 2019-04-04 12:56:49 -04:00
settings.gradle GT-113: Generating Eclipse projects with Gradle. 2019-06-25 09:38:49 -04:00

Ghidra Software Reverse Engineering Framework

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.

In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.

To start developing extensions and scripts, try out the GhidraDev plugin for Eclipse, which is part of the distribution package. The full release build can be downloaded from our project homepage.

This repository contains the source for the core framework, features, and extensions. If you would like to contribute, please take a look at our contributor guide to see how you can participate in this open source project.

If you are a U.S. citizen interested in projects like this, to develop Ghidra, and other cybersecurity tools, for NSA to help protect our nation and its allies, consider applying for a career with us.