Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission.
Created by National Security Agency
发布于 March 5, 2019
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Open-source code analysis platform for C/C++/Java/Binary/Javascript/Python/Kotlin based on code property graphs. Discord https://discord.gg/vv4MH284Hc
Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
ret-sync is a set of plugins that helps to synchronize a debugging session (WinDbg/GDB/LLDB/OllyDbg2/x64dbg) with IDA/Ghidra/Binary Ninja disassemblers.
BinAbsInspector: Vulnerability Scanner for Binaries
#Awesome#A curated list of awesome Ghidra materials
cwe_checker finds vulnerable patterns in binary executables
Driver 2 Playstation game reverse engineering effort
Export disassemblies into Protocol Buffers
#IOS#Most usable tools for iOS penetration testing
Deep ghidra decompiler and sleigh disassembler integration for rizin
A collection of pwn/CTF related utilities for Ghidra
Ghidra C++ Class and Run Time Type Information Analyzer
Python Command-Line Ghidra Binary Diffing Engine
Find JNI function signatures in APK and apply to reverse-engineering tools.
IDA Pro's FindCrypt ported to Ghidra, with an updated and customizable signature database
Ghidra extension for exporting relocatable object files