Ghidra
Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission.
Here are 381 public repositories matching this topic...
Attempting to fully reverse Soul Reaver PSX game using Ghidra, TDR and PsyX.
-
Updated
Apr 1, 2021 - C
Over Ride is a CTF like challenge about exploiting ELF32 & ELF64 binaries on x86_64 architecture
-
Updated
May 14, 2024 - C
An installer and compiler for Ghidra for MacOS ARM64
-
Updated
May 28, 2024 - Python
A collection of Ghidra scripts I've written to help with reverse engineering
-
Updated
May 17, 2020 - Python
Ghidra Analysis Enhancer 🐉 Python3 version.
-
Updated
Aug 25, 2023 - Python
Export Assembly or C from Ghidra
-
Updated
May 20, 2024 - Python
Reverse engineering the Outlook desktop app to find a way to block the ads, without leaving a blank space behind.
-
Updated
May 29, 2024 - JavaScript
Collection of various small Ghidra scripts to assist in reverse engineering
-
Updated
Mar 18, 2023 - Python
Ghidra SledRE is a Ghidra extension able to interact with SledRE API.
-
Updated
Dec 28, 2021 - Java
SN-Systems' DUMPSYM + batch renaming for Ghidra and IDA
-
Updated
Mar 4, 2022 - C#
Simple script for ghidra to rename the default function names into better looking names that can be differed from afar
-
Updated
Nov 7, 2023 - Python
A cargo subcommand that displays ghidra function output through the use of the {rizin, radare2}-ghidra project
-
Updated
May 10, 2022 - Rust
Created by National Security Agency
Released March 5, 2019
Latest release about 2 months ago
- Followers
- 158 followers
- Repository
- NationalSecurityAgency/ghidra
- Website
- ghidra-sre.org
- Wikipedia
- Wikipedia