Ghidra (pronounced Gee-druh; //) is a free and open source reverse engineering tool developed by the National Security Agency (NSA). The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. Ghidra is seen by many security researchers as a competitor to IDA Pro and JEB Decompiler. The software is written in Java using the Swing framework for the GUI. The decompiler component is written in C++. Ghidra plugins can be developed in Java or in Python (provided via Jython).
Disassembly of a file in Ghidra
|Initial release||March 5, 2019|
|Written in||Java, C++|
|License||Apache License 2.0 / Public domain|
Ghidra's existence was originally revealed to the public via WikiLeaks in March 2017, but the software itself remained unavailable until its declassification and official release two years later.
- "ghidra/NOTICE". GitHub.com. Retrieved 13 April 2019.
- "Frequently asked questions". GitHub.com. Retrieved 7 March 2019.
- "Come Get Your Free NSA Reverse Engineering Tool!". YouTube.com. Retrieved 17 May 2019.
- "The NSA Makes Ghidra, a Powerful Cybersecurity Tool, Open Source". Wired.com. Retrieved 6 March 2019.
- Cimpanu, Catalin. "NSA releases Ghidra, a free software reverse engineering toolkit". ZDNet. Retrieved 2019-03-07.
- "Three Heads are Better Than One: Mastering NSA's Ghidra Reverse Engineering Tool" (PDF). Retrieved 2019-09-30.
- "Ghidra". WikiLeaks. National Security Agency. Retrieved 22 March 2019.
- "Coreboot Project Is Leveraging NSA Software To Help With Firmware Reverse Engineering".
- "Rob Joyce on Twitter". Twitter.com. Retrieved 6 March 2019.