View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0007090||Kali Linux||[All Projects] Queued Tool Addition||public||2021-03-12 16:56||2021-03-26 13:30|
|Priority||normal||Severity||minor||Reproducibility||have not tried|
|Target Version||Fixed in Version|
|Summary||0007090: Ghidra - Software reverse engineering (SRE) framework|
|Description||[Name] - Ghidra|
[Version] - 9.1.x (9.2.x has a memory bug)
[Homepage] - https://www.nsa.gov/ghidra
[Download] - https://github.com/NationalSecurityAgency/ghidra/tags
[Author] - National Security Agency
[License] - Apache License 2.0 ~ https://github.com/NationalSecurityAgency/ghidra/blob/master/LICENSE
[Description] - Ghidra is a software reverse engineering (SRE) framework
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.
In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.
||@kali-team, please could this be packaged up.|