Ghidra
Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission.
Here are 381 public repositories matching this topic...
A collection of Ghidra scripts I've written to help with reverse engineering
-
Updated
May 17, 2020 - Python
Reverse engineering the Outlook desktop app to find a way to block the ads, without leaving a blank space behind.
-
Updated
Jan 28, 2024 - JavaScript
Ghidra Analysis Enhancer 🐉 Python3 version.
-
Updated
Aug 25, 2023 - Python
Export Assembly or C from Ghidra
-
Updated
May 20, 2024 - Python
Collection of various small Ghidra scripts to assist in reverse engineering
-
Updated
Mar 18, 2023 - Python
Ghidra SledRE is a Ghidra extension able to interact with SledRE API.
-
Updated
Dec 28, 2021 - Java
SN-Systems' DUMPSYM + batch renaming for Ghidra and IDA
-
Updated
Mar 4, 2022 - C#
Simple script for ghidra to rename the default function names into better looking names that can be differed from afar
-
Updated
Nov 7, 2023 - Python
A cargo subcommand that displays ghidra function output through the use of the {rizin, radare2}-ghidra project
-
Updated
May 10, 2022 - Rust
Watch for changes in a binary and output a C-like decompilation
-
Updated
Sep 20, 2023 - Python
Attempting to fully reverse Soul Reaver PSX game using Ghidra, TDR and PsyX.
-
Updated
Apr 1, 2021 - C
Over Ride is a CTF like challenge about exploiting ELF32 & ELF64 binaries on x86_64 architecture
-
Updated
May 14, 2024 - C
Created by National Security Agency
Released March 5, 2019
Latest release about 2 months ago
- Followers
- 158 followers
- Repository
- NationalSecurityAgency/ghidra
- Website
- ghidra-sre.org
- Wikipedia
- Wikipedia