Ghidra is a software reverse engineering (SRE) framework
Go to file
Tom Nelson 2f447ae0d0 added javadoc and updated jungrapht versions to 1.0-RC9
fixed vertex naming to create labels if no label at address.
removed local vertex renaming
vertex-only selection enabled and grow selection
made yellow edges darker
fix initial layout scaling for subgraph display
address warnings and increase stroke size for vertices
comments and adjusting initial layout area size calculation
multiselection strategy
moved buttons out of function so they can be re-enabled in popup menu
cleaned up and documented selection menus
improve selection following by sending only one event, filtering hidden elements, and disabliing the butten when selection is complete
improve grow selection to grow from all selected vertices
better generics, simplified root predicate. added flag so multiaction does not have to fire an action on the first item
support renaming from the graph view
added rename popup. corrected some errors
use function to control mincross work based on graph size
fixed LayoutWorkingDialog close issue a better way.
use toggle button for magnifier and connect with Lens kill switch
html escape the attributes in case they include things like < and >
changed thread stop and added initial dimension function
2020-08-25 15:21:57 +00:00
.github/ISSUE_TEMPLATE Text Improvements 2019-04-04 10:15:44 -04:00
eclipse Updated eclipse format preferences (function call wrapping) 2020-05-20 13:33:14 -04:00
Ghidra added javadoc and updated jungrapht versions to 1.0-RC9 2020-08-25 15:21:57 +00:00
GhidraBuild Fix typo in the README file 2020-03-10 18:58:22 +01:00
GhidraDocs Extensions installed through the GUI now get put in the user settings 2020-07-13 15:11:18 -04:00
GPL minor tweaks; replaced ant move with gradle copy 2020-03-11 16:46:42 -04:00
gradle Merge remote-tracking branch 'origin/GT-69_adamopolous_PR-2173_xiaoyinl_patch-3' 2020-08-13 14:14:25 -04:00
licenses Major refactoring of the gradle build system. 2019-04-23 15:20:26 -04:00
.gitattributes fixed hashcode method in ColumnTypeMapper to handle null source types 2020-08-05 16:34:51 -04:00
.gitignore added javadoc and updated jungrapht versions to 1.0-RC9 2020-08-25 15:21:57 +00:00
.gitlab-ci.yml gitlab ci update for ghidra repo 2020-03-13 12:23:45 -04:00
build.gradle removed accidental use of maven snapshot repo 2020-05-13 16:24:55 -04:00
certification.local.manifest GT-3099: ci update 2019-09-16 12:22:41 -04:00
CONTRIBUTING.md Merge branch 'TI' of https://github.com/Ebola16/ghidra into GT-2737_Dan_PR-317_Ebola16_TextImprovements 2019-04-04 15:08:13 -04:00
DevGuide.md Update URL of cdt-8.6.0.zip 2020-08-04 20:04:20 +08:00
DISCLAIMER.md fix spelling of commercial (#14) 2019-03-05 22:44:38 -05:00
LICENSE Initial commit 2019-02-28 22:27:49 -05:00
NOTICE Candidate release of source code. 2019-03-26 13:46:51 -04:00
README.md GT-2738: Adding 'U.S. citizen' qualification to README. 2019-04-04 12:56:49 -04:00
settings.gradle Fixing GhidraSleighEditor build. 2019-09-09 12:19:39 -04:00

Ghidra Software Reverse Engineering Framework

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, macOS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.

In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.

To start developing extensions and scripts, try out the GhidraDev plugin for Eclipse, which is part of the distribution package. The full release build can be downloaded from our project homepage.

This repository contains the source for the core framework, features, and extensions. If you would like to contribute, please take a look at our contributor guide to see how you can participate in this open source project.

If you are a U.S. citizen interested in projects like this, to develop Ghidra, and other cybersecurity tools, for NSA to help protect our nation and its allies, consider applying for a career with us.