Friday, February 7, 2025
Homecyber securityGhidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

Ghidra 11.3 Released – A Major Update to NSA’s Open-Source Tool

Published on

SIEM as a Service

Follow Us on Google News

The National Security Agency (NSA) has officially released Ghidra 11.3, the latest iteration of its open-source software reverse engineering (SRE) framework.

Known for its robust capabilities in analyzing compiled code across multiple platforms, including Windows, macOS, and Linux, this release introduces significant enhancements aimed at improving performance and usability for cybersecurity professionals.

One of the most notable updates is the enhanced debugging functionality.

Ghidra 11.3 now supports macOS kernel debugging via LLDB and Windows kernel debugging in virtual machines using eXDI.

The outdated “IN-VM” connectors have been replaced with the more efficient TraceRMI-based implementation, streamlining debugging across diverse environments.

Additionally, a new Just-in-Time (JIT) p-code emulator has been introduced, delivering accelerated emulation performance for scripting and plugin development.

Integration with Modern Development Tools

Another major highlight of this release is its integration with Visual Studio Code (VS Code), offering users a modern alternative to Eclipse for development tasks.

With this update, users can create module projects or edit scripts directly within VS Code, benefiting from advanced features like autocomplete and navigation.

This integration simplifies the workflow for developers building custom plugins or analyzers for Ghidra.

Ghidra 11.3 also introduces improved visualization tools, including new “Flow Chart” layouts in the function graph interface.

These layouts enhance code block organization and readability, making it easier for analysts to navigate complex functions.

Expanded Functionality and Scripting Enhancements

The update brings several new features tailored to streamline reverse engineering tasks.

A LibreTranslate plugin enables offline string translation of binary data, while a new search feature allows users to query decompiled text across all functions in a binary.

Furthermore, the PyGhidra library is now fully integrated into the framework, providing native CPython 3 access to Ghidra’s API and significantly expanding scripting capabilities.

Processor support has also been enhanced with updates for x86 AVX-512 instructions, ARM VFPv2 disassembly, and Golang 1.23 binaries.

These improvements ensure compatibility with a broader range of architectures and programming languages.

Ghidra 11.3 maintains backward compatibility with project data from earlier versions but introduces features that are not compatible with older releases of the software.

To use the debugger or perform source builds, users must install Java Development Kit (JDK) 21 (64-bit) and Python 3 (versions 3.9–3.13).

The National Security Agency (NSA) release addresses numerous bugs, including issues with recursive structures in the decompiler and breakpoint toggling in LLDB.

Documentation has also been modernized to Markdown format for easier navigation.

With these advancements, Ghidra 11.3 continues to solidify its position as an indispensable tool for reverse engineering and cybersecurity analysis worldwide.

Investigate Real-World Malicious Links & Phishing Attacks With Threat Intelligence Lookup - Try for Free

Aman Mishra
Aman Mishra
Aman Mishra is a Security and privacy Reporter covering various data breach, cyber crime, malware, & vulnerability.

Latest articles

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

New Scareware Attack Targeting Mobile Users to Deploy Malicious Antivirus Apps

A new wave of scareware attacks has emerged, targeting unsuspecting mobile users with fake...

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat...

7-Zip 0-Day Flaw Added to CISA’s List of Actively Exploited Vulnerabilities

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical 0-day vulnerability...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Hackers Leveraging Image & Video Attachments to Deliver Malware

Cybercriminals are increasingly exploiting image and video files to deliver malware, leveraging advanced techniques...

New Scareware Attack Targeting Mobile Users to Deploy Malicious Antivirus Apps

A new wave of scareware attacks has emerged, targeting unsuspecting mobile users with fake...

Microsoft Sysinternals 0-Day Vulnerability Enables DLL Injection Attacks on Windows

A critical zero-day vulnerability has been discovered in Microsoft Sysinternals tools, posing a serious security threat...