Sunday, March 2, 2025
HomeComputer SecurityGhidra - Free Reverse Engineering Tool Released by NSA

Ghidra – Free Reverse Engineering Tool Released by NSA

Published on

SIEM as a Service

Follow Us on Google News

NSA released Ghidra a free reverse Engineering tool for Malware analyst with an interactive GUI capability that runs on various platforms including Windows, Mac OS, and Linux and supports a number of processor modules.

Ghidra gives flexibility for users to create additional plug-in components and scripts using Java or Python. It helps in analyzing malicious codes, malware and gives cybersecurity professionals a better understanding of potential vulnerabilities in their networks and systems.

It is a reverse engineering tool like IDA Pro which is widely used for decompiling applications. The free tool includes all the features expected in high-end commercial tools.

Ghidra is capable of analyzing libraries written in a variety of architectures and can be extended by adding plugins.

Installing Ghidra is quite simple, just need to download the zip file and click Extract All, then navigate to the extracted follow and run the batch. Ghidra can be downloaded from the official website.

Ghidra includes following capabilities that include disassembly, assembly, decompilation, graphing and scripting. It supports for a number of executable formats and can be run in both user-interactive and automated modes.

Installation Guide Credits : NSA

Malwaretech published the first look video of Ghidra.

Initial Announcement –Ghidra

NSA to release a free reverse engineering tool known as GHIDRA that to demonstrate in the RSA conference 2019 that going to held at Mar 05 in Moscone Center, San Francisco.

The reverse engineering tool developed in Java and works with Windows, OS X, Linux, and mobile devices. To run it requires Java 1.7 to be installed on the machine.

“The tool is a GUI based one which enables which enables the reverse engineers to leverage an integrated set of features. The platform includes all the features expected in high-end commercial tools, with new and expanded functionality NSA uniquely developed, and will be released for free public use at RSA.”

The current version of the tool is 9.0. and the tool has options to include additional functionality such as Cryptanalysis, interaction with OllyDbg, the Ghidra Debugger.

NSA open sourced number of internal tools, after March 5 the tool expected to be available NSA Github repositories.

Former NSA staffer, security researcher Charlie Miller said that the tool being used by NSA 13 years ago.

A reddit user hash_define details the differences between the reverse engineering tools Ghidra and the IDA.

Comment
byu/rolfr from discussion
inReverseEngineering

US government workers comment that “the tool is well-known and liked, and generally used by operators in defensive roles, who normally analyze malware found on government networks.”

You can find the list of important and most used Threat Intelligence Tools by security professionals.

You can follow us on Linkedin, Twitter, Facebook for daily Cybersecurity updates also you can take the Best Cybersecurity courses online to keep your self-updated.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Network Penetration Testing Checklist – 2025

Network penetration testing is a cybersecurity practice that simulates cyberattacks on an organization's network...

Hackers can Crack Into Car Cameras Within Minutes Exploiting Vulnerabilities

At the upcoming Black Hat Asia 2025 conference, cybersecurity experts will unveil a groundbreaking...

Chinese Hackers Breach Belgium State Security Service as Investigation Continues

Belgium’s State Security Service (VSSE) has suffered what is being described as its most...

Hacktivist Groups Emerge With Powerful Tools for Large-Scale Cyber Operations

Hacktivism, once synonymous with symbolic website defacements and distributed denial-of-service (DDoS) attacks, has evolved...

Supply Chain Attack Prevention

Free Webinar - Supply Chain Attack Prevention

Recent attacks like Polyfill[.]io show how compromised third-party components become backdoors for hackers. PCI DSS 4.0’s Requirement 6.4.3 mandates stricter browser script controls, while Requirement 12.8 focuses on securing third-party providers.

Join Vivekanand Gopalan (VP of Products – Indusface) and Phani Deepak Akella (VP of Marketing – Indusface) as they break down these compliance requirements and share strategies to protect your applications from supply chain attacks.

Discussion points

Meeting PCI DSS 4.0 mandates.
Blocking malicious components and unauthorized JavaScript execution.
PIdentifying attack surfaces from third-party dependencies.
Preventing man-in-the-browser attacks with proactive monitoring.

More like this

Is this Website Safe: How to Check Website Safety – 2025

is this website safe? In this digital world, Check a website is safe is...

Google’s New XRefer Tool To Analyze More Complex Malware Samples

XRefer, an IDA Pro plugin, enhances binary analysis with a persistent companion view by...

Researchers Released hrtng IDA Pro Plugin for Malware Analyst to Make Reverse Engineering Easy

The Global Research and Analysis Team (GReAT) has announced the release of hrtng, a cutting-edge...