Close Menu
Technotification
    Facebook X (Twitter) Instagram
    Facebook X (Twitter) Instagram
    Technotification
    • Home
    • News
    • How To
    • Explained
    • Facts
    • Lists
    • Programming
    • Security
    • Gaming
    Technotification
    Home › News › NSA Releases Source Code of GHIDRA: A Free Reverse Engineering Tool

    NSA Releases Source Code of GHIDRA: A Free Reverse Engineering Tool

    By Subham KapisweDecember 3, 2022
    Facebook Twitter Reddit LinkedIn
    GHIDRA

    The National Security Agency (NSA) has finally released the full source code of GHIDRA that is actually a free reverse engineering tool that NSA experts have been using internally for over a decade. The source code of GHIDRA version 9.0.2 is now available on its official Github repository.

    What is Reverse Engineering?

    Before proceeding any further, if you are unaware, Reverse Engineering is a process of decompiling an application mainly to obtain its source code. It doesn’t matter which language was used to create the application, the primary objectives of doing this are to improve the application, understand the actual design and code better, find bugs, etc.

    ghidra reverse engineering tool

    GHIDRA is NSA’s own classified software reverse engineering tool that is designed to work on a variety of platforms including Windows, Linux, and macOS. It’s a Java-based reverse engineering tool which also features a graphical user interface (GUI).

    Read: Top 10 Kali Linux Tools for Ethical Hackers and Penetration Tester

    Though, NSA released the reverse engineering tool publicly at RSA conference a few days ago, the existence of GHIDRA was first leaked by WikiLeaks in CIA Vault 7 leaks. Overall, it’s a great alternative to other reverse engineering tools that are too expensive to afford.

    As per the official website of GHIDRA, “It helps analyze malicious code and malware like viruses, and can give cybersecurity professionals a better understanding of potential vulnerabilities in their networks and systems.”

    Robert Joyce, the senior NSA advisor also ensured that GHIDRA has no risks or backdoor. “This is the last community you want to release something out to with a backdoor installed, to people who hunt for this stuff to tear apart,” he added.

    Talking about the features, GHIDRA comes with all the advanced features just like any other commercial reverse engineering tool. It supports a variety of instruction sets, executable formats and can run in both automatic and manual modes.

    Joyce also unveiled the processor modules of GHIDRA. There are more than 15 modules including X86 16/32/64, ARM/AARCH64, PowerPC 32/64, VLE, MIPS 16/32/64, micro, 68xxx, PA-RISC, PIC 12/16/17/18/24, Java / DEX bytecode, Sparc 32/64, CR16C, Z80, 6502, 8051, MSP430, AVR8, AVR32, etc.

    First Bug Reported By GHIDRA Reverse Engineering Tool

    After welcoming the GHIDRA reverse engineering tool, the security researchers and developers at the infosec community, have already started reporting the security holes and bugs available in the tool. The first issue was reported by Matthew Hickey (with alias HackerFantastic).

    He noticed that when a user launches GHIDRA in the debug mode, the tool opens JDWP debug port 18001 for all interfaces, and thus allow anyone within the network to execute code in analysts’ system remotely. However, the bug has been fixed now in the latest version of the software.

    If you are a security analyst looking for a cheap reverse engineering tool, start contributing to GHIDRA project so that it will become a useful tool for everyone.

    Share. Facebook Twitter LinkedIn Tumblr Reddit Telegram WhatsApp
    Subham Kapiswe
    • LinkedIn

    A computer science engineer by education and blogger by profession who loves to write about Programming, Cybersecurity, Blockchain, Artificial Intelligence, Open Source and other latest technologies.

    Related Posts

    NVIDIA GeForce NOW is Finally Coming to India

    January 8, 2025

    The Psychology of a Phishing Email: How Scammers Play with Your Mind

    July 16, 2024

    9 Essential Elements of a Strong Cyber Security Management System

    July 3, 2024

    Common Cyber Attacks and How to Prevent Them

    July 3, 2024

    How Cyber Security Paid Training Prepares You for Real-World Threats

    June 13, 2024

    The Role of Security in Server Colocation Environments

    March 12, 2024
    Lists You May Like

    10 Sites to Watch Free Korean Drama [2025 Edition]

    January 2, 2025

    The Pirate Bay Proxy List in 2025 [Updated List]

    January 2, 2025

    10 Best RARBG Alternative Sites in April 2025 [Working Links]

    April 1, 2025

    10 Best Torrent Search Engine Sites (2025 Edition)

    February 12, 2025

    10 Best GTA V Roleplay Servers in 2025 (Updated List)

    January 6, 2025

    5 Best Torrent Sites for Software in 2025

    January 2, 2025

    1337x Alternatives, Proxies, and Mirror Sites in 2025

    January 2, 2025

    10 Best Torrent Sites for eBooks in 2025 [Working]

    January 2, 2025

    10 Best Anime Torrent Sites in 2025 [Working Sites]

    January 6, 2025

    Top Free Photo Editing Software For PC in 2025

    January 2, 2025
    Pages
    • About
    • Contact
    • Privacy
    • Careers
    Privacy

    Information such as the type of browser being used, its operating system, and your IP address is gathered in order to enhance your online experience.

    © 2013 - 2025 Technotification | All rights reserved.

    Type above and press Enter to search. Press Esc to cancel.