GHIDRA reverse engineering tool

The framework includes a software analysis tool which allows users or techies to analyze compiled software. Complied software in simple words means EXE files or final code which can run software on your computer. This tool reverses engineers to reach source code or at least part of which can make sense. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, and more. Its open source which means the community can contribute both to source code or can build plugins to extend. You can use Java or Python to develop it. That said, it isn’t just a desktop tool. GHIDRA is built to scale and solve teaming problems on a sophisticated level. According to NSA Ghidra starts from Binary Code to Annotated assembly to ends up to final source code. In simple words, this software can convert all those 1’s and 0’s into human understandable language. The framework also offers a user interface instead of boring command line. It makes things easier for many.

Key features of GHIDRA

Looking at this, it makes me wonder why NSA went ahead and open sourced it. Imagine this tool in the hands of hackers. They can read your source code, find the hack and write malware for it. Then you can go ahead and see the crack for the same using the same tool. It’s an infinite loop if two parties get at it. Hopefully, we will get to see more talents in improving this software, and it is useful in better ways. Read the GHIDRA presentation notes for details. It is available for download at Github. You may want to also read this thread on Reddit. Fun Fact: WikiLeaks first revealed the existence of Ghidra in 2017. However, the software has made official into the public domain now.