Reverse Engineeringreverse engineeringdisassemblydecompilationscriptingmalware analysis

Ghidra

Ghidra is a software reverse engineering framework developed by the NSA that provides tools for analyzing compiled code across Windows, macOS, and Linux platforms. It supports disassembly, decompilation, graphing, scripting, and more for interactive and automated analysis.

Description

Ghidra is a full-featured software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. It includes a suite of high-end analysis tools enabling users to dissect compiled code on various platforms including Windows, macOS, and Linux. Key capabilities encompass disassembly, assembly, decompilation, graphing, and scripting, complemented by hundreds of additional features. The tool supports a broad range of processor instruction sets and executable formats, operating in both user-interactive and automated modes.

Users can extend Ghidra by developing custom components and scripts using Java or Python. In support of NSA's Cybersecurity mission, it addresses scaling and teaming challenges in complex SRE efforts, offering a customizable and extensible research platform. Ghidra has been applied to analyze malicious code, providing deep insights for SRE analysts investigating potential vulnerabilities in networks and systems.

How It Works

Ghidra operates as a comprehensive SRE framework with tools for disassembly, decompilation, graphing, and scripting to analyze compiled binaries. It processes a wide variety of processor instruction sets and executable formats, supporting both interactive user sessions and automated batch modes. Extensions and custom scripts in Java or Python enable tailored analysis workflows for scaling complex reverse engineering tasks.

Installation

bash
sudo apt install ghidra

Flags

-hDisplays help information (exits with error; run in foreground mode for details)

Examples

Attempts to display help information, exits with error recommending foreground mode for details
ghidra -h
Launches the Ghidra interactive SRE framework for binary analysis
ghidra
Opens a compiled binary file for disassembly, decompilation, and analysis
ghidra <path-to-binary>
Runs automated analysis using Java or Python scripts in batch mode
ghidra -scriptPath <script> -postScript <script>
Imports executable files supporting various formats and processor instruction sets
ghidra -import <file>
Performs full analysis including graphing and vulnerability detection on loaded binaries
ghidra -analyze
Updated 2026-04-16kali.org ↗