Your download link is at the very bottom of the page... always.
Processed through Paypal
No account required.
Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:
|File - Download Ghidra v10.3.3|
Always scroll to the bottom of the page for the main download link.
We don't believe in fake/misleading download buttons and tricks. The link is always in the same place.
A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission
Ghidra Software Reverse Engineering Framework
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, Mac OS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of process instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.
In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.
Ghidra Installation Guide
Ghidra 10.3.3 (August 2023)
Analysis. Fixed potential infinite loop in clear flow and repair if the function found to be non-returning is cleared. (GP-3578)
Debugger:Listing. The items in the Auto-Read Memory drop-down menu are now consistently ordered. (GP-3721)
Debugger:Modules. Added a Mapping column in the Modules window. (GP-3436, Issue #5330)
Decompiler. Decompiler now prints Equate values using constant syntax highlighting. (GP-3679, Issue #5059)
GUI. Updated the Enum Editor to trim whitespace in the name field. (GP-3762, Issue #5650, #5679)
Languages. Added Debugger GNU language mapping mips:3000 to the mips.ldefs specification file in support of 32-bit MIPS processor (default variant). (GP-3453, Issue #5337)
Version Tracking. Improved Version Tracking function signature Apply Markup action to work correctly when both the source and destination functions use custom storage. (GP-3662, Issue #5559)
Analysis. Fixed x86 CALL <nextaddr>; POP EBX position independent code issue that was replacing the branch with a data reference which caused bad code flow. (GP-3687)
Data Types. Corrected issue related to setting architecture immediately after data type archive creation where data types were added. The architecture setting failed to be retained and the existing data types failed to be adjusted. (GP-3727)
Debugger. Fixed issue with default launcher command line when binary name contains spaces. (GP-3553, Issue #5460)
Debugger:Agents. Removed MODULE_[UN]LOADED events (these duplicate elementsChanged on the Modules node). Fixed NullPointerException log messages from library-load events in GDB connector. (GP-3666)
Debugger:Emulator. Fixed display of p-code op listing in P-code Stepper when using Dark Mode. (GP-3592)
Debugger:Emulator. Fixed issue launching emulator with certain architectures with multiple address spaces. (GP-3656, Issue #5556)
Debugger:Emulator. Fixed indirect branching issue when operand size doesn't match PC size. (GP-3700, Issue #5609)
Debugger:GDB. Using a better strategy for module base computation using memory mappings when available. (GP-2223, Issue #5284)
Debugger:Listing. Fixed issue with overlapping module and PC labels in Dynamic Listing and memory viewers. (GP-3469)
Debugger:Listing. Fixed hover in address field of Dynamic Listing with multiple address spaces. (GP-3661)
Debugger:Listing. Fixed issue where address-tracking drop-down cannot be accessed when certain watches are configured; e.g., (RSP+8)+8. (GP-3720)
Debugger:Modules. Fixed issue using Debugger with programs in a shared project. (GP-3664, Issue #5585)
Debugger:Watches. Fixed bug where watches cannot be assigned a type without an active trace. (GP-3718)
Decompiler. Fixed a bug preventing the Decompiler from simplifying double-precision shifts. (GP-3688, Issue #5473)
Decompiler. The Decompiler no longer tries to infer a symbol reference for a constant, if a function signature indicates the constant is not a pointer. (GP-3735)
Emulator. Fixed another context flow issue in the Emulator's decoder. (GP-3716)
GUI. Fixed the Flat Dark Theme color of the Version Tracking Matches table's filter field. (GP-3550, Issue #5560)
GUI. Fixed general Structure Editor bugs when using Tab to navigate while editing. (GP-3647, Issue #5566)
GUI. Fixed broken table navigation in the Function Tags dialog. (GP-3683, Issue #5613)
GUI. Fixed incorrect rendering of delimiter fields in table filter options. (GP-3684, Issue #5614)
GUI. Fixed an exception in the Function Call Graph when using the 'Start Fully Zoomed In' mode. (GP-3768)
Headless. Fixed several OSGi-related exceptions that could be thrown when running many instances of analyzeHeadless in parallel. (GP-3653)
Languages. Fixed ARM vcvt instruction semantics. (GP-3729)
Languages. Removed LDS/STS instructions from AVR8 in preparation for AVRtiny support (GP-3746, Issue #5231)
Processors. Fixed issue with 6809 pshu sometimes pushing to the S register. (GP-3556, Issue #5467)
Processors. Fixed regression in 6x09 compare instructions. (GP-3642)
Processors. Fixed instruction operand parsing for AARCH64 fcadd and fcmla instructions. (GP-3652, Issue #5428)
Processors. Fixed disassembly of x86 LIDT, LGDT, SIDT, and SGDT instructions. (GP-3655, Issue #5577)
Scripting. Fixed a bug that could result in the Python scripting environment using invalid script bundle paths. (GP-3619)
Click here to visit the author's website.
Continue below for the main download link.
|4,109||9,501||NSA's Research Directorate <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Ghidra7_th.png"border="0">||Sep 20, 2023 - 12:10||10.3.3||351.25MB||ZIP||, out of 45 Votes.|
Click to Rate File     Share it on Twitter → Tweet