Your download link is at the very bottom of the page... always.

Processed through Paypal
No account required.

Donate Bitcoin to this wallet:
Donate Ethereum to this wallet:
Donate Litecoin to this wallet:

Buy our over-priced crap to help keep things running.
Take No CrapwareOG Dad CapNo Password

Join our Facebook groupFollow us on TwitterFollow us on InstagramOur RSS FeedJoin us on TikTokJoin us on LinkedIn

 Home » Freeware Downloads » Anti-Virus, Anti-Malware, Security Utilities » Malware Diagnostic Tools » Ghidra v10.3.3   
File - Download Ghidra v10.3.3

Always scroll to the bottom of the page for the main download link.
We don't believe in fake/misleading download buttons and tricks. The link is always in the same place.

Ghidra v10.3.3

A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission

SHA-256: 63833361bea8ef5ada1bc28cd2aa2ae4ab43204d2672b595500372582152eebe

Ghidra Software Reverse Engineering Framework
Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, Mac OS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of process instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.

In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.

Ghidra Installation Guide

Ghidra 10.3.3 (August 2023)

Analysis. Fixed potential infinite loop in clear flow and repair if the function found to be non-returning is cleared. (GP-3578)
Debugger:Listing. The items in the Auto-Read Memory drop-down menu are now consistently ordered. (GP-3721)
Debugger:Modules. Added a Mapping column in the Modules window. (GP-3436, Issue #5330)
Decompiler. Decompiler now prints Equate values using constant syntax highlighting. (GP-3679, Issue #5059)
GUI. Updated the Enum Editor to trim whitespace in the name field. (GP-3762, Issue #5650, #5679)
Languages. Added Debugger GNU language mapping mips:3000 to the mips.ldefs specification file in support of 32-bit MIPS processor (default variant). (GP-3453, Issue #5337)
Version Tracking. Improved Version Tracking function signature Apply Markup action to work correctly when both the source and destination functions use custom storage. (GP-3662, Issue #5559)


Analysis. Fixed x86 CALL <nextaddr>; POP EBX position independent code issue that was replacing the branch with a data reference which caused bad code flow. (GP-3687)
Data Types. Corrected issue related to setting architecture immediately after data type archive creation where data types were added. The architecture setting failed to be retained and the existing data types failed to be adjusted. (GP-3727)
Debugger. Fixed issue with default launcher command line when binary name contains spaces. (GP-3553, Issue #5460)
Debugger:Agents. Removed MODULE_[UN]LOADED events (these duplicate elementsChanged on the Modules node). Fixed NullPointerException log messages from library-load events in GDB connector. (GP-3666)
Debugger:Emulator. Fixed display of p-code op listing in P-code Stepper when using Dark Mode. (GP-3592)
Debugger:Emulator. Fixed issue launching emulator with certain architectures with multiple address spaces. (GP-3656, Issue #5556)
Debugger:Emulator. Fixed indirect branching issue when operand size doesn't match PC size. (GP-3700, Issue #5609)
Debugger:GDB. Using a better strategy for module base computation using memory mappings when available. (GP-2223, Issue #5284)
Debugger:Listing. Fixed issue with overlapping module and PC labels in Dynamic Listing and memory viewers. (GP-3469)
Debugger:Listing. Fixed hover in address field of Dynamic Listing with multiple address spaces. (GP-3661)
Debugger:Listing. Fixed issue where address-tracking drop-down cannot be accessed when certain watches are configured; e.g., (RSP+8)+8. (GP-3720)
Debugger:Modules. Fixed issue using Debugger with programs in a shared project. (GP-3664, Issue #5585)
Debugger:Watches. Fixed bug where watches cannot be assigned a type without an active trace. (GP-3718)
Decompiler. Fixed a bug preventing the Decompiler from simplifying double-precision shifts. (GP-3688, Issue #5473)
Decompiler. The Decompiler no longer tries to infer a symbol reference for a constant, if a function signature indicates the constant is not a pointer. (GP-3735)
Emulator. Fixed another context flow issue in the Emulator's decoder. (GP-3716)
GUI. Fixed the Flat Dark Theme color of the Version Tracking Matches table's filter field. (GP-3550, Issue #5560)
GUI. Fixed general Structure Editor bugs when using Tab to navigate while editing. (GP-3647, Issue #5566)
GUI. Fixed broken table navigation in the Function Tags dialog. (GP-3683, Issue #5613)
GUI. Fixed incorrect rendering of delimiter fields in table filter options. (GP-3684, Issue #5614)
GUI. Fixed an exception in the Function Call Graph when using the 'Start Fully Zoomed In' mode. (GP-3768)
Headless. Fixed several OSGi-related exceptions that could be thrown when running many instances of analyzeHeadless in parallel. (GP-3653)
Languages. Fixed ARM vcvt instruction semantics. (GP-3729)
Languages. Removed LDS/STS instructions from AVR8 in preparation for AVRtiny support (GP-3746, Issue #5231)
Processors. Fixed issue with 6809 pshu sometimes pushing to the S register. (GP-3556, Issue #5467)
Processors. Fixed regression in 6x09 compare instructions. (GP-3642)
Processors. Fixed instruction operand parsing for AARCH64 fcadd and fcmla instructions. (GP-3652, Issue #5428)
Processors. Fixed disassembly of x86 LIDT, LGDT, SIDT, and SGDT instructions. (GP-3655, Issue #5577)
Scripting. Fixed a bug that could result in the Python scripting environment using invalid script bundle paths. (GP-3619)

Click here to visit the author's website.
Continue below for the main download link.

Downloads Views Developer Last Update Version Size Type Rank
4,483 10,140 NSA's Research Directorate <img src=""border="0"> Sep 20, 2023 - 12:10 10.3.3 351.25MB ZIP 5/5, out of 47 Votes.
File Tags
Ghidra  v10.3.3  
Whoa! Slow down there, Speedy.
Kindly read this and then continue to download below.

Like seeing no ads? No misleading/fake download buttons?
We like it too! This site has been kept alive for 15 years
because of people just like you who download and donate.
No one is stopping you from downloading without donating
but the site runs on the "Honor System". If your momma
raised you to be honorable, make a donation and download
'til ya turn blue. Make your momma proud!

Thank you! -Randy & Deanna (The Older Geeks)
Missouri Ozarks, USA

Monthly operating costs = $750
Donations cover operating costs first
then are set aside for future upgrades and/or
handed-over to Deanna for new shoes.


Send a check payable to Home Computer Repair LLC, 208 E. Water St. Mount Vernon, MO 65712

Recent Super Donors ($50+)
Thanks, Russell
Thanks, Home Business Services Inc
Thanks, Robert
Thanks, Robert

Recent Donors
Thanks, Henry
Thanks, Terry
Thanks, Larry
Thanks, Marvin
Thanks, Jay
Thanks, Emmett
Thanks, Bronson
Thanks, Kim
Thanks, Michael
Thanks, Priscilla

→ Download Your File ←

Click to Rate File     Share it on Twitter → Copyright (c) 2024