Processed through Paypal
No account required.


Donate Bitcoin to this wallet:
1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum to this wallet:
0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin to this wallet:
LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

  Our merchandise, sold here, helps keep the site alive.  


Facebook Follow @GeekOnTheLoose




 Home » OlderGeeks.com Freeware Downloads » Anti-Virus, Anti-Malware, Security Utilities » Malware Diagnostic Tools » Ghidra v9.1.1   
File - Download Ghidra v9.1.1
Description

FYI, always scroll to the bottom of the page to download files on OlderGeeks.com.
We don't believe in fake/misleading download buttons and tricks. The link is always in the same place.



Ghidra v9.1.1

A software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission

b0d40a4497c66011084e4a639d61ac76da4b4c5cabd62ab63adadb7293b0e506 ghidra_9.1.1_PUBLIC_20191218.zip

Ghidra Software Reverse Engineering Framework

Ghidra is a software reverse engineering (SRE) framework created and maintained by the National Security Agency Research Directorate. This framework includes a suite of full-featured, high-end software analysis tools that enable users to analyze compiled code on a variety of platforms including Windows, Mac OS, and Linux. Capabilities include disassembly, assembly, decompilation, graphing, and scripting, along with hundreds of other features. Ghidra supports a wide variety of process instruction sets and executable formats and can be run in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python.

In support of NSA's Cybersecurity mission, Ghidra was built to solve scaling and teaming problems on complex SRE efforts, and to provide a customizable and extensible SRE research platform. NSA has applied Ghidra SRE capabilities to a variety of problems that involve analyzing malicious code and generating deep insights for SRE analysts who seek a better understanding of potential vulnerabilities in networks and systems.

Ghidra Installation Guide


Ghidra v9.1.1 (December 2019)

Improvements

Importer:MachO. Improved import/load time of DYLD shared cache files. (GT-3261)
Program API. Cached the addresses that correspond to executable memory to improve analysis performance. (GT-3260)

Bugs

Analysis. Fixed a symbol name error that occurred in the Objective-C analyzer. (GT-3321, Issue #1200)
Analysis. Constant references are now computed correctly within functions in overlay spaces. (GT-3373)
Build. Corrected build of DMG.jar which was improperly built within Ghidra 9.1 release. (GT-3364)
Decompiler. Fixed bug causing Pcode: XML comms: Badly formed address errors when decompiling HCS12 XGATE code. (GT-3297)
Decompiler. Fixed Array DataType must be Fixed length exceptions related to function pointer data types. (GT-3309)
Decompiler. Fixed bug causing decompiler to drop statements, assigning string constants to global variables. (GT-3315)
Decompiler. Fixed issue with enum name strings causing Low-level Error: XML error: syntax error in the decompiler. (GT-3387, Issue #1329)
GUI. Fixed a potential ConcurrentModificationException in the interactive python interpreter. (GT-3280)
Importer:PE. Fixed an exception in the PeLoader that occurred when the size of the memory block for the headers is larger than the file size. (GT-3344, Issue #1266)
Languages. Corrected Sparc floating point instruction pcode implementation. (GT-3202)
Languages. Corrected the semantics of the PowerPC e_cmpi instruction. (GT-3228, Issue #1127)
Languages. Corrected bit generation for PowerPC instructions se_bclri, se_bgeni, se_bseti, and se_btsti. (GT-3232, Issue #967)
Languages. Corrected register definitions for x86 RDRAND instruction. (GT-3253, Issue #1169)
Languages. Corrected signed immediate calculation for some powerPC VLE offsets being incorrect. (GT-3254, Issue #1160)
Languages. Resolved issue with x86 escape opcodes preventing certain instruction patterns from decoding. (GT-3256)
Languages. Corrected bug in XGATE LDH instruction shifting out high bits. (GT-3268)
Languages. Corrected processing of R_MIPS_REL32, R_X86_64_RELATIVE, and R_X86_64_RELATIVE64 ELF relocations affecting relocatable binaries which have non-zero section/segment load addresses. (GT-3349)
Listing. Fixed missing scroll bar in listing. (GT-3290)
Listing. Fixed issue that was causing a stack trace to be generated when contiguous addresses were cleared for a range greater than Integer.MAX. (GT-3357)
Listing:References. Corrected Create Default Reference action bug which did not handle composite/array data components properly. (GT-3371)
































Click here to visit the author's website.
Continue below to download this file.


Downloads Views Developer Last Update Version Size Type Rank
925 2,328 NSA's Research Directorate <img src="https://www.oldergeeks.com/downloads/gallery/thumbs/Ghidra7_th.png"border="0"> Feb 13, 2020 - 12:31 9.1.1 288.22MB ZIP 5/5, out of 7 Votes.
File Tags
Ghidra  v9.1.1  
      
Whoa! Slow down there, Speedy.
Read this and then continue to the download.

Like seeing no ads? No misleading/fake download buttons?
We like it too! This site has been kept alive for 10 years
because of people just like you who download and donate.
No one is stopping you from downloading without donating
but the site runs on the "Honor System". If your momma
raised you to be honorable, make a donation and download
'til ya turn blue. Make your momma proud!

Thank you! -Randy & Deanna (The Older Geeks)

Monthly operating costs = $560
Donations for April = $94
Donations over our monthly goal
are set aside for future upgrades.

Processed securely through Paypal.
When you donate, it will say "Home Computer Repair LLC".
This is our computer store account.
Or...

Or...
Donate Bitcoin: 1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfm
Donate Ethereum: 0x40E56922F43637224935CDC35e2c96E0392A8505
Donate Litecoin:LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL
Or...
Just send a check to our computer store payable to Home Computer Repair LLC.
Our address: Home Computer Repair LLC, 208 E. Water St. Mount Vernon, MO 65712

Recent Super Donors ($50+)
Thanks, Dave
Thanks, Kelli
Thanks, Michelle

Recent Donors
Thanks, Chris
Thanks, Alex
Thanks, Jered
Thanks, Ila
Thanks, W.S.
Thanks, Steven
Thanks, George
Thanks, Litecoin donor
Thanks, Daniel
Thanks, J.

   →→ Download Now ←← - Click to Rate File -
Like? Share this page on Twitter →


Copyright (c) 2019