TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

NSA Ghidra open-source reverse engineering framework

127 pointsby modinfo12 months ago

11 comments

jonatron12 months ago
I wonder how Hex-Rays IDA sales are doing since Ghidra was released. Edit: If anyone can read French accounts: <a href="https:&#x2F;&#x2F;consult.cbso.nbb.be&#x2F;consult-enterprise&#x2F;0873473914" rel="nofollow">https:&#x2F;&#x2F;consult.cbso.nbb.be&#x2F;consult-enterprise&#x2F;0873473914</a>
评论 #40510299 未加载
评论 #40509994 未加载
评论 #40510940 未加载
评论 #40510479 未加载
评论 #40510724 未加载
评论 #40510109 未加载
评论 #40510363 未加载
boricj12 months ago
I&#x27;m developing my own Ghidra extension that can export object files out of a program selection: <a href="https:&#x2F;&#x2F;github.com&#x2F;boricj&#x2F;ghidra-delinker-extension">https:&#x2F;&#x2F;github.com&#x2F;boricj&#x2F;ghidra-delinker-extension</a><p>Ghidra&#x27;s data model, analyzers and UI gave me a framework that allowed me to experiment and focus on the specifics of delinking, which is the key to make this idea work. Without that, I would not have been able to pull it off and I would&#x27;ve given up on my decompilation project a long time ago, for lack of a means to divide and conquer it.
sentrysapper12 months ago
Joe Grand&#x27;s latest video shows a clever usage of Ghidra to understand insecure password generator methods and recover lost BTC. <a href="https:&#x2F;&#x2F;youtu.be&#x2F;o5IySpAkThg?si=EGhF7Jf01G6nQPL9" rel="nofollow">https:&#x2F;&#x2F;youtu.be&#x2F;o5IySpAkThg?si=EGhF7Jf01G6nQPL9</a>
评论 #40511270 未加载
FL33TW00D12 months ago
Can we put a date on this? I was in undergrad when this was released.
评论 #40510476 未加载
评论 #40510186 未加载
doktrin12 months ago
Purely out of ignorance - what&#x27;s the context here? I&#x27;m not in this space, but afaik Ghidra was released years ago so I&#x27;m guessing this post was triggered by a recent development, but it&#x27;s not clear what that might be.
评论 #40509986 未加载
评论 #40511056 未加载
评论 #40517533 未加载
评论 #40510013 未加载
评论 #40510640 未加载
mschuster9112 months ago
Ghidra is <i>powerful</i>. The only thing I miss is the ability to actually do versioned (=Git) collaboration, or at least to publish stuff to Github or whatever <i>without</i> needing to either host Ghidra Server myself or depend on someone else.
评论 #40510500 未加载
ur-whale12 months ago
Ghidra is an amazing tool, and indeed the fact that the NSA contributed this to the public is amazing, but understandable if your goal is to enhance cyber-security: it is the perfect swiss knife to figure out if there&#x27;s nasty things embedded in binary blobs.<p>The one thing I would love to see come to Ghidra is an ML powered assistant that adds two features:<p><pre><code> - AI-powered automated, semantically relevant, routine and variable naming - AI-powered compiler recognition and improved recovery of loop structure </code></pre> Both things should be possible using LLMs and the fact that compilers can be used to generate an infinite size training set for almost free.
评论 #40510396 未加载
acheong0812 months ago
Nothing but praise for Ghidra. It’s very powerful and intuitive to use. I’m still stunned that the NSA contributed to the public for once
评论 #40509850 未加载
评论 #40509789 未加载
评论 #40510204 未加载
评论 #40511028 未加载
评论 #40509711 未加载
broodbucket12 months ago
I just can&#x27;t stand Ghidra&#x27;s UI. Trying to get it to look nice, at least on Linux with HiDPI, is such a chore. These Eclipse-y GUIs have aged like milk
评论 #40513341 未加载
评论 #40511254 未加载
评论 #40511542 未加载
tutipop12 months ago
What&#x27;s the history of the name?<p>Ghidra sounds Russian (Гидра) for Hydra.<p>Was it considered cool to use Russian words for hacker&#x2F;spy things?
评论 #40511781 未加载
评论 #40511550 未加载
评论 #40514338 未加载
kebman12 months ago
Just looking at what AI can do with a simple error message should tell you heaps and bounds how much help it could be in analysis for reverse engineering.