NSA to release Ghidra reverse engineering tool

By

Toolkit first leaked last year to be made public for free.

The US National Security Agency has decided to open source its Ghidra reverse engineering framework for free, a year after the existence of the toolkit was leaked to the world.

NSA to release Ghidra reverse engineering tool

Ghidra will be demonstrated and released at the annual RSA Conference starting March 4 in San Francisco.

The toolkit is Java-based; runs Windows, macOS, and Linux; supports a great deal of processor instruction sets; and provides an C programming language decompiler for multiple architectures.

It can be used to analyse binary files used by programs, as well as malware, that run on different operating systems.

Senior NSA adviser Robert Joyce will present at the upcoming security conference. A synopsis for his presentation notes that "the Ghidra platform includes all the features expected in high-end commercial tools, with new and expanded functionality NSA uniquely developed, and will be released for free public use at RSA."

Ghidra is expected to appear on NSA's code repository hosted by Github where the spy agency has released several other open source programs.

NSA's release of the toolkit comes a year after Julian Assange's Wikileaks site published 8761 documents and files which it said stemmed from an internal NSA network.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Phishing attack nets enormous npm supply chain compromise

Phishing attack nets enormous npm supply chain compromise

Service NSW centralises security, networking in mammoth CloudOps overhaul

Service NSW centralises security, networking in mammoth CloudOps overhaul

VicRoads to phase out passwords in favour of passkeys

VicRoads to phase out passwords in favour of passkeys

Apple adds "mercenary spyware" protection to new A19 chip

Apple adds "mercenary spyware" protection to new A19 chip

Log In

  |  Forgot your password?