The United States National Security Agency (NSA) this week released its in-house reverse engineering tool Ghidra to the public, for free.
Initially announced in January, the release was accompanied by a demonstration of the tool at the RSA Conference 2019, which is taking place this week in San Francisco.
Ghidra, the NSA explains, is a software reverse engineering (SRE) suite of tools developed by the agency’s Research Directorate to analyze malicious code and malware, as well as to provide cyber-security researchers with information on potential vulnerabilities in their networks and systems.
The framework packs various software analysis tools compatible with multiple platforms, including Windows, macOS, and Linux, and provides capabilities such as disassembly, assembly, decompilation, graphing and scripting, and more.
Security researchers appear enthusiastic about Ghidra, especially since, compared to standard tools in the industry, it doesn’t cost “thousands of dollars per year,” as Errata Security’s Robert Graham points out.
Graham, who notes that the tool covers all the basics of reverse engineering, allowing for easy code analysis, also posted some detailed information on various capabilities the framework has to offer.
Shortly after the tool was released, a bug has been already discovered in its debug mode, and some have already suggested this might be a backdoor the NSA intentionally implanted there.
As Graham points out, however, the bug is likely unintentional, as the NSA “are smarter than this.”
According to the NSA, the suite includes support for a wide variety of processor instruction sets and executable formats, and can be run in both user-interactive and automated modes.
Users can also develop their own Ghidra plug-in components and/or scripts using the exposed API, the agency says.
Although Ghidra is now available for download, the source code hasn’t been released yet, but the NSA says they are working on making it open source as soon as possible.
Related: NSA to Release Reverse Engineering Tool for Free Public Use
Related: GitHub Increases Bug Bounty Program Rewards, Expands Scope

More from Ionut Arghire
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- OpenAI Patches Account Takeover Vulnerabilities in ChatGPT
- New Wi-Fi Attack Allows Traffic Interception, Security Bypass
- Casino Giant Crown Resorts Investigating Ransomware Group’s Data Theft Claims
- Over 200 Organizations Targeted in Chinese Cyberespionage Campaign
- Nigerian BEC Scammer Sentenced to Prison in US
Latest News
- Anti-Bot Software Firm DataDome Banks $42M Financing
- Unpatched Security Flaws Expose Water Pump Controllers to Remote Hacker Attacks
- 500k Impacted by Data Breach at Debt Buyer NCB
- Chinese Cyberspies Use ‘Melofee’ Linux Malware for Stealthy Attacks
- Why Endpoint Resilience Matters
- Microsoft Cloud Vulnerability Led to Bing Search Hijacking, Exposure of Office 365 Data
- 3CX Confirms Supply Chain Attack as Researchers Uncover Mac Component
- UK Introduces Mass Surveillance With Online Safety Bill
