Pages: [1]
Author Topic: NSA's Reverse Engineering Tool "Ghidra" Finally Released  (Read 6421 times)
QuickS4
Full Member
***

Karma: +6/-6
Offline Offline

Posts: 72


« on: March 06, 2019, 10:57:01 PM »

I came across this tool reading an article just released today about the NSA's tool that's been released as open source.  May or may not be useful here, I believe it can be for those who can use it that's why I shared it.  Much like IDA, it's capable of a lot and much more.  Probably simpler to use than IDA, I haven't cracked it open just yet. But plan to soon.  Here's the link below. Couldn't upload the zip, only 20mb limit. Grrr. The zip is 286mb.

Enjoy!

https://ghidra-sre.org/



Sent from my Pixel XL using Tapatalk

Logged
d3irb
Full Member
***

Karma: +131/-1
Offline Offline

Posts: 185


« Reply #1 on: March 06, 2019, 11:19:45 PM »

I vastly prefer the interface to IDA and being free and open source is obviously a huge win. A lot of things in PC reverse engineering are much easier like function definitions, cross module references, and calling convention definition for the decompiler. But it doesn't yet have CPU modules for anything we use besides PPC. With C167 and Tricore support it could be awesome. Processor modules don't look too complex to implement. Could be a good community project.
Logged
gman86
Hero Member
*****

Karma: +45/-128
Offline Offline

Posts: 705


« Reply #2 on: March 07, 2019, 02:24:24 AM »

I came across this tool reading an article just released today about the NSA's tool that's been released as open source.  May or may not be useful here, I believe it can be for those who can use it that's why I shared it.  Much like IDA, it's capable of a lot and much more.  Probably simpler to use than IDA, I haven't cracked it open just yet. But plan to soon.  Here's the link below. Couldn't upload the zip, only 20mb limit. Grrr. The zip is 286mb.

Enjoy!

https://ghidra-sre.org/



Sent from my Pixel XL using Tapatalk



Nice try, NSA!
Logged
Blazius
Hero Member
*****

Karma: +89/-40
Offline Offline

Posts: 1277



« Reply #3 on: March 07, 2019, 02:34:57 AM »

Nice try, NSA!

lmao
Logged
QuickS4
Full Member
***

Karma: +6/-6
Offline Offline

Posts: 72


« Reply #4 on: March 07, 2019, 08:36:19 AM »

Nice try, NSA!
Lol
Logged
matt
Newbie
*

Karma: +1/-0
Offline Offline

Posts: 3


« Reply #5 on: March 15, 2019, 11:08:42 AM »

Anyone interested in working together to add C166 and Tricore? 

Decompiling ECU code is a game-changer. 
Logged
nihalot
Full Member
***

Karma: +40/-3
Offline Offline

Posts: 116


« Reply #6 on: March 15, 2019, 11:48:23 AM »

I am Smiley
Logged

www.tangentmotorsport.com

multimap/LC/rolling antilag for MED17/EDC17/MED9/EDC15

contact for reverse engineering services of any ECU/TCU
QuickS4
Full Member
***

Karma: +6/-6
Offline Offline

Posts: 72


« Reply #7 on: March 15, 2019, 01:39:32 PM »

I am Smiley
Nice nihalot!  Would love to see that

Sent from my Pixel XL using Tapatalk

Logged
matt
Newbie
*

Karma: +1/-0
Offline Offline

Posts: 3


« Reply #8 on: May 16, 2019, 09:35:19 PM »

 Cool Cool Cool

https://github.com/NationalSecurityAgency/ghidra/pull/567

(not my PR, but I've used it and it works)
Logged
Pages: [1]
  Print  
 
Jump to:  

Powered by SMF 1.1.21 | SMF © 2015, Simple Machines Page created in 0.029 seconds with 17 queries. (Pretty URLs adds 0s, 0q)