Ghidra
| Ghidra | |
|---|---|
| Disassembly of a file in Ghidra | |
| Original author(s) | NSA | 
| Initial release | March 5, 2019 | 
| Stable release | 11.3
   / February 6, 2025 | 
| Repository | github | 
| Written in | Java, C++ | 
| License | Apache License 2.0 / Public domain | 
| Website | ghidra-sre | 
Ghidra (pronounced GEE-druh; /ˈɡiːdrə/) is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. The binaries were released at RSA Conference in March 2019; the sources were published one month later on GitHub. Ghidra is seen by many security researchers as a competitor to IDA Pro. The software is written in Java using the Swing framework for the GUI. The decompiler component is written in C++, and is therefore usable in a stand-alone form.
Scripts to perform automated analysis with Ghidra can be written in Java or Python (via Jython), though this feature is extensible and support for other programming languages is available via community plugins. Plugins adding new features to Ghidra itself can be developed using a Java-based extension framework.