GHIDRA, the powerful reverse engineering tool developed and used in-house by the National Security Agency (NSA) to fish out bugs in software and applications has been released to the public.

While reverse engineering a program means disassembling it, the breaking of binary instructions into assembly code, employed by software engineers to understand the functionality, design and implementation of the software.

The NSA is reported to have developed several hacking tools to break into all versions of software and even control computers, including those running on Windows, MacOS and Linux, of which GHIDRA is one, and tied to the NSA's Tailored Access Operations, it is capable of identifying computers that are vulnerable to malicious third-party software.

GHIDRA is especially useful in the unraveling of weak spots in software and application in order to exploit them by multiple users reverse engineering the same binary at a time.

It includes all the new and expanded functionality of NSA reverse engineering capabilities uniquely developed, and works with a variety of processor sets; instruction and executable format, also able to run in both user-interactive and automated modes.

GHIDRA has been warmly received by the infosec community, who have already started contributing to the project on its Github issue tracker. And the good news remains that the NSA has open sourced the tool with Apache 2.0 license, which it claims is a contribution to the cyber-security community.

GHIDRA, the NSA’s in-house Reverse Engineering tool now Open Source



GHIDRA, the powerful reverse engineering tool developed and used in-house by the National Security Agency (NSA) to fish out bugs in software and applications has been released to the public.

While reverse engineering a program means disassembling it, the breaking of binary instructions into assembly code, employed by software engineers to understand the functionality, design and implementation of the software.

The NSA is reported to have developed several hacking tools to break into all versions of software and even control computers, including those running on Windows, MacOS and Linux, of which GHIDRA is one, and tied to the NSA's Tailored Access Operations, it is capable of identifying computers that are vulnerable to malicious third-party software.

GHIDRA is especially useful in the unraveling of weak spots in software and application in order to exploit them by multiple users reverse engineering the same binary at a time.

It includes all the new and expanded functionality of NSA reverse engineering capabilities uniquely developed, and works with a variety of processor sets; instruction and executable format, also able to run in both user-interactive and automated modes.

GHIDRA has been warmly received by the infosec community, who have already started contributing to the project on its Github issue tracker. And the good news remains that the NSA has open sourced the tool with Apache 2.0 license, which it claims is a contribution to the cyber-security community.

No comments