Sign in to follow this  
Kostrikov

Ghidra - Open Source Release (SRE framework made by NSA) (Reverse Engineering)

Recommended Posts

I have been trying Reverse Engineering for quite some time now and I knew about Ghidra for quite some time and today I found out that it was released for free Open Sourced on github.

 

It is coded in is Java.

 

I hope I help a lot of you with this new information.

 

This is the GitHub link:

https://github.com/N...tyAgency/ghidra

 

https://ghidra-sre.org/

Share this post


Link to post
Share on other sites

its been 2 month since it s released thats not new tho lleeeel

 

It wasn't released 2 months ago, its release was established in March, it was released like 2-3 weeks ago.

Share this post


Link to post
Share on other sites

look at that official git hub that i posted 2 month for that fucking program and one month for that source they did release the fucking source code themself that young nibba is just reposting shits

  • Like 1

Share this post


Link to post
Share on other sites

look at that official git hub that i posted 2 month for that fucking program and one month for that source they did release the fucking source code themself that young nibba is just reposting shits

 

Chill down, I definitely am not gonna repost your shit.

I didn't even know you in the first place to look at your threads to repost from you.

I simply thought it is new info and posted it here for a change.

Share this post


Link to post
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

Sign in to follow this