The Wayback Machine - https://web.archive.org/web/20211103123512/https://github.com/topics/ghidra
Skip to content
#

Ghidra

ghidra logo

Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA's Research Directorate in support of the Cybersecurity mission.

Here are 191 public repositories matching this topic...

jstaursky
jstaursky commented Nov 10, 2020

pdgsd does not seem to process PUSH EBP very well, the p-code semantics show up as

    (unique,0x12f0,4) = COPY EBP
    ESP = INT_SUB ESP, 0x4
    (unique,0x12f0,4) = STORE ram[ESP]

which doesn't make sense. Last line should be STORE ram[ESP] = (unique,0x12f0,4)

the raw p-code will show you:

STORE (const,0x55fef11636d0,8) (register,ESP,4) (unique,0x1b50,4)

and the

XVilka
XVilka commented Dec 13, 2019

I noticed you have a plugin for Ghidra, but it is not the only one FOSS tool available.
Radare2 is a highly-portable cross-platform reverse engineering framework and a toolkit without dependencies. It has support for analyzing binaries, disassembling code, debugging programs, attaching to remote GDB/LLDB, WinDbg servers, rich plugin system (see r2pm), an

Created by National Security Agency

Released March 5, 2019

Latest release about 1 month ago

Repository
NationalSecurityAgency/ghidra
Website
ghidra-sre.org
Wikipedia
Wikipedia

Related Topics

disassembler reverse-engineering software-analysis