NSA Release Ghidra 11.3 - Software Reverse Engineering Tool
The U.S. National Security Agency (NSA) Research Directorate has released version 11.3 of Ghidra, an open-source software reverse engineering (SRE) framework. This version introduces several enhancements and new features, providing advanced analysis tools for dissecting compiled code across Windows, macOS, and Linux.
Ghidra is a free and open-source reverse engineering tool developed by the NSA. Its binaries were released at the RSA Conference in March 2019, followed by the source code publication on GitHub a month later. Many security researchers consider Ghidra a competitor to IDA Pro.
The software is primarily written in Java, utilizing the Swing framework for its graphical user interface (GUI). Its decompiler, written in C++, can also function independently. Ghidra supports scripting for automated analysis in Java and Python (via Jython), with extensibility for additional programming languages through community-developed plugins. Developers can further enhance Ghidra by creating plugins using a Java-based extension framework.
Brief History
Ghidra's existence was first revealed in March 2017 through the Vault 7 leaks. However, the software itself remained classified until its official release two years later. Comments within its source code suggest that Ghidra has been in development since at least 1999.
Ghidra 11.3 - What's New?
11.3 Compatibility
Ghidra 11.3 remains fully backward compatible with project data from previous versions. However, programs and data type archives created or modified in this version will not be compatible with earlier versions of Ghidra.
Visual Studio Code Integration
Ghidra 11.3 enhances support for Visual Studio Code by replacing the VSCodeProjectScript.java GhidraScript (introduced in version 11.2) with two new actions in the CodeBrowser tool:
Ghidra attempts to locate your VS Code installation automatically. If needed, you can configure it via: Edit → Tool Options → Visual Studio Code Integration.
PyGhidra: Python Integration
The PyGhidra Python library, originally developed by the Department of Defense Cyber Crime Center (DC3) as Pyhidra, enables direct access to the Ghidra API within a native CPython 3 interpreter via JPype. It allows users to:
JIT-Accelerated Emulator
Ghidra 11.3 introduces a just-in-time (JIT) accelerated p-code emulator, improving performance for dynamic analysis. While not yet integrated into the UI, the JitPcodeEmulator is available for scripting and plugin development, acting as a near drop-in replacement for the PcodeEmulator.
This update enhances emulation speed but is still in early stages, meaning developers should expect potential bugs. Users can refer to Javadoc for details on usage and integration.
Debugger Enhancements
The debugging infrastructure in Ghidra 11.3 has been streamlined, with the removal of legacy IN-VM and GADP launchers and connectors. These have been replaced with TraceRmi-based implementations, leading to a cleaner and more efficient API.
Additionally, the update enhances kernel-level debugging:
领英推荐
Function Graph Improvements
New updates enhance Function Graph navigation and visualization:
Source File Information
Ghidra 11.3 improves source code mapping by allowing integration of source file and line information using a Program’s SourceFileManager.
Enhancements include:
A new “View Source…” action enables users to open source files at the correct line in Eclipse or VS Code.
Processor Enhancements
Ghidra 11.3 includes improvements to processor support:
String Translation & Text Search
New features enhance text analysis and search capabilities:
Disclaimer:
Ghidra should only be used in a sandboxed environment such as a virtual machine designed for analyzing malware, do not attempt to analyze malware on your host operating system.
Download Ghidra 11.3 on GitHub Here
| IT-Administrator |
2 周interesting.
OK Bo?tjan Dolin?ek
I would still prefer IDA Pro Ghidra chokes on larger binaries + IDA has more plugins to work with.
Hacker intelligence system
3 周I haven't got a chance to use it yet kinda sound fishey to me
Software Developer / Elektro Techniker
3 周Wow... ?? ?? ?? Thats a good Tool, too. https://www.manomano.de/p/fuchsschwanz-handsage-fs-550-11880698?model_id=11880698