Ghidra is a collection of programs for reverse-engineering of software. It was publicly released in 2019 by the U.S. National Security Agency (NSA), after being used for some time as an internal tool. Ghidra itself is written in Java, but it seems mostly intended to by used on machine-code programs. Ghidra's project format (which, in addition to files relating to analysis, includes the target executables themselves, as these have to be "imported" before anything can be done with them) uses a directory structure instead of a single file; although most of the actual data is hidden in subdirectories, there is a file in the top-level directory whose name is the name of the project followed by ".gpr".
- Page on the main NSA website
- Ghidra: A quick overview for the curious
- Very short document on Ghidra "leaked" in 2017, when it was only an internal tool
- ↑ https://web.archive.org/web/20190306002754/https://www.ghidra-sre.org/ captures the initial public release to within less than a day
- ↑ https://www.wired.com/story/nsa-ghidra-open-source-tool/