{"id":25885,"date":"2019-03-06T02:12:00","date_gmt":"2019-03-06T02:12:00","guid":{"rendered":"http:\/\/92e214ed-50e9-4079-a915-4b52efe40eed"},"modified":"2019-03-06T02:12:00","modified_gmt":"2019-03-06T02:12:00","slug":"nsa-release-ghidra-a-free-software-reverse-engineering-toolkit","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/","title":{"rendered":"NSA release Ghidra, a free software reverse engineering toolkit"},"content":{"rendered":"<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet2.cbsistatic.com\/hub\/i\/2019\/03\/06\/4abac187-116e-489e-b959-8d6b9cb6248c\/0146d8e05b5c2690f0256d23b7b9dd7d\/ghidra.png\" class alt=\"Ghidra logo\"><\/span><span class=\"credit\">Image: NSA<\/span><\/p>\n<p>At the RSA security conference today, the National Security Agency, released Ghidra, a free software reverse engineering tool that the agency had been using internally for well over a decade.<\/p>\n<p>The tool is ideal for software engineers, but will be especially useful for malware analysts first and foremost.<\/p>\n<p>The NSA&#8217;s general plan was to release Ghidra so security researchers can get used to working with it before applying for positions at the NSA or other government intelligence agencies with which the NSA has previously shared Ghidra in private.<\/p>\n<p>Ghidra is currently available for download only through its <a href=\"https:\/\/ghidra-sre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">official website<\/a>, but the NSA also plans to release its source code under an open source license <a href=\"https:\/\/github.com\/NationalSecurityAgency\/ghidra\" target=\"_blank\" rel=\"noopener noreferrer\">on GitHub<\/a> in the coming future.<\/p>\n<p>News that the NSA was going to release Ghidra first broke <a href=\"https:\/\/www.zdnet.com\/article\/nsa-to-release-a-free-reverse-engineering-tool\/\" target=\"_blank\">at the start of the year<\/a>, and the tool has been on everybody&#8217;s mind for the past two months.<\/p>\n<p>The reason is that Ghidra is a free alternative to IDA Pro, a similar reverse engineering tool that&#8217;s only available under a very expensive commercial license, priced in the range of thousands of US dollars per year.<\/p>\n<p>Being offered for free, most experts expect Ghidra to snap up a big portion of the reverse engineering tools market share within weeks, especially since early user reviews are almost all entirely positive.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/\" class=\"lazy\" alt=\"Ghidra code browser\" data-original=\" https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/03\/06\/e9565a50-4ee4-4915-a9c9-63f908cfa492\/c9418adc01ccffa9786cb363a97279a5\/ghidra-code-browser.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/03\/06\/e9565a50-4ee4-4915-a9c9-63f908cfa492\/c9418adc01ccffa9786cb363a97279a5\/ghidra-code-browser.png\" class alt=\"Ghidra code browser\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span> <span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/\" class=\"lazy\" alt=\"Ghidra version tracking\" data-original=\" https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2019\/03\/06\/aca25ae2-7946-48ad-a40c-5a471f5c77bf\/5b51f0dc1fe7f50a5c73fcbda9603dca\/ghidra-versin-tracking.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet1.cbsistatic.com\/hub\/i\/2019\/03\/06\/aca25ae2-7946-48ad-a40c-5a471f5c77bf\/5b51f0dc1fe7f50a5c73fcbda9603dca\/ghidra-versin-tracking.png\" class alt=\"Ghidra version tracking\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<section class=\"sharethrough-top\" data-component=\"medusaContentRecommendation\" data-medusa-content-recommendation-options=\"{&quot;promo&quot;:&quot;promo_ZD_recommendation_sharethrough_top_in_article_desktop&quot;,&quot;spot&quot;:&quot;dfp-in-article&quot;}\">\n<\/section>\n<p>As for its technical features, Ghidra is coded in Java, has a graphical user interface (GUI), and works on Windows, Mac, and Linux.<\/p>\n<p>According to Rob Joyce, Senior Advisor at the National Security Agency and the NSA official who announced the tool&#8217;s release today <a href=\"https:\/\/www.rsaconference.com\/events\/us19\/agenda\/sessions\/16608-come-get-your-free-nsa-reverse-engineering-tool\" target=\"_blank\" rel=\"noopener noreferrer\">at the RSA conference<\/a>, Ghidra can analyze binaries written for a wide variety of architectures, and can be easily extended with more, if ever needed.<\/p>\n<div class=\"twitterContainer\" readability=\"15.35\">\n<blockquote class=\"twitter-tweet\" readability=\"23.984375\">\n<p lang=\"en\" dir=\"ltr\">Ghidra processor modules: X86 16\/32\/64, ARM\/AARCH64, PowerPC 32\/64, VLE, MIPS 16\/32\/64,micro, 68xxx, Java \/ DEX bytecode, PA-RISC, PIC 12\/16\/17\/18\/24, Sparc 32\/64, CR16C, Z80, 6502, 8051, MSP430, AVR8, AVR32, Others+ variants as well. Power users can expand by defining new ones<\/p>\n<p>\u2014 Rob Joyce (@RGB_Lights) <a href=\"https:\/\/twitter.com\/RGB_Lights\/status\/1103019876203978752?ref_src=twsrc%5Etfw\">March 5, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<p>Installing Ghidra is as simple as unpacking a ZIP archive. The only requirement is a version of the Java Development Kit 11 or later that&#8217;s needed to run the app&#8217;s GUI. More on the tool&#8217;s installation routine from the tool&#8217;s official docs:<\/p>\n<blockquote readability=\"12\">\n<p>Ghidra does not use a traditional installer program. Instead, the Ghidra distribution file is simply extracted in-place on the filesystem. This approach has advantages and disadvantages. On the up side, administrative privilege is not required to install Ghidra for personal use. Also, because installing Ghidra does not update any OS configurations such as the registry on Windows, removing Ghidra is as simple as deleting the Ghidra installation directory.<\/p>\n<\/blockquote>\n<p>Besides an installation guide, Ghidra&#8217;s docs also come with classes and exercises for beginners, intermediates, and advanced levels that will help users get used to the tool&#8217;s GUI, which is very different from any similar tools.<\/p>\n<p>You&#8217;re a IDA Pro power user? No problem, there&#8217;s a guide for that too.<\/p>\n<p>Need a keyboard shortcut cheatsheet? No problem, there&#8217;s one hosted online, <a href=\"https:\/\/ghidra-sre.org\/CheatSheet.html\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/p>\n<p>Don&#8217;t like the bright GUI? No problem, there&#8217;s a dark mode included in Ghidra&#8217;s settings section.<\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/www.zdnet.com\/article\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/\" class=\"lazy\" alt=\"Ghidra dark mode\" data-original=\" https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/03\/06\/6536ced5-9b89-40f3-b0d4-d7e7a33e2722\/aa8ce715ff3392bac2c2b4b1e73586a5\/ghidra-dark-mode.png\"><\/span><noscript><\/p>\n<p><span class=\"img aspect-set\"><img decoding=\"async\" src=\"https:\/\/zdnet4.cbsistatic.com\/hub\/i\/2019\/03\/06\/6536ced5-9b89-40f3-b0d4-d7e7a33e2722\/aa8ce715ff3392bac2c2b4b1e73586a5\/ghidra-dark-mode.png\" class alt=\"Ghidra dark mode\"><\/span><\/p>\n<p><\/noscript> <span class=\"credit\">Image: ZDNet<\/span><\/p>\n<p>At the time of this article &#8211;an hour after the tool&#8217;s release&#8211; the reaction from the infosec (information security) community has been almost entirely positive, with glowing reviews from some of the biggest names in the cyber-security industry.<\/p>\n<div class=\"twitterContainer\" readability=\"6.1551020408163\">\n<blockquote class=\"twitter-tweet\" readability=\"5.6816326530612\">\n<p lang=\"en\" dir=\"ltr\">The good things:<\/p>\n<p>&#8211; The decompiler is fucking awesome.<br \/>&#8211; The decompiler supports anything that you can disassemble.<br \/>&#8211; Everything is fully integrated.<br \/>&#8211; Multi-binaries projects with version control.<br \/>&#8211; Undo!<\/p>\n<p>\u2014 Joxean Koret (@matalaz) <a href=\"https:\/\/twitter.com\/matalaz\/status\/1103094628478263298?ref_src=twsrc%5Etfw\">March 6, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<div class=\"twitterContainer\" readability=\"7.4438502673797\">\n<blockquote class=\"twitter-tweet\" data-conversation=\"none\" readability=\"8.3743315508021\">\n<p lang=\"en\" dir=\"ltr\">Yes, I&#8217;m going to start using it for all new projects. So far, it looks like it can replace enough of my workflow in IDA that I can switch, phew!<\/p>\n<p>\u2014 Tavis Ormandy (@taviso) <a href=\"https:\/\/twitter.com\/taviso\/status\/1103103785373655040?ref_src=twsrc%5Etfw\">March 6, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<p>Ghidra may not be the IDA Pro killer most experts expected, since IDA Pro still offers a debugger component not present in Ghidra, but things are looking up.<\/p>\n<p>Because Ghidra&#8217;s code will be open-sourced, this also means it will be open to community contributions, and many expect it to receive a debugger in the coming future and allow malware analysts to jump ship and stop paying a fortune for IDA licenses.<\/p>\n<p>And the infosec community has already started contributing back to Ghidra, even if the tool&#8217;s source code hasn&#8217;t been published on GitHub just yet.<\/p>\n<p>Just minutes after the tool&#8217;s release, Matthew Hickey, co-founder and director of UK-based cyber-security firm Hacker House, reported the first security issue in the NSA&#8217;s tool, which apprently runs a server component that listens to commands it receives from the internet. Fixing it should be a one-line change, though, according to Hickey.<\/p>\n<div class=\"twitterContainer\" readability=\"6.4494163424125\">\n<blockquote class=\"twitter-tweet\" readability=\"6.8793774319066\">\n<p lang=\"en\" dir=\"ltr\">Ghidra opens up JDWP in debug mode listening on port 18001, you can use it to execute code remotely \ud83e\udd26\u200d\u2642\ufe0f.. to fix change line 150 of support\/launch.sh from * to 127.0.0.1 <a href=\"https:\/\/t.co\/J3E8q5edC7\">https:\/\/t.co\/J3E8q5edC7<\/a><\/p>\n<p>\u2014 Hacker Fantastic (@hackerfantastic) <a href=\"https:\/\/twitter.com\/hackerfantastic\/status\/1103087869063704576?ref_src=twsrc%5Etfw\">March 6, 2019<\/a><\/p><\/blockquote>\n<\/div>\n<p>&#8220;By open-sourcing GHIDRA, the NSA will benefit from a diverse user base whose feedback will make the tool even more effective,&#8221; Patrick Miller, security researcher at Raytheon Intelligence, Information and Services told ZDNet via email.<\/p>\n<p>&#8220;For underprivileged cyber teams grappling with a lack of personnel or resources, the free tool is a game changer to easing the barrier of entry into the cyber workforce and raising the proficiency of these teams. As a user of this tool for years, I cannot wait to see how it improves in the hands of my peers,&#8221; Miller said.<\/p>\n<p>ZDNet readers looking for additional information on the tool, please refer to its <a href=\"https:\/\/ghidra-sre.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">official website<\/a>, <a href=\"https:\/\/github.com\/NationalSecurityAgency\/ghidra\" target=\"_blank\" rel=\"noopener noreferrer\">GitHub repo<\/a>, or the included documentation.<\/p>\n<p>The news of the NSA open-sourcing one of its internal tools should not be a surprise anymore. The NSA has open-sourced all sorts of tools over the past few years, with the most successful of them being <a href=\"https:\/\/en.wikipedia.org\/wiki\/Apache_NiFi\" target=\"_blank\" rel=\"noopener noreferrer\">Apache NiFi<\/a>, a project for automating large data transfers between web apps, and which has become a favorite on the cloud computing scene.<\/p>\n<p>In total, the NSA has open-sourced 32 projects as part of its <a href=\"https:\/\/www.nsa.gov\/what-we-do\/research\/technology-transfer\/\" target=\"_blank\" rel=\"noopener noreferrer\">Technology Transfer Program (TTP)<\/a> so far and has most recently even opened an official GitHub account.<\/p>\n<p>Below is a video of security researcher Marcus &#8220;MalwareTech&#8221; Hutchins taking a first look at Ghidra and its features. Also, within an hour of it&#8217;s release, Ghidra has already been made available as a <a href=\"https:\/\/aur.archlinux.org\/packages\/ghidra\/\" target=\"_blank\" rel=\"noopener noreferrer\">package<\/a> for Arch Linux, an operating system preferred by most white, gray, and black-hat hackers.<\/p>\n<section class=\"shortcode media-source\">\n<\/section>\n<h3>Related cyber-security coverage:<\/h3>\n<p>READ MORE <a href=\"https:\/\/www.zdnet.com\/article\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/#ftag=RSSbaffb68\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>NSA&#8217;s Ghidra greeted with positive reviews by the infosec community.<br \/>\nREAD MORE HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":25886,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[62],"tags":[],"class_list":["post-25885","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zdnet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>NSA release Ghidra, a free software reverse engineering toolkit 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"NSA release Ghidra, a free software reverse engineering toolkit 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-06T02:12:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"425\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"NSA release Ghidra, a free software reverse engineering toolkit\",\"datePublished\":\"2019-03-06T02:12:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/\"},\"wordCount\":1108,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png\",\"articleSection\":[\"ZDNet | Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/\",\"name\":\"NSA release Ghidra, a free software reverse engineering toolkit 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png\",\"datePublished\":\"2019-03-06T02:12:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png\",\"width\":1000,\"height\":425},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"NSA release Ghidra, a free software reverse engineering toolkit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"NSA release Ghidra, a free software reverse engineering toolkit 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/","og_locale":"en_US","og_type":"article","og_title":"NSA release Ghidra, a free software reverse engineering toolkit 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2019-03-06T02:12:00+00:00","og_image":[{"width":1000,"height":425,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png","type":"image\/png"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"NSA release Ghidra, a free software reverse engineering toolkit","datePublished":"2019-03-06T02:12:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/"},"wordCount":1108,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png","articleSection":["ZDNet | Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/","url":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/","name":"NSA release Ghidra, a free software reverse engineering toolkit 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png","datePublished":"2019-03-06T02:12:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2019\/03\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit.png","width":1000,"height":425},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/nsa-release-ghidra-a-free-software-reverse-engineering-toolkit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"NSA release Ghidra, a free software reverse engineering toolkit"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25885","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=25885"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/25885\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/25886"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=25885"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=25885"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=25885"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}