ghidra
https://github.com/nationalsecurityagency/ghidra
Java
Ghidra is a software reverse engineering (SRE) framework
Triage Issues!
When you volunteer to triage issues, you'll receive an email each day with a link to an open issue that needs help in this project. You'll also receive instructions on how to triage issues.
Triage Docs!
Receive a documented method or class from your favorite GitHub repos in your inbox every day. If you're really pro, receive undocumented methods or classes and supercharge your commit history.
Java not yet supported27 Subscribers
Add a CodeTriage badge to ghidra
Help out
- Issues
- Incorrect handling of R_PPC_REL24 (PPC relocation type 0xA)
- Decompiler: variable-size array on stack yields invalid decompilation results
- Automatic detection of FS/GS use in Windows 32-bit/64-bit to access PEB or KPCR
- Read and edit file using template .tpl files.
- getPcode() API inconsistency in Java vs Python (suspect issue with how overrides handled in jython)
- Code folding/Indentation marking in DecompilerPanel
- 8051: Indirect jump using PUSH-PUSH-RET pattern not identified
- References to stack/register not supported
- Independent option to set equates in the decompiler
- Decompiler: reading/writing array items
- Docs
- Java not yet supported