Ghidra R2 reverse development, Native for decompiler (R2_PREFIX)
-
Updated
Apr 29, 2025 - C
Ghidra is a software reverse engineering (SRE) suite of tools developed by NSA’s Research Directorate in support of the Cybersecurity mission.
Ghidra R2 reverse development, Native for decompiler (R2_PREFIX)
Over Ride is a CTF like challenge about exploiting ELF32 & ELF64 binaries on x86_64 architecture
This project is an introduction to reverse engineering.
The source code and binaries for the Introduction to Software Reverse Engineering YouTube course.
Introduction to reverse engineering techniques, focused on analyzing and exploiting binary-level vulnerabilities in compiled C programs.
This repo hosts basic win32 compatible and visual studio C based shell code for an article on analysis
Permissive, modern alternative to Ghidra with Rust/Python core and first-class agentic AI integration
A collection of Ghidra Data Type (GDT) archives and combined C headers from common libraries with modifications to facilitate importing into Ghidra via the "Parse C Source..." mechanism. Contributions are welcome (and encouraged)
Attempting to fully reverse Soul Reaver PSX game using Ghidra, TDR and PsyX.
NONOSDK precompiled library with patched ieee80211_freedom_output function
Toolkit for debugging Samsung baseband firmware
CS-412 Software Security EPFL course labs of Spring 2023 edition
Ghidra from the NSA repository, but i removed the backdoor
Performing an exploit of Format String Vulnerability to leak information. Given a C compiled vulnerable software, with the help of reverse engineering and debugging; the attack had to be conducted to obtain dumb and smart leak of information.
Contains utilities to make it easier to work with the Open Watcom compiler in Ghidra
My Ghidra data type archive repository
Ghidra Data Types - Building a Custom Ghidra GDT from NDIS Windows DDK Headers
Created by National Security Agency
Released March 5, 2019
Latest release 3 months ago