Stars
- All languages
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Dart
- Dockerfile
- Go
- HTML
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- LLVM
- Lua
- Makefile
- Markdown
- Mathematica
- Max
- Meson
- Nim
- OCaml
- Objective-C
- OpenSCAD
- PHP
- Pascal
- Perl
- PowerShell
- Python
- QMake
- Rich Text Format
- Roff
- Ruby
- Rust
- SCSS
- SMT
- Scala
- Shell
- Solidity
- Swift
- TeX
- TypeScript
- VBScript
- Vim Script
- XSLT
- YARA
Ghidra is a software reverse engineering (SRE) framework
Tools to work with android .dex and java .class files
Quickly find differences and similarities in disassembled code
BinAbsInspector: Vulnerability Scanner for Binaries
bethington / ghidra-mcp
Forked from LaurieWired/GhidraMCPGhidra MCP Server — 194 MCP tools for AI-powered reverse engineering. GUI plugin + headless server, lazy tool loading, convention enforcement, batch operations, Ghidra Server integration, and Docke…
The FLARE team's open-source extension to add Python 3 scripting to Ghidra.
An LLM extension for Ghidra to enable AI assistance in RE.
Automated Android custom unpacker generator
A collection of java reverse engineering tools and informational links
Jarida (Jadx + Frida) is a Jadx GUI plugin that lets you trace and optionally patch Java method return values at runtime using Frida, directly from Jadx’s decompiled view.