The US National Security Agency (NSA) announces it has made its GHIDRA Software Reverse Engineering (SRE) framework available as open source. Key features of Ghidra are:
The framework can be downloaded from https://ghidra-sre.org/. The page has a button labeled "SHA-256" but it seems to require Javascript for it to be displayed. A simple "view source" (you don't think I'm gonna let the NSA have execution permission on my computer!) of the page revealed:
3b65d29024b9decdbb1148b12fe87bcb7f3a6a56ff38475f5dc9dd1cfc7fd6b2 ghidra_9.0_PUBLIC_20190228.zip
Alternatively, it also seems to be available on GitHub.
What I really want to know is how are you supposed to pronounce its name?
(Score: 2) by JoeMerchant on Wednesday March 06 2019, @09:31PM
It comes from the top-down. Chair throwing is a great way to increase obfuscation the code your developers are producing. Unrealistic launch deadlines, commodity developers, 99.9% legacy support, competing silos, there are plenty of ways that management can cause the code to become more obfuscated without ever having to go down to the developer level themselves.
🌻🌻 [google.com]