On 2019/04/26 07:44, Remi Pointel wrote:
> Hi,
> 
> attached is the port of ghidra: a software reverse engineering (SRE)
> framework.
> 
> ----------------
> $ pkg_info ghidra
> Information for inst:ghidra-9.0.2
> 
> Comment:
> software reverse engineering (SRE) framework
> 
> Description:
> hidra is a software reverse engineering (SRE) framework created and
> maintained
> by the National Security Agency Research Directorate. This framework
> includes a
> suite of full-featured, high-end software analysis tools that enable users
> to
> analyze compiled code on a variety of platforms. Capabilities include
> disassembly, assembly, decompilation, graphing, and scripting, along with
> hundreds of other features. Ghidra supports a wide variety of processor
> instruction sets and executable formats and can be run in both
> user-interactive
> and automated modes. Users may also develop their own Ghidra plug-in
> components
> and/or scripts using Java or Python.
> 
> Maintainer: Remi Pointel <rpoin...@openbsd.org>
> 
> WWW: https://www.ghidra-sre.org/
> ----------------
> 
> Ok?
> 
> Cheers,
> 
> Remi.

Nice. You may be interested in my (pending) MR to ghidra which also adds 
support for compiling the native components (decompiler, demangler):

https://github.com/NationalSecurityAgency/ghidra/pull/490

Reply via email to