On 2019/04/26 07:44, Remi Pointel wrote: > Hi, > > attached is the port of ghidra: a software reverse engineering (SRE) > framework. > > ---------------- > $ pkg_info ghidra > Information for inst:ghidra-9.0.2 > > Comment: > software reverse engineering (SRE) framework > > Description: > hidra is a software reverse engineering (SRE) framework created and > maintained > by the National Security Agency Research Directorate. This framework > includes a > suite of full-featured, high-end software analysis tools that enable users > to > analyze compiled code on a variety of platforms. Capabilities include > disassembly, assembly, decompilation, graphing, and scripting, along with > hundreds of other features. Ghidra supports a wide variety of processor > instruction sets and executable formats and can be run in both > user-interactive > and automated modes. Users may also develop their own Ghidra plug-in > components > and/or scripts using Java or Python. > > Maintainer: Remi Pointel <rpoin...@openbsd.org> > > WWW: https://www.ghidra-sre.org/ > ---------------- > > Ok? > > Cheers, > > Remi.
Nice. You may be interested in my (pending) MR to ghidra which also adds support for compiling the native components (decompiler, demangler): https://github.com/NationalSecurityAgency/ghidra/pull/490