slackbuilds/development/ghidra
Ebben Aries 8c7c3a907a
development/ghidra: Updated for version 10.1.4.
Signed-off-by: Andrew Clemons <andrew.clemons@gmail.com>

Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
2022-05-21 08:25:09 +07:00
..
README development/ghidra: Added (Reverse Engineering Tool). 2022-04-09 15:45:48 +07:00
doinst.sh development/ghidra: Added (Reverse Engineering Tool). 2022-04-09 15:45:48 +07:00
ghidra.SlackBuild development/ghidra: Updated for version 10.1.4. 2022-05-21 08:25:09 +07:00
ghidra.info development/ghidra: Updated for version 10.1.4. 2022-05-21 08:25:09 +07:00
slack-desc development/ghidra: Added (Reverse Engineering Tool). 2022-04-09 15:45:48 +07:00

README

ghidra (Software Reverse Engineering Tools developed by NSA)

Ghidra is a software reverse engineering (SRE) framework created and
maintained by the National Security Agency Research Directorate.
Capabilities include disassembly, assembly, decompilation, graphing,
and scripting, along with hundreds of other features. Ghidra supports
a wide variety of processor instruction sets and executable formats
and can be run in both user-interactive and automated modes.

NOTE: On first run, ghidra will prompt you for your path to the JDK 11+
home directory.  This is usually /usr/lib64/jdk11-<version> if
installed from slackbuilds.