diff options
author | Ebben Aries <slackbuilds@dscp.org> | 2022-04-06 09:37:47 +0700 |
---|---|---|
committer | Willy Sudiarto Raharjo <willysr@slackbuilds.org> | 2022-04-09 15:45:48 +0700 |
commit | 5967e0bb212d2ea49aca79ad4db1e24c45e732c3 (patch) | |
tree | b39f9a9a06bc5fcfbc1f0f67a1483cc6271c36ba /development/ghidra/README | |
parent | 1a7269b0e19d2713648f37c46a55b18ae743fb0d (diff) | |
download | slackbuilds-5967e0bb212d2ea49aca79ad4db1e24c45e732c3.tar.gz slackbuilds-5967e0bb212d2ea49aca79ad4db1e24c45e732c3.tar.xz |
development/ghidra: Added (Reverse Engineering Tool).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'development/ghidra/README')
-rw-r--r-- | development/ghidra/README | 12 |
1 files changed, 12 insertions, 0 deletions
diff --git a/development/ghidra/README b/development/ghidra/README new file mode 100644 index 0000000000..ae9f69f631 --- /dev/null +++ b/development/ghidra/README @@ -0,0 +1,12 @@ +ghidra (Software Reverse Engineering Tools developed by NSA) + +Ghidra is a software reverse engineering (SRE) framework created and +maintained by the National Security Agency Research Directorate. +Capabilities include disassembly, assembly, decompilation, graphing, +and scripting, along with hundreds of other features. Ghidra supports +a wide variety of processor instruction sets and executable formats +and can be run in both user-interactive and automated modes. + +NOTE: On first run, ghidra will prompt you for your path to the JDK 11+ +home directory. This is usually /usr/lib64/jdk11-<version> if +installed from slackbuilds. |