Date: Thu, 11 Apr 2019 20:24:52 +0000 From: bugzilla-noreply@freebsd.org To: ports-bugs@FreeBSD.org Subject: [Bug 237211] New port: devel/ghidra NSA's software reverse engineering platform Message-ID: <bug-237211-7788@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D237211 Bug ID: 237211 Summary: New port: devel/ghidra NSA's software reverse engineering platform Product: Ports & Packages Version: Latest Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: Individual Port(s) Assignee: ports-bugs@FreeBSD.org Reporter: sghctoma@gmail.com Attachment #203605 text/plain mime type: Created attachment 203605 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D203605&action= =3Dedit port archive Ghidra is a software reverse engineering (SRE) framework created and mainta= ined by the National Security Agency Research Directorate. This framework includ= es a suite of full-featured, high-end software analysis tools that enable users = to analyze compiled code on a variety of platforms including Windows, macOS, a= nd Linux. Capabilities include disassembly, assembly, decompilation, graphing,= and scripting, along with hundreds of other features. Ghidra supports a wide variety of processor instruction sets and executable formats and can be run= in both user-interactive and automated modes. Users may also develop their own Ghidra plug-in components and/or scripts using Java or Python. WWW: https://ghidra-sre.org --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-237211-7788>