SlackBuilds Repository

15.0 > Development > ghidra (10.3.2)

ghidra (Software Reverse Engineering Tools developed by NSA)

Ghidra is a software reverse engineering (SRE) framework created and
maintained by the National Security Agency Research Directorate.
Capabilities include disassembly, assembly, decompilation, graphing,
and scripting, along with hundreds of other features. Ghidra supports
a wide variety of processor instruction sets and executable formats
and can be run in both user-interactive and automated modes.

NOTE: On first run, ghidra will prompt you for your path to the JDK 11+
home directory. This is usually /usr/lib64/jdk19-<version> if
installed from slackbuilds.

This requires: jdk19

Maintained by: Ebben Aries
Keywords: reverse,disassembler,debugger,hex,binary
ChangeLog: ghidra


Source Downloads (64bit): (06143f5ce80e8944d121e08494f5bd3e)

Download SlackBuild:
ghidra.tar.gz.asc (FAQ)

(the SlackBuild does not include the source)

Individual Files:

Validated for Slackware 15.0

See our HOWTO for instructions on how to use the contents of this repository.

Access to the repository is available via:
ftp git cgit http rsync

© 2006-2023 Project. All rights reserved.
Slackware® is a registered trademark of Patrick Volkerding
Linux® is a registered trademark of Linus Torvalds