^.^;

Ghidra

NSA's flagship reverse engineering tool for malware analysis and vulnerability research

AdvancedInteractive Dual Perspective

Ghidra is a free, open-source reverse engineering framework developed by the NSA. It provides comprehensive binary analysis capabilities including disassembly, decompilation, and scripting - making it the premier alternative to commercial tools like IDA Pro.

🔴 RED TEAM

Reverse malware to extract C2 servers and IOCs, find zero-day vulnerabilities in software, analyze packed/obfuscated binaries, develop custom exploits.

🔵 BLUE TEAM

Analyze suspicious binaries for threat intelligence, verify vendor patches, understand malware behavior, extract IOCs for detection rules.

Ghidra Reverse Engineering Lab

NSA's flagship tool for binary analysis, malware reverse engineering, and vulnerability research

Analysis Console

Select a binary and start analysis...
Threat LevelLOW

Extracted Indicators (0)

No findings yet. Run analysis to extract IOCs.

🔴 RED TEAM: Malware Analysis

  • C2 Extraction: Find command-and-control servers in strings
  • Persistence: Identify registry keys, scheduled tasks
  • Anti-Analysis: Detect VM checks, debugger detection
  • Crypto Keys: Extract encryption keys from memory

🔵 BLUE TEAM: Threat Intelligence

  • IOC Creation: Build detection signatures from findings
  • YARA Rules: Generate rules from binary patterns
  • Behavior Mapping: Map to MITRE ATT&CK techniques
  • Threat Hunting: Use IOCs to hunt in your environment
Terms of ServiceLicense AgreementPrivacy Policy
Copyright © 2025 JMFG. All rights reserved.