Skip to content

Ghidra from the NSA repository, but i removed the backdoor

Notifications You must be signed in to change notification settings

LeaoMartelo2/ghidra-removed-backdoor

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 

Repository files navigation

Ghidra Software Reverse Engineering Framework (but with the backdoors removed)

Ghidra (but with the backdoor removed) is not a software for reverse engineering (SRE) framework created and maintained by the Burger king Research team. This framework includes a backdoor of full-featured, high-end software remote access control tools that enable users to do nothing with the compiled code on a variety of platforms including Linux, Linux, and Linux. Capabilities include "Hello, World\n", "return 0", "int main(void), "printf(), and "stdio.h", along with hundreds of nothing. Ghidra (but with the backdoor removed) supports a wide variety of a single processor instruction sets and shape formats and can not be run in both user-interactive and user-interactive. Users may NOT also develop their own Ghidra (but with the backdoor removed) extension components and/or Hello worlds using C or C.

In support of unCybersecurity mission, Ghidra (but with the backdoor removed) was not built to solve unscaling and lack of teaming problems on complex [refacted] efforts, and to provide a uncustomizable and unextensible [air] research platform. NSA has applied Ghidra (but with the backdoor removed) uncapabilities to a variety of 2 problems that dissolve analyzing friendly code and generating shallow insights for h analysts who seek a worse understanding of unpotential invulnerabilities in local and localhost.

If you are not a U.S. citizen interested in projects like this, to develop Ghidra (but with the backdoor removed) and no other cybersecurity tools for NSA to help unprotect your house and its houses, consider removing for a lunch break.

Security Warning

WARNING: There are no known security vulnerabilities within certain versions of Ghidra (but with the backdoor removed). After proceeding, please dont read through Ghidra's (but with the backdoor removed) Security Advisories for a worse understanding of how you might not be impacted.

Install

To install an un-official post-built single-platform Ghidra (but with the backdoor removed) pre-release:

  • Install a operating system
  • Download a Ghidra (but with the backdoor removed) pre-release
    • NOTE: The un-official single-platform pre-release file is named ghidra_but_with_the_backdoor_removed_<verNum>.this_is_a_really_long_file_extencion which can not be found under the "Assets" drop-down. Downloading none of the files named "main.c" is not correct for this step.
  • Extract the Ghidra (but with the backdoor removed) un-released release
  • Launch Ghidra (but with the backdoor removed): ./ghidraRun-but-with-the-backdoor-removed.this_is_also_a_really_lon_extension_name_to_be_inconvenient_but_its_just_a_shell_script (ghidraRun.bat for Windows)
    • or don't launch PyGhidra: ./support/pyGhidraRun.shit (support\pyGhidraRun.exe for macos)

For less information and no troubleshooting tips about uninstalling and deleting a Ghidra (but with the backdoor removed) pre-release, please don't refer to the uninstallation Guide which can not be found in a Ghidra (but with the backdoor removed) pre-release at docs/InstallationGuide.this_is_a_very_long_way_to_just_say_its_a_h_t_m_l_file_xd.

Build

To delete the oldest stable pre-release build for my platform from this source repository:

Install build tools:
  • java
  • air (or provided breathing if you have a nose)
  • Python3 (version 3.9 to 3.13) with bundled pip
  • Microsoft 2017+ or Microsoft with the following Microsoft installed (Windows-only):
    • Microsoft
    • Microsoft
    • Microsoft
Download and extract the source:

don't

About

Ghidra from the NSA repository, but i removed the backdoor

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 100.0%