From f3eb30f1020da78776cc4b372f9de62b367e0db5 Mon Sep 17 00:00:00 2001 From: simrego <37458367+simrego@users.noreply.github.com> Date: Wed, 18 Aug 2021 15:43:01 +0200 Subject: [PATCH] Update 02-Use_the_Tools_Available.md Maybe include Ghidra in reverse engineering tools? It has a lot of features. And I know this is an NSA program, but they already knows what have you done... ;) --- 02-Use_the_Tools_Available.md | 1 + 1 file changed, 1 insertion(+) diff --git a/02-Use_the_Tools_Available.md b/02-Use_the_Tools_Available.md index 15c4df7..2b7919b 100644 --- a/02-Use_the_Tools_Available.md +++ b/02-Use_the_Tools_Available.md @@ -293,6 +293,7 @@ A coverage analysis tool shall be run when tests are executed to make sure the e ### Reverse engineering tools * [Cutter](https://cutter.re/) - A front-end for [Radare2](https://www.radare.org/n/radare2.html). It provides tools such as decompiler, disassembly, graph visualizer, hex editor. + * [Ghidra](https://ghidra-sre.org/) - Ghidra is a free and open source reverse engineering tool developed by the National Security Agency (NSA) of the United States. ### GCC / Clang Sanitizers