summaryrefslogtreecommitdiffstats
path: root/development/ghidra/README
diff options
context:
space:
mode:
author Ebben Aries2022-04-06 04:37:47 +0200
committer Willy Sudiarto Raharjo2022-04-09 10:45:48 +0200
commit5967e0bb212d2ea49aca79ad4db1e24c45e732c3 (patch)
treeb39f9a9a06bc5fcfbc1f0f67a1483cc6271c36ba /development/ghidra/README
parent1a7269b0e19d2713648f37c46a55b18ae743fb0d (diff)
downloadslackbuilds-5967e0bb212d2ea49aca79ad4db1e24c45e732c3.tar.gz
development/ghidra: Added (Reverse Engineering Tool).
Signed-off-by: Willy Sudiarto Raharjo <willysr@slackbuilds.org>
Diffstat (limited to 'development/ghidra/README')
-rw-r--r--development/ghidra/README12
1 files changed, 12 insertions, 0 deletions
diff --git a/development/ghidra/README b/development/ghidra/README
new file mode 100644
index 0000000000..ae9f69f631
--- /dev/null
+++ b/development/ghidra/README
@@ -0,0 +1,12 @@
+ghidra (Software Reverse Engineering Tools developed by NSA)
+
+Ghidra is a software reverse engineering (SRE) framework created and
+maintained by the National Security Agency Research Directorate.
+Capabilities include disassembly, assembly, decompilation, graphing,
+and scripting, along with hundreds of other features. Ghidra supports
+a wide variety of processor instruction sets and executable formats
+and can be run in both user-interactive and automated modes.
+
+NOTE: On first run, ghidra will prompt you for your path to the JDK 11+
+home directory. This is usually /usr/lib64/jdk11-<version> if
+installed from slackbuilds.