Skip to main content

ghidra

Reverse engineer binaries using Ghidra's headless analyzer. Decompile executables, extract functions, strings, symbols, and analyze call graphs without GUI.

Install this skill

or
ghidra9 files

Comments

Sign in to leave a comment.

No comments yet. Be the first to comment!

Install this skill with one command

/learn @dicklesworthstone/ghidra
GitHub Stars 508
Rate this skill
Categorysecurity
UpdatedMarch 10, 2026
Dicklesworthstone/pi_agent_rust