Port details |
- ghidra Software reverse engineering (SRE) framework
- 11.1.2 devel =3 11.1.2Version of this port present on the latest quarterly branch.
- Maintainer: tiago.gasiba@gmail.com
- Port Added: 2019-06-29 00:18:19
- Last Update: 2024-08-01 17:41:53
- Commit Hash: 2bf3f54
- People watching this port, also watch:: libssh, p5-MIME-Tools, noto-tc, linux-c7-atk, lua54-luaexpat
- Also Listed In: java security
- License: APACHE20
- WWW:
- https://ghidra-sre.org/
- Description:
- Ghidra is a software reverse engineering (SRE) framework created
and maintained by the National Security Agency Research Directorate
of the United States of America.
This framework includes a suite of full-featured, high-end software
analysis tools that enable users to analyze compiled code on a
variety of platforms including Windows, macOS, and Linux. Capabilities
include disassembly, assembly, decompilation, graphing, and scripting,
along with hundreds of other features. Ghidra supports a wide variety
of processor instruction sets and executable formats and can be run
in both user-interactive and automated modes. Users may also develop
their own Ghidra plug-in components and/or scripts using Java or
Python.
- ¦ ¦ ¦ ¦
- Manual pages:
- FreshPorts has no man page information for this port.
- pkg-plist: as obtained via:
make generate-plist - Dependency lines:
-
- To install the port:
- cd /usr/ports/devel/ghidra/ && make install clean
- To add the package, run one of these commands:
- pkg install devel/ghidra
- pkg install ghidra
NOTE: If this package has multiple flavors (see below), then use one of them instead of the name specified above.- PKGNAME: ghidra
- Flavors: there is no flavor information for this port.
- ONLY_FOR_ARCHS: amd64
- distinfo:
- TIMESTAMP = 1721402829
SHA256 (ghidra_11.1.2_PUBLIC_20240709.zip) = 219ec130b901645779948feeb7cc86f131dd2da6c36284cf538c3a7f3d44b588
SIZE (ghidra_11.1.2_PUBLIC_20240709.zip) = 422385730
Packages (timestamps in pop-ups are UTC):
- Dependencies
- NOTE: FreshPorts displays only information on required and default dependencies. Optional dependencies are not covered.
- Build dependencies:
-
- bash : shells/bash
- gradle>=8.5 : devel/gradle
- java : java/openjdk17
- Runtime dependencies:
-
- bash : shells/bash
- java : java/openjdk17
- There are no ports dependent upon this port
Configuration Options:
- No options to configure
- Options name:
- devel_ghidra
- USES:
- cpe shebangfix zip
- pkg-message:
- For install:
- NOTE: ** Currently debugging support is not working in FreeBSD **
- Master Sites:
|
Number of commits found: 14
Commit History - (may be incomplete: for full details, see links to repositories near top of page) |
Commit | Credits | Log message |
11.1.2 01 Aug 2024 17:41:53 |
Vladimir Druzenko (vvd) Author: gatekeeper |
devel/ghidra: fix permissions be able to run ghidra from the command line
Also:
- remove from SHEBANG_FILES those that are related with debugging
- add a desktop file + icon from:
https://github.com/NationalSecurityAgency/ghidra/discussions/3709
- add a pkg-message
- configure JAVA_HOME using the default installed java version
PR: 280494
Fixes: e2b8d2a61766 (update 9.1 → 11.1.2, take maintainership)
MFH: 2024Q3 |
11.1.2 26 Jul 2024 20:39:31 |
Vladimir Druzenko (vvd) Author: gatekeeper |
devel/ghidra: update 9.1 → 11.1.2, take maintainership
Port was FORBIDDEN, updated last time in 2019, maintainer is innactive.
Tamas Szakaly <sghctoma@gmail.com>, thanks for you work, hope you come
back to FreeBSD porters team!
Install share/ghidra/support/launch.properties as a @sample file.
Changelogs:
https://htmlpreview.github.io/?https://raw.githubusercontent.com/NationalSecurityAgency/ghidra/Ghidra_11.1.2_build/Ghidra/Configurations/Public_Release/src/global/docs/ChangeHistory.html
PR: 280378 275383 244345
MFH: 2024Q3 |
9.1 06 Feb 2024 21:26:10 |
Tilman Keskinoz (arved) |
devel/ghidra: Mark FORBIDDEN contains a RCE
PR: 260854
Submitted by: Cameron Katri
Security: https://github.com/NationalSecurityAgency/ghidra/security/advisories/GHSA-j3xg-fc2p-4jc4 |
07 Sep 2022 21:58:51 |
Stefan Eßer (se) |
Remove WWW entries moved into port Makefiles
Commit b7f05445c00f has added WWW entries to port Makefiles based on
WWW: lines in pkg-descr files.
This commit removes the WWW: lines of moved-over URLs from these
pkg-descr files.
Approved by: portmgr (tcberner) |
9.1 07 Sep 2022 21:10:59 |
Stefan Eßer (se) |
Add WWW entries to port Makefiles
It has been common practice to have one or more URLs at the end of the
ports' pkg-descr files, one per line and prefixed with "WWW:". These
URLs should point at a project website or other relevant resources.
Access to these URLs required processing of the pkg-descr files, and
they have often become stale over time. If more than one such URL was
present in a pkg-descr file, only the first one was tarnsfered into
the port INDEX, but for many ports only the last line did contain the
port specific URL to further information.
There have been several proposals to make a project URL available as
a macro in the ports' Makefiles, over time.
(Only the first 15 lines of the commit message are shown above ) |
9.1 19 Oct 2021 08:36:47 |
Tobias Kortkamp (tobik) |
*: apply refactor.remove-consecutive-empty-lines
Submitted by: portedit |
9.1 14 Oct 2021 21:30:16 |
Stefan Eßer (se) |
devel/ghidra: Add CPE information
Approved by: portmgr (blanket) |
9.1 07 Apr 2021 08:09:01 |
Mathieu Arnold (mat) |
One more small cleanup, forgotten yesterday.
Reported by: lwhsu |
9.1 06 Apr 2021 14:31:07 |
Mathieu Arnold (mat) |
Remove # $FreeBSD$ from Makefiles. |
9.1 01 Oct 2020 11:06:03 |
0mp |
Clean up port's makefile
Approved by: portmgr blanket |
9.1 20 Nov 2019 11:49:00 |
tobik |
devel/ghidra: Update to 9.1
- Now that openjdk11+ are registered in bsd.java.mk, drop the JDK11
and JDK12 options
Changes: https://ghidra-sre.org/releaseNotes_9.1_final.html#9_1
PR: 239902
Submitted by: Tamas Szakaly <sghctoma@gmail.com> (maintainer) |
9.0.4 20 Nov 2019 09:51:43 |
tobik |
Create devel/gradle5 in preparation of devel/gradle update
Many consumers fail to build with newer Gradle versions.
PR: 239875, 239900, 239901, 239902 |
9.0.4 11 Aug 2019 14:44:41 |
tobik |
devel/ghidra: Fix build error caused by cache cleanup
The issue seems to be caused by Gradle caches being cleaned up
between build sessions [1]. It did not come up before because the
cached files were not old enough to be deleted.
Cleanup happens after a build session, so running the two build
targets (yajswDevUnpack and buildGhidra) in the same session fixes
the issue.
[1]
https://docs.gradle.org/current/userguide/directory_layout.html#dir:gradle_user_home:cache_cleanup)
PR: 239472
Submitted by: Tamas Szakaly <sghctoma@gmail.com> (maintainer) |
9.0.4 29 Jun 2019 00:17:47 |
pi |
New port: devel/ghidra
Ghidra is a software reverse engineering (SRE) framework created
and maintained by the National Security Agency Research Directorate
of the United States of America.
This framework includes a suite of full-featured, high-end software
analysis tools that enable users to analyze compiled code on a
variety of platforms including Windows, macOS, and Linux. Capabilities
include disassembly, assembly, decompilation, graphing, and scripting,
along with hundreds of other features. Ghidra supports a wide variety
of processor instruction sets and executable formats and can be run
in both user-interactive and automated modes. Users may also develop
their own Ghidra plug-in components and/or scripts using Java or
Python.
WWW: https://ghidra-sre.org/
PR: 237211
Submitted by: Tamas Szakaly <sghctoma@gmail.com>
Reviewed by: koobs, yuri, rgrimes |
Number of commits found: 14
|