Community Ghidra Plugin is Here

Intezer

Ghidra is a free and open source reverse engineering tool developed by the NSA. The plugin reduces the burden on the analyst by accelerating the reverse engineering process and spotlighting the most relevant part of the disassembled code. 

The plugin immediately filters out common functions, allowing the reverse engineer to focus on the file’s malicious and unique code. The plugin also detects similar functions or parts of a function which have been seen before in other malware.

When analyzing a Windows executable file and running the plugin, for example, the reverse engineer can immediately recognize if a function has been seen before in trusted code such as C library, or, if the function has appeared in an executable file that belongs to Lazarus.

Follow these two steps to get started:

  1. Make sure you have an Intezer Analyze community account. Register for free here
  2. Get the plugin from our GitHub repository

Community Ghidra Plugin is Here

A few weeks ago we released the Intezer Analyze community IDA Pro plugin, which is similar to the Ghidra plugin. Both plugins provide the same benefit of accelerating the reverse engineering process. To get started, choose your preferred reverse engineering software and run our plugin!

Intezer

Count on Intezer Forensic AI SOC to triage, investigate and respond to every alert at unmatched speed and accuracy.

In this article

Share this article
Recommended Blogs
5MIN READ

AI SOC for teams outgrowing MDR

For teams that have outgrown their MDR, the answer isn’t a better MDR. It’s a different operating model.
3MIN READ

Intezer’s 2025 momentum reflects rapid adoption of AI SOC in global enterprise 

Enterprises are adopting AI SOC as the new model for running security operations. This shift is reflected clearly in Intezer’s momentum over the past year.
8MIN READ

Alert fatigue is costing you: Why your SOC misses 1% of real threats

Our 2026 AI SOC Report, based on the analysis of more than 25M security alerts across live enterprise environments, reveals a critical disconnect between how security teams prioritize alerts and where real threats actually originate.