The National Security Agency (NSA) has unveiled the latest version of its open-source software reverse engineering (SRE) framework, Ghidra 11.3, aiming to enhance the capabilities of cybersecurity professionals in analyzing compiled code across various platforms.
This update brings significant improvements to the debugging functionality of Ghidra. It now supports macOS kernel debugging via LLDB and Windows kernel debugging in virtual machines using eXDI. The introduction of TraceRMI-based implementation replaces the outdated “IN-VM” connectors, enhancing debugging efficiency across diverse environments. Additionally, a new Just-in-Time (JIT) p-code emulator has been incorporated to accelerate emulation performance for scripting and plugin development.
Integration with modern development tools is another key highlight of this release. Ghidra 11.3 now integrates with Visual Studio Code (VS Code), offering users a modern alternative to Eclipse for development tasks. This integration allows users to create module projects or edit scripts directly within VS Code, benefiting from advanced features like autocomplete and navigation, simplifying the workflow for developers.
Moreover, Ghidra 11.3 introduces improved visualization tools, including new “Flow Chart” layouts in the function graph interface. These layouts help in organizing code blocks and enhancing readability, making it easier for analysts to navigate complex functions.
The update also brings new features to streamline reverse engineering tasks. A LibreTranslate plugin enables offline string translation of binary data, while a new search feature allows users to query decompiled text across all functions in a binary. The PyGhidra library is now fully integrated into the framework, providing native CPython 3 access to Ghidra’s API, thereby expanding scripting capabilities. Processor support has been enhanced with updates for x86 AVX-512 instructions, ARM VFPv2 disassembly, and Golang 1.23 binaries, ensuring compatibility with a broader range of architectures and programming languages.
Although Ghidra 11.3 maintains backward compatibility with project data from earlier versions, features that are not compatible with older releases of the software have been introduced. Users are required to install Java Development Kit (JDK) 21 (64-bit) and Python 3 (versions 3.9–3.13) to use the debugger or perform source builds.
The NSA’s release of Ghidra 11.3 addresses numerous bugs, including issues with recursive structures in the decompiler and breakpoint toggling in LLDB. Documentation has been updated to Markdown format for easier navigation, solidifying Ghidra’s position as an indispensable tool for reverse engineering and cybersecurity analysis worldwide.
With these enhancements, Ghidra 11.3 continues to be a valuable resource for cybersecurity professionals, offering advanced capabilities for analyzing and interpreting compiled code across multiple platforms.

