Software Alternatives, Accelerators & Startups

Ghidra VS x64_dbg

Compare Ghidra VS x64_dbg and see what are their differences

Ghidra logo Ghidra

Software Reverse Engineering (SRE) Framework

x64_dbg logo x64_dbg

x64_dbg is a 32-bit and 64-bit assembler level debugger for Windows. Key features:
  • Ghidra Landing page
    Landing page //
    2019-08-25
  • x64_dbg Landing page
    Landing page //
    2022-10-14

Ghidra features and specs

  • Free and Open Source
    Ghidra is free to use and its source code is publicly available, allowing users to modify and enhance the tool to suit their needs.
  • Multi-platform Support
    Ghidra is available for Windows, macOS, and Linux, making it accessible to a wide range of users regardless of their operating system.
  • Powerful Disassembly
    It comes with a powerful disassembly engine that supports multiple architectures, enabling in-depth analysis of binary code.
  • User-Friendly Interface
    The tool features a graphical user interface (GUI) that simplifies navigation and enhances user experience, especially for those who may not be comfortable with command-line tools.
  • Collaboration Features
    Ghidra allows multiple users to collaborate on the same project in real-time, facilitating team efforts in reverse engineering tasks.
  • Scripting Support
    It supports scripting in both Python and Java, allowing users to automate repetitive tasks and extend the functionality of the tool.
  • Extensive Documentation
    Ghidra has comprehensive documentation and an active community, providing users with resources and support to get started and troubleshoot issues.

Possible disadvantages of Ghidra

  • Learning Curve
    Due to its extensive features and capabilities, there can be a steep learning curve for new users, requiring time and practice to master.
  • Performance
    Some users have reported performance issues, such as slow loading times and lag, particularly when working with large binaries.
  • Limited Debugging Features
    Ghidra’s debugging features are not as comprehensive as those offered by some other reverse engineering tools, potentially limiting its utility for certain tasks.
  • Java Dependency
    Ghidra requires a Java Runtime Environment (JRE) to run, which may be a drawback for users who prefer or require environments that do not support Java.
  • Complex Installation
    The installation and setup process can be complex and may require additional configuration, which can be daunting for beginners.
  • Less Intuitive for Certain Tasks
    While the GUI is user-friendly for many tasks, some users find it less intuitive for specific, advanced reverse engineering functions compared to other specialized tools.

x64_dbg features and specs

No features have been listed yet.

Analysis of Ghidra

Overall verdict

  • Ghidra is widely considered to be a good tool for reverse engineering due to its robust feature set, open-source nature, and active community support. It competes well with other industry-leading tools, offering many similar capabilities without the associated costs.

Why this product is good

  • Ghidra is a highly regarded open-source reverse engineering tool developed by the National Security Agency (NSA). It offers a comprehensive suite of features for analyzing binary code, supporting multiple processor instruction sets, and providing an intuitive user interface. Its collaborative capabilities, powerful decompiler, and extensibility through plugins make it an attractive option for both beginners and experienced reverse engineers.

Recommended for

  • Cybersecurity professionals looking to analyze and understand potential vulnerabilities in software.
  • Software developers interested in understanding how compiled code behaves and learning more about software internals.
  • Students and researchers studying computer science or related fields who require access to a powerful reverse engineering tool without financial barriers.

Ghidra videos

NSA Ghidra, A game changer ?

More videos:

  • Review - Ghidra Review
  • Tutorial - Ghidra quickstart & tutorial: Solving a simple crackme

x64_dbg videos

No x64_dbg videos yet. You could help us improve this page by suggesting one.

Add video

Category Popularity

0-100% (relative to Ghidra and x64_dbg)
IDE
83 83%
17% 17
Software Development
84 84%
16% 16
Decompiler
87 87%
13% 13
OS & Utilities
0 0%
100% 100

User comments

Share your experience with using Ghidra and x64_dbg. For example, how are they different and which one is better?
Log in or Post with

Reviews

These are some of the external sources and on-site user reviews we've used to compare Ghidra and x64_dbg

Ghidra Reviews

Reverse engineering tools review
It may not be entirely up to the functionality of HexRays at the moment (remember that Ghidra is a new project), but tools such as decompilers require a lot of work and it is rare to see a new product that someone offers for free.
Source: www.pelock.com
The 5 Best Reverse Engineering Software for 2022
Ghidra's graphical user interface (GUI) is built on Java's Swing framework with a decompiler written in C++ and plugins written in Python. Besides its reverse engineering capabilities, Ghidra features powerful debugging features for both Windows and Linux.6
Source: online.yu.edu

x64_dbg Reviews

We have no reviews of x64_dbg yet.
Be the first one to post

Social recommendations and mentions

Based on our record, Ghidra should be more popular than x64_dbg. It has been mentiond 67 times since March 2021. We are tracking product recommendations and mentions on various public social media platforms and blogs. They can help you identify which product is more popular and what people think of it.

Ghidra mentions (67)

  • Better Reverse Engineering with Frida and Ghidra
    Install Ghidra: You can download the latest version from the official Ghidra website: https://ghidra-sre.org/. Follow the installation instructions provided on the site. - Source: dev.to / about 2 months ago
  • DeepSeek proves the future of LLMs is open-source
    Ghidra (https://ghidra-sre.org/) can fine-tune executables way more easily than your models. - Source: Hacker News / 4 months ago
  • Ask HN: How are you using LLMs for traversing decompiler output?
    I've only played a with this, but it was impressive. https://ghidra-sre.org/. - Source: Hacker News / 5 months ago
  • I've figured out what 13 of the 16 enemy flags mean in Ultima V. Help me figure out the last three.
    I've got no experience with reverse-engineering executables, but I got a bunch of code-like stuff showing up when I fed ULTIMA.EXE to Ghidra and told it to analyze it with all the flags set. Source: almost 2 years ago
  • Modding SH2
    The whole game is written in C++ (game logic intertwined with graphics). Ghidra can help you deconstruct the game binaries, but you need to put in a GREAT great effort to even get a starting point. Cheat Engine has been successful for some purposes, including an AI enabling utility for multiplayer (use with great care!). Source: almost 2 years ago
View more

x64_dbg mentions (16)

  • Too Many Fonts in Windows 10 Can Cause Slow Application Starts
    I have never heard anyone say anything good about the Visual Studio debugger before. Now, I'm not a Windows person but I'm not gonna argue for gdb or lldb here. RemedyBG and x64dbg are the two debuggers I've heard good things about though I've never used them because, again, not a Windows person. [1] https://remedybg.handmade.network/ [2] https://x64dbg.com/. - Source: Hacker News / almost 2 years ago
  • Advice needed on disabling license checks on some old proprietary abandonware
    I'd help you out but because of circumstances I have no laptop with me. You need x86/x64 debugger to do this. This one for example Find a registration procedure and look for possible brenching to other parts of code in assembly. It's probably somewhere in the beginning. Exclude code validation and export new program version. Source: almost 2 years ago
  • C/C++: Where is the address of a declared variable stores?
    One interesting thing you can do is download an app like https://x64dbg.com/ or cheat engine, which will let you see the memory. You can look at the process for something you’ve made and explore it. Log a memory address from your app then go find it in the tool and interpret the bytes as an integer. Find a string and see how that works. Find a pointer, read the address it’s pointing then go look at that address.... Source: about 2 years ago
  • Is there a tool that can show you an EIP trace of a game?
    If you want to also do dynamic analysis (debugging) you can use https://x64dbg.com. Source: over 2 years ago
  • How do I get opcode instructions from hexdump
    .exe is a complex format and not something you're going to extract raw instructions from using a hexdump. What you need is a "disassembler". For Windows I'd recommend x64dbg. Source: almost 3 years ago
View more

What are some alternatives?

When comparing Ghidra and x64_dbg, you can also consider the following products

IDA - The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analyst and cybersecurity professionals.

Immunity Debugger - Immunity Debugger is a powerful new way to write exploits, analyze malware, and reverse engineer...

X64dbg - X64dbg is a debugging software that can debug x64 and x32 applications.

radare - Radare, the highly featured reverse engineering framework.

Binary Ninja - A reverse engineering platform and GUI

OllyDbg - OllyDbg is a 32-bit assembler level analysing debugger.