# Ghidra > Open-source disassembler and decompiler from NSA with scripting, function graphs, and data type management **Category:** [[categories/statically-analyze-code-general|Statically Analyze Code > General]] | **Tier:** Rich (FOR610) **Docs:** [https://docs.remnux.org/discover-the-tools/statically+analyze+code/general](https://docs.remnux.org/discover-the-tools/statically+analyze+code/general) ## Usage ```bash ghidra ``` ## Workflows - [[workflows/static-analysis-workflow|Static Properties Analysis]] — Step 7: Disassembly (if needed) - [[workflows/code-injection-workflow|Code Injection Analysis]] — Step 2: Injection Type Classification ## Related Tools - [[tools/cutter|Cutter]] — Open-source reverse engineering platform — Qt-based GUI for - [[tools/objdump|objdump]] — Disassemble binary files. - [[tools/qiling|qiling]] — Multi-platform binary emulation framework — emulate PE, ELF, - [[tools/vivisect|Vivisect]] — Binary analysis and emulation framework — static analysis wi ## FOR610 **Labs:** 2.1, 2.2, 2.3, 2.4, 2.5, 2.6, 2.7, 2.8, 4.9, 5.2, 5.4, 5.5, 5.6, 5.7, 5.9 **Sections:** 2, 4, 5 #disassembly #decompilation #code-analysis #function-graph