
Ghidra
A containerized software reverse engineering suite for headless analysis, automation, and collaborative project workflows.
What is ghidra image?
The ghidra image refers to containerized distributions of the Ghidra software reverse engineering framework, commonly used for analyzing compiled binaries, firmware, and executable code. Ghidra supports disassembly, decompilation, graphing, and scripting, making it a powerful tool for vulnerability research, malware analysis, and reverse engineering tasks. In containerized environments, Ghidra is typically used either in headless mode for automated analysis or as a multi-user server that enables teams to collaborate on shared projects. The headless workflow is especially useful in CI pipelines or batch processing scenarios, where large numbers of binaries must be analyzed consistently without a graphical interface. Running Ghidra in containers allows teams to standardize tooling, isolate analysis environments, and automate reverse engineering tasks at scale.
How to use this image
Ghidra containers are most commonly used in headless mode or as a long-running server for collaborative projects. Headless usage enables automated import and analysis of binaries without a GUI.
Run a headless analysis job:
Run a Ghidra Server container:
Ghidra logs to stdout in containerized setups. For reproducible workflows, analysis scripts and configuration are typically baked into the image or managed via mounted volumes or Kubernetes ConfigMaps.
Image variants
Published across several community repositories (there is no single canonical GHIDRA image), common variants include:
Because Ghidra is Java-based and heavyweight, image size differences are usually driven more by included tooling than by base OS. For automation and CI, pinning exact tags is strongly recommended.
.avif)