Ghidra is the recently published NSA tool for software reverse-engineering. Development for Ghidra began approximately 20 years ago but remained classified within the NSA. Then this past March at the annual RSA conference, the NSA released it as a free and open source tool. Now everyone has to ask themselves the same questions: Should my team be using this? Will attackers use this against me? If it’s free, will this save me money if I switch? In this talk, we’ll answer these questions and more through an overview of what the tool is and what it is not. We’ll show the audience the basics and how to integrate it into their normal workflow. We will also show live demonstrations on real programs and firmware.