Use angr in Ghidra
The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.
Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:
Z
– destination address
X
– start address
J
– avoid address (multiple choice)
K
– destination address
T
– start address
P
– avoid address
U
– apply patched bytes to angr project memory
Let's keygen:
Apply patched bytes to write them into the memory of angr project:
pip3 install angr
python3
directory is added to the PATH
(required, Python 3
only)File → Install Extensions...
GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle
and use Ghidra to install it: File → Install Extensions...