AngryGhidra Save

Use angr in Ghidra

Project README

AngryGhidra

The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.

Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:

AngryGhidra Plugin

Hotkeys

Set:

Zdestination address
Xstart address
Javoid address (multiple choice)

Reset:

Kdestination address
Tstart address
Pavoid address

Apply bytes:

U – apply patched bytes to angr project memory

Screenshots

Let's keygen:

AngryGhidraView

Apply patched bytes to write them into the memory of angr project:

ApplyPatchedBytes

Installation

  1. pip3 install angr
  2. Make sure python3 directory is added to the PATH (required, Python 3 only)
  3. Download the release version of the plugin and install it in Ghidra File → Install Extensions...
  4. Use Gradle to build the plugin: GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle and use Ghidra to install it: File → Install Extensions...
  5. Check the box in the "New Plugins Found" window to apply AngryGhidra plugin to your project
Open Source Agenda is not affiliated with "AngryGhidra" Project. README Source: Nalen98/AngryGhidra
Stars
522
Open Issues
0
Last Commit
2 months ago
Repository
License
MIT

Open Source Agenda Badge

Open Source Agenda Rating