Skip to content

Latest commit

 

History

History
42 lines (27 loc) · 1.37 KB

README.md

File metadata and controls

42 lines (27 loc) · 1.37 KB

AngryGhidra

The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.

Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:

AngryGhidra Plugin

Hotkeys

Set:

Zdestination address
Xstart address
Javoid address (multiple choice)

Reset:

Kdestination address
Tstart address
Pavoid address

Apply bytes:

U – apply patched bytes to angr project memory

Screenshots

Let's keygen:

AngryGhidraView

Apply patched bytes to write them into the memory of angr project:

ApplyPatchedBytes

Installation

  1. pip3 install angr
  2. Make sure python3 directory is added to the PATH (required, Python 3 only)
  3. Download the release version of the plugin and install it in Ghidra File → Install Extensions...
  4. Use Gradle to build the plugin: GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle and use Ghidra to install it: File → Install Extensions...
  5. Check the box in the "New Plugins Found" window to apply AngryGhidra plugin to your project