Nalen98 / AngryGhidra

Use angr in Ghidra

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

AngryGhidra

The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.

Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:

AngryGhidra Plugin

Hotkeys

Set:

Zdestination address
Xstart address
Javoid address (multiple choice)

Reset:

Kdestination address
Tstart address
Pavoid address

Apply bytes:

U – apply patched bytes to angr project memory

Screenshots

Let's keygen:

AngryGhidraView

Apply patched bytes to write them into the memory of angr project:

ApplyPatchedBytes

Installation

  1. pip3 install angr
  2. Make sure python3 directory is added to the PATH (required, Python 3 only)
  3. Download the release version of the plugin and install it in Ghidra File → Install Extensions...
  4. Use Gradle to build the plugin: GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle and use Ghidra to install it: File → Install Extensions...
  5. Check the box in the "New Plugins Found" window to apply AngryGhidra plugin to your project

About

Use angr in Ghidra

License:MIT License


Languages

Language:Java 94.5%Language:Python 5.5%