The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.
Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:
Z
– destination address
X
– start address
J
– avoid address (multiple choice)
K
– destination address
T
– start address
P
– avoid address
U
– apply patched bytes to angr project memory
Let's keygen:
Apply patched bytes to write them into the memory of angr project:
pip3 install angr
- Make sure
python3
directory is added to thePATH
(required,Python 3
only) - Use Gradle to build the plugin:
GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle
and use Ghidra to install it:File → Install Extensions...
- Check the box in the "New Plugins Found" window to apply AngryGhidra plugin to your project
- If "New Plugins Found" window doesn't appear, go to your CodeBrowser project and tick the plugin in
File → Configure → Miscellaneous → AngryGhidraPlugin