Skip to content

Latest commit

 

History

History
42 lines (27 loc) · 1.43 KB

README.md

File metadata and controls

42 lines (27 loc) · 1.43 KB

AngryGhidra

The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.

Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:

AngryGhidra Plugin

Hotkeys

Set:

Zdestination address
Xstart address
Javoid address (multiple choice)

Reset:

Kdestination address
Tstart address
Pavoid address

Apply bytes:

U – apply patched bytes to angr project memory

Screenshots

Let's keygen:

AngryGhidraView

Apply patched bytes to write them into the memory of angr project:

ApplyPatchedBytes

Installation

  1. pip3 install angr
  2. Make sure python3 directory is added to the PATH (required, Python 3 only)
  3. Use Gradle to build the plugin: GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle and use Ghidra to install it: File → Install Extensions...
  4. Check the box in the "New Plugins Found" window to apply AngryGhidra plugin to your project
  5. If "New Plugins Found" window doesn't appear, go to your CodeBrowser project and tick the plugin in File → Configure → Miscellaneous → AngryGhidraPlugin