AngryGhidra

Project Url: Nalen98/AngryGhidra
Introduction: Use angr in Ghidra
More: Author   ReportBugs   
Tags:

The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.

Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:

AngryGhidra Plugin

Hotkeys

Set:

Zdestination address
Xstart address
Javoid address (multiple choice)

Reset:

Kdestination address
Tstart address
Pavoid address

Apply bytes:

U – apply patched bytes to angr project memory

Screenshots

Let's keygen:

AngryGhidraView

Apply patched bytes to write them into the memory of angr project:

ApplyPatchedBytes

Installation

1) pip3 install angr 2) Make sure python3 directory is added to the PATH (required, Python 3 only) 3) Use Gradle to build the plugin: GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle and use Ghidra to install it: File → Install Extensions... 4) Check the box in the "New Plugins Found" window to apply AngryGhidra plugin to your project 5) If "New Plugins Found" window doesn't appear, go to your CodeBrowser project and tick the plugin in File → Configure → Miscellaneous → AngryGhidraPlugin

Apps
About Me
GitHub: Trinea
Facebook: Dev Tools