Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/0xdea/ghidra-scripts
A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.
https://github.com/0xdea/ghidra-scripts
ghidra ghidra-scripts reverse-engineering vulnerability-research
Last synced: 1 day ago
JSON representation
A collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.
- Host: GitHub
- URL: https://github.com/0xdea/ghidra-scripts
- Owner: 0xdea
- License: mit
- Created: 2021-01-08T08:45:03.000Z (about 4 years ago)
- Default Branch: main
- Last Pushed: 2024-11-21T08:13:23.000Z (2 months ago)
- Last Synced: 2025-01-24T21:06:54.151Z (8 days ago)
- Topics: ghidra, ghidra-scripts, reverse-engineering, vulnerability-research
- Language: Java
- Homepage: https://ghidra-sre.org
- Size: 144 KB
- Stars: 240
- Watchers: 7
- Forks: 28
- Open Issues: 2
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# ghidra-scripts
[![](https://img.shields.io/github/stars/0xdea/ghidra-scripts.svg?style=flat&color=yellow)](https://github.com/0xdea/ghidra-scripts)
[![](https://img.shields.io/github/forks/0xdea/ghidra-scripts.svg?style=flat&color=green)](https://github.com/0xdea/ghidra-scripts)
[![](https://img.shields.io/github/watchers/0xdea/ghidra-scripts.svg?style=flat&color=red)](https://github.com/0xdea/ghidra-scripts)
[![](https://img.shields.io/badge/twitter-%400xdea-blue.svg)](https://twitter.com/0xdea)
[![](https://img.shields.io/badge/mastodon-%40raptor-purple.svg)](https://infosec.exchange/@raptor)> "Humans are more suited to recognize food than to keep large graphs in their head."
>
> -- Halvar FlakeA collection of my Ghidra scripts to facilitate reverse engineering and vulnerability research.
Blog post: https://security.humanativaspa.it/automating-binary-vulnerability-discovery-with-ghidra-and-semgrep/
See also: https://github.com/federicodotta/ghidra-scripts
## VulnDev
* [**Rhabdomancer.java**](https://github.com/0xdea/ghidra-scripts/blob/main/Rhabdomancer.java). This script locates all calls to potentially insecure functions.
* [**Haruspex.java**](https://github.com/0xdea/ghidra-scripts/blob/main/Haruspex.java). This script extracts all pseudo-code generated by the Ghidra decompiler.## iOS
* [**FOX_alpha.java**](https://github.com/0xdea/ghidra-scripts/blob/main/FOX_alpha.java). This script tries to fix Objective-C cross-references in iOS apps.## Analysis
* [**ResolveMipsN32LinuxSyscallsScript**](https://github.com/0xdea/ghidra-scripts/blob/main/ResolveMipsN32LinuxSyscallsScript.java). This script resolves MIPS N32 syscalls.