https://github.com/quarkslab/pyrrha
A tool for firmware cartography
https://github.com/quarkslab/pyrrha
firmware-analysis firmware-tools security
Last synced: about 2 months ago
JSON representation
A tool for firmware cartography
- Host: GitHub
- URL: https://github.com/quarkslab/pyrrha
- Owner: quarkslab
- License: apache-2.0
- Created: 2023-06-26T11:44:03.000Z (almost 3 years ago)
- Default Branch: main
- Last Pushed: 2025-12-02T14:38:39.000Z (4 months ago)
- Last Synced: 2025-12-05T12:12:39.394Z (4 months ago)
- Topics: firmware-analysis, firmware-tools, security
- Language: Python
- Homepage: https://quarkslab.github.io/pyrrha/
- Size: 13.9 MB
- Stars: 161
- Watchers: 7
- Forks: 10
- Open Issues: 1
-
Metadata Files:
- Readme: README.md
- Changelog: CHANGELOG.md
- Contributing: docs/contributing/dev_mapper.md
- License: LICENSE
Awesome Lists containing this project
- awesome-iot-security-resource - pyrrha
README
# Pyrrha: A mapper collection for firmware analysis
Pyrrha is a filesystem cartography and correlation software focusing on visualization. It currently focuses on the relationship between executable files but aims at enabling anyone to map and visualize any relationship types. It uses the open-source code source
explorer [NumbatUI](https://github.com/quarkslab/NumbatUI) to provide users with an easy way to navigate through and search for
path to function.

An example of the symbols and libraries imported by libgcc_s.so.1 and of the symbols which reference this library.

An example of the symlinks which point on busybox.
## Installation
The installation is done in three parts:
1. Install mapper external dependencies: IDA dissassembler (with the decompilation option for the `exe-decomp` mapper) and [`Quokka` IDA plugin](https://github.com/quarkslab/quokka/releases).
1. Install `Pyrrha` itself.
1. Install [`NumbatUI`](https://github.com/quarkslab/NumbatUI) (or [`Sourcetrail`](https://github.com/CoatiSoftware/Sourcetrail)) to be able to visualize Pyrrha's results.
> [!NOTE]
> A quick start installation is available on [Pyrrha documentation](https://quarkslab.github.io/pyrrha/#installation).
## Usage
The usage workflow is composed of two steps which allow you to separate DB creation and result visualization.
1. Run Pyrrha to obtain NumbatUI compatible files (`*.srctrlprj` for the project file and `*.srctrldb` for the DB file). With the python package, you can just launch the command `pyrrha`.
2. Visualize your results with Sourcetrail/NumbatUI.
> [!NOTE]
> The detailed documentation of each mapper is available in the [documentation](https://quarkslab.github.io/pyrrha/mappers/mappers/).
## Publications
Pyrrha presentations, including live demos:
- **Pyrrha & Friends: Diving into Firmware Cartography**, Eloïse Brocas & Robin David, *SSTIC*, Rennes, France, 2025. [[slides]](https://www.sstic.org/media/SSTIC2025/SSTIC-actes/pyrrha_diving_into_firmware_cartography/SSTIC2025-Slides-pyrrha_diving_into_firmware_cartography-brocas_david.pdf) [[video]](https://static.sstic.org/videos2025/1080p/pyrrha_diving_into_firmware_cartography.mp4)
- **Pyrrha: navigate easily into your system binaries**, Eloïse Brocas, *Hack.lu*, Luxembourg, 2023. [[slides]](https://github.com/quarkslab/conf-presentations/blob/master/Confs/HackLu23/pyrrha.pdf) [[video]](https://www.youtube.com/watch?v=-dMl-SvQl4k)
- **Map your Firmware!**, Eloïse Brocas, *Pass The SALT*, Lille, France, 2023. [[slides]](https://github.com/quarkslab/conf-presentations/blob/master/Confs/PTS23/PTS2023-Talk-14-Pyrrha-map-your-firmware.pdf) [[video]](https://passthesalt.ubicast.tv/videos/2023-map-your-firmware/)
Theory behind implementations
- **Streamlining Firmware Analysis with Inter-Image Call Graphs and Decompilation**, Robin David, *RE//verse.io*, USA, 2025. [[slides]](https://github.com/quarkslab/conf-presentations/blob/master/Confs/REverse-25/REverse_firmware_analysis_2025.pdf) [[video]](https://www.youtube.com/watch?v=LsDnrfZt_Xs)
## Authors
- Eloïse Brocas (@ebrocas), Quarkslab
- Robin David (@RobinDavid), Quarkslab
### Past Contributors
- Pascal Wu (@pwu42), during his internship at Quarkslab