SkillAgentSearch skills...

AngryGhidra

Use angr in Ghidra

Install / Use

/learn @Nalen98/AngryGhidra
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

AngryGhidra

<p align="center"><img src="./images/Icon.png" width="360" height="250">

The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.

Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:

AngryGhidra Plugin

Hotkeys

Set:

Zdestination address
Xstart address
Javoid address (multiple choice)

Reset:

Kdestination address
Tstart address
Pavoid address

Apply bytes:

U – apply patched bytes to angr project memory

Screenshots

Let's keygen:

AngryGhidraView

Apply patched bytes to write them into the memory of angr project:

ApplyPatchedBytes

Installation

  1. pip3 install angr
  2. Make sure python3 directory is added to the PATH (required, Python 3 only)
  3. Use Gradle to build the plugin: GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle and use Ghidra to install it: File → Install Extensions...
  4. Check the box in the "New Plugins Found" window to apply AngryGhidra plugin to your project
  5. If "New Plugins Found" window doesn't appear, go to your CodeBrowser project and tick the plugin in File → Configure → Miscellaneous → AngryGhidraPlugin
View on GitHub
GitHub Stars619
CategoryDevelopment
Updated29d ago
Forks49

Languages

Java

Security Score

95/100

Audited on Mar 9, 2026

No findings