Ghidra toolkit for headless code analysis automation
Top 79.4% on sourcepulse
Sekiryu is a comprehensive toolkit for automating Ghidra's headless analysis, targeting reverse engineers and security researchers. It streamlines vulnerability hunting, code commenting via ChatGPT, and report generation with data visualization, offering significant time savings for complex binary analysis tasks.
How It Works
Sekiryu leverages Ghidra's headless mode for batch processing and provides a script repository for diverse analysis functions. It supports custom script integration via an XML-RPC server, allowing scripts to interact with Ghidra and the host system. This architecture enables flexible input (single files or folders) and extensibility for user-defined analysis workflows.
Quick Start & Requirements
pip install sekiryu
sekiryu [-F FILE][OPTIONS]
Highlighted Details
Maintenance & Community
The project is a personal initiative, with the author seeking contributions for optimization, malware analysis scripts, and data visualization improvements. Further details can be found on their website: https://www.bushido-sec.com/.
Licensing & Compatibility
The README does not explicitly state a license. Compatibility for commercial use or closed-source linking is not specified.
Limitations & Caveats
The project is described as the author's first "big" project, and a more advanced alternative is recommended (https://github.com/LaurieWired/GhidraMCP). The XML-RPC server is noted as potentially insecure against maliciously constructed data. Binary analysis can be a slow process, requiring significant waiting time for large inputs.
3 months ago
Inactive