ghidra_tools  by tenable

Ghidra scripts for code analysis and annotation

created 3 years ago
312 stars

Top 87.5% on sourcepulse

GitHubView on GitHub
Project Summary

This repository provides Ghidra scripts for reverse engineering tasks, notably a GPT-3 powered code analyzer and annotator named G-3PO. It targets reverse engineers and security researchers seeking to automate code understanding and documentation within the Ghidra environment.

How It Works

The extract.py script leverages the Ghidra Bridge to programmatically extract decompiled function information. The g3po.py script, written in Jython, interfaces with OpenAI's language models (GPT-3.5-turbo and GPT-4) to generate explanatory comments for these decompiled functions, aiming to accelerate the reverse engineering process.

Quick Start & Requirements

  • Install Ghidra.
  • Requires Python 3.x for extract.py.
  • Requires Jython for g3po.py.
  • OpenAI API key with access to GPT-3.5-turbo or GPT-4.
  • See Ghidra documentation for Ghidra scripting setup.

Highlighted Details

  • G-3PO script offers AI-powered code annotation.
  • Supports GPT-3.5-turbo and GPT-4 models.
  • extract.py facilitates bulk extraction of decompiled functions.

Maintenance & Community

  • Open-sourced by Tenable.
  • No specific community links or roadmap provided in the README.

Licensing & Compatibility

  • License not specified in the README.
  • Compatibility with commercial or closed-source projects depends on the unstated license.

Limitations & Caveats

The repository's licensing is not specified, which may impact commercial use. The effectiveness of G-3PO is dependent on the quality of OpenAI's LLM responses and the user's API access.

Health Check
Last commit

2 years ago

Responsiveness

1 day

Pull Requests (30d)
0
Issues (30d)
0
Star History
2 stars in the last 90 days

Explore Similar Projects

Feedback? Help us improve.