The plugin allows you to use angr for binary analysis and symbolic execution in Ghidra interface.
Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:
Z – destination address
X – start address
J – avoid address (multiple choice)
K – destination address
T – start address
P – avoid address
U – apply patched bytes to angr project memory
Let's keygen:
Apply patched bytes to write them into the memory of angr project:
pip3 install angr- Make sure
python3directory is added to thePATH(required,Python 3only) - Use Gradle to build the plugin:
GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradleand use Ghidra to install it:File → Install Extensions... - Check the box in the "New Plugins Found" window to apply AngryGhidra plugin to your project
- If "New Plugins Found" window doesn't appear, go to your CodeBrowser project and tick the plugin in
File → Configure → Miscellaneous → AngryGhidraPlugin


