Click any tag below to further narrow down your results
Links
OGhidra integrates Large Language Models with Ghidra for AI-assisted binary analysis. Users can query Ghidra using natural language, automate reverse engineering tasks, and analyze binaries more efficiently. It supports local AI models for privacy and offers tools for malware analysis and vulnerability research.
This article details the process of reverse-engineering the Epomaker Galaxy100 keyboard firmware to enable custom key mappings. The author faces limitations with the VIA configuration tool and explores methods to modify the firmware directly using tools like Ghidra and wb32-dfu-updater.
ghidraMCP is a Model Context Protocol server that enables large language models to autonomously reverse engineer applications using Ghidra's core functionalities. The setup process involves downloading the Ghidra plugin, configuring it within Ghidra, and connecting various MCP clients like Claude Desktop, Cline, and 5ire to interact with the server. Detailed installation instructions and configurations are provided for each client integration.
Automated Function ID database generation in Ghidra streamlines the reverse engineering process for binaries lacking symbol information by allowing analysts to create and apply function signatures. The article discusses utilizing scripts and PowerShell to extract object files from static libraries, import them into Ghidra, and generate function signatures, enhancing the clarity and efficiency of vulnerability analysis in software.