The plugin allows you to use angr for binary analysis and symbolic execution from Ghidra interface.
Solving CTF challenge from SecurityFest 2016 "fairlight" with AngryGhidra plugin:
Apply patched bytes to write them to the memory of angr project:
pip3 install angr
at first- Make sure that python3 directory added to the
PATH
(required,python3
only) - Download Release version of extension and install it in Ghidra
File โ Install Extensions...
- Use gradle to build extension:
GHIDRA_INSTALL_DIR=${GHIDRA_HOME} gradle
and use Ghidra to install it:File โ Install Extensions...