ghidra

The Ghidra reverse engineering tool.

Ghidra: https://github.com/NationalSecurityAgency/ghidra.

Classes

GhidraFunctionSegmenter(*args, **kwargs)

Segments the given binaries into individual functions.

class undertale.datasets.pipeline.segmenters.ghidra.GhidraFunctionSegmenter(*args, **kwargs)

Bases: PipelineStep

Segments the given binaries into individual functions.

Input:

Whole binaries in some executable format (ELF, PE, DLL, Mach-O, etc.)

Output:

Yields documents for each function in the given binary. Also disassembles, decompiles, and generates the CFG for each function. Raises exceptions if Ghidra auto-analysis does not work for some reason.