ghidra¶
The Ghidra reverse engineering tool.
Ghidra: https://github.com/NationalSecurityAgency/ghidra.
Classes
|
Segments the given binaries into individual functions. |
- class undertale.datasets.pipeline.segmenters.ghidra.GhidraFunctionSegmenter(*args, **kwargs)¶
Bases:
PipelineStepSegments the given binaries into individual functions.
- Input:
Whole binaries in some executable format (ELF, PE, DLL, Mach-O, etc.)
- Output:
Yields documents for each function in the given binary. Also disassembles, decompiles, and generates the CFG for each function. Raises exceptions if Ghidra auto-analysis does not work for some reason.