Inspiration

We like to find bugs and want to make it easier

What it does

Search the code at the binary / assembly level for signatured vulnerable function usage

How we built it

Sifting through the ghidra api documentation and lots of testing and checking

Challenges we ran into

Different calling conventions in x86 had to be handled differently

Accomplishments that we're proud of

Developing a prototype that works in our test cases

What we learned

How to utilize the ghidra API and learning the subtle issues that come with binary analysis

What's next for nagini

In-line operand patching or automatic generation of buffer overflow exploits

Built With

Share this project:

Updates