Inspiration
We like to find bugs and want to make it easier
What it does
Search the code at the binary / assembly level for signatured vulnerable function usage
How we built it
Sifting through the ghidra api documentation and lots of testing and checking
Challenges we ran into
Different calling conventions in x86 had to be handled differently
Accomplishments that we're proud of
Developing a prototype that works in our test cases
What we learned
How to utilize the ghidra API and learning the subtle issues that come with binary analysis
What's next for nagini
In-line operand patching or automatic generation of buffer overflow exploits
Built With
- ghidra
- python
Log in or sign up for Devpost to join the conversation.