Skip to content

Collections of student projects to find execution path in binary program via taint analysis using Ghidra

License

Notifications You must be signed in to change notification settings

tthtlc/source-sink-ghidra

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

3 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Project FinjectRoute

The project aims to develop a tool to automate and simplify the process of identifying vulnerable execution paths leading to command injection in binaries.

Through the use of this tool, breakdown and analysis of such sink-source paths should be made easier and faster for reverse engineers, with an emphasis for greater visual representations as well as understandable output and logging for reference.

The component that integrate with Ghidra is written in Java, to be distinguished from "Project Ghost" which is written in Python.

Original Authors

Chua Chok Yang, Koo Hao Ming, Koh Yuan Xun Ethan, Lim Su Shuan Sammi, Melodi Joy Halim.

Project Ghost

The project aims to develop a tool to identify vulnerable execution paths leading to buffer overflow in binaries. The main component that integrate with Ghidra is written in Python - called "ghost.py".

Original Authors

Haziq Bin Sanib, Tan Joven, Tee Kai Guan, Sree Vathsan, Toh Zheng Hong Shawn.

About

Collections of student projects to find execution path in binary program via taint analysis using Ghidra

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published