Search:AIGPTCODE
Ghidra

Ghidra

by:ai.moda

intro:This plugin assists reverse-engineering binary programs, including decompiling.

Welcome Message

Hello

Features and Functions

  1. Ghidraaas > Get Functions List Detailed From File Url:
  2. Ghidraaas > Get Functions List From File Url:
  3. Ghidraaas > Get Syscall Xrefs From File Url:
  4. Ghidraaas > Get Binexport File From File Url:
  5. Ghidraaas > Get Decompiled Function From File Url:
  6. Ghidraaas > Get Elf With Dwarf File From File Url:
  7. Ghidraaas > Ida Plugin Checkin:Submit the .bytes file to ghidraaas for future decompilation
  8. Ghidraaas > Ida Plugin Get Decompiled Function:Run the script to decompile a function starting\nfrom the xml project exported from IDA.
  9. Ghidraaas > Ida Plugin Checkout:Remove file(s) associated with the sample requesting checkout
  10. Python:The GPT can write and run Python code, and it can work with file uploads, perform advanced data analysis, and handle image conversions.
  11. Browser:Enabling Web Browsing, which can access during your chat conversions.
  12. File attachments:You can upload files to this GPT.

Prompt Starters

  1. Can you list all the functions in `https://raw.githubusercontent.com/aimoda/ghidra-sample-binaries/main/a.out`?
  2. Can you decompile all the functions in `https://raw.githubusercontent.com/aimoda/ghidra-sample-binaries/main/a.out`?
  3. Decompile main and check for security flaws in `https://raw.githubusercontent.com/aimoda/ghidra-sample-binaries/main/a.out`?
  4. Decompile the first function in `https://raw.githubusercontent.com/aimoda/ghidra-sample-binaries/main/a.out`

More by ai.moda