Skip to content

Releases: 20urc3/Sekiryu

Sekiryu V0.0.2

26 Jun 18:33
0fabf9b
Compare
Choose a tag to compare

The tool isn't about Ghidra + ChatGPT anymore. Now it allows to pilot native Ghidra in headless mode, and allows user to benefits a new variety of features such as:

  • Headless Mode Automation: The toolkit enables users to seamlessly launch and run Ghidra in Headless mode, allowing for automated and batch processing of code analysis tasks.

  • Script Repository/Management: The toolkit includes a repository of pre-built scripts that can be executed within Ghidra. These scripts cover a variety of functionalities, empowering users to perform diverse analysis and manipulation tasks. It allows users to load and save their own scripts, providing flexibility and customization options for their specific analysis requirements. Users can easily manage and organize their script collection.

  • Flexible Input Options: Users can utilize the toolkit to analyze individual files or entire folders containing multiple files. This flexibility enables efficient analysis of both small-scale and large-scale codebases.

Available scripts

  • Vulnerability Hunting with pattern recognition: Leverage the toolkit's scripts to identify potential vulnerabilities within the codebase being analyzed. This helps security researchers and developers uncover security weaknesses and proactively address them.
  • Vulnerability Hunting with SemGrep: Thanks to the security Researcher 0xdea and the rule-set they created, we can use simple rules and SemGrep to detect vulnerabilities in C/C++ pseudo code (their github: https://github.com/0xdea/semgrep-rules)
  • Automatic Pseudo Code Generating: Automatically generate pseudo code within Ghidra's Headless mode. This feature assists in understanding and documenting the code logic without manual intervention.
  • Pseudo-code Commenting with ChatGPT: Enhance the readability and understanding of the codebase by utilizing ChatGPT to generate human-like comments for pseudo-code snippets. This feature assists in documenting and explaining the code logic.
  • Reporting and Data Visualization: Generate comprehensive reports with visualizations to summarize and present the analysis results effectively. The toolkit provides data visualization capabilities to aid in identifying patterns, dependencies, and anomalies in the codebase.

Sekiryu 0.0.1

26 Feb 18:42
3db32d9
Compare
Choose a tag to compare

We are excited to announce the release of our beta version of the Python script that performs automatic decompilation and analysis of binary files. With this script, you can easily reverse engineer binaries, cracksme challenges, and malware without having to manually decompile the files.

The script is designed to work with your preferred decompiler. It allows you to analyze binary files quickly and efficiently without the need for extensive knowledge of reverse engineering.

The script is easy to use and user-friendly, making it suitable for both novice and experienced reverse engineers. It works by automatically decompiling the binary files and analyzing them using ChatGPT, a large language model trained by OpenAI.

As a beta version, the script is still undergoing development, and we are continuously working to improve its features and functionality. We welcome any feedback and suggestions on how we can improve the script to better meet your needs.

In conclusion, we invite you to try out this new tool and see how it can make your reverse engineering tasks more manageable and efficient.