lr-m/GhidrOllama

A Ghidra script that enables the analysis of selected functions and instructions using Large Language Models (LLMs). It aims to make reverse-engineering more efficient by using Ollama's API directly within Ghidra.

33
/ 100
Emerging

This tool helps reverse engineers analyze compiled software more efficiently. It takes selected functions or individual assembly instructions from within Ghidra, feeds them to a Large Language Model (LLM) running on Ollama, and returns explanations, suggested names, comments, or potential vulnerabilities directly in Ghidra. It's designed for malware analysts, security researchers, and anyone performing binary code analysis who needs to understand complex compiled code quickly.

152 stars. No commits in the last 6 months.

Use this if you are a reverse engineer working in Ghidra and want to leverage AI to quickly understand, rename, comment, or identify potential issues in specific functions or assembly code snippets.

Not ideal if you need deep, context-aware vulnerability analysis that goes beyond individual function scope, as LLMs may lack comprehensive program context for advanced bug hunting.

reverse-engineering malware-analysis binary-analysis vulnerability-research software-disassembly
No License Stale 6m No Package No Dependents
Maintenance 0 / 25
Adoption 10 / 25
Maturity 8 / 25
Community 15 / 25

How are scores calculated?

Stars

152

Forks

17

Language

Python

License

Category

ide-llm-plugins

Last pushed

Nov 29, 2024

Commits (30d)

0

Get this data via API

curl "https://pt-edge.onrender.com/api/v1/quality/llm-tools/lr-m/GhidrOllama"

Open to everyone — 100 requests/day, no key needed. Get a free key for 1,000/day.