Inspiration

During Capture the flag competitions and real world vulnerability research reverse engineering is something that I struggle with most due to the overhead of jumping between programs.

What it does

Bridges the gap between the debugger and decompiler

How we built it

Using the commercial API of binary ninja we can hook the python API in GDB to create a plugin to share information

Challenges we ran into

Dependencies errors as the python environment inside GDB was a bit different then the local system.

Accomplishments that we're proud of

Figuring out the challenges and creating a usable product for reverse engineering

What we learned

Learned about the python API in both binary ninja and GDB. The binary ninja API is extremely power full and I'm looking forward to using it to help automate reverse engineering and exploitation programs

What's next for Terrasite

Add support of other decompiler such as Ghidra or IDA Pro. More features such as structs sharing would also be helpful

Built With

Share this project:

Updates