Created
September 23, 2019 18:32
-
-
Save nstarke/a6d2b938917957cd04a5bcfdeeef58b2 to your computer and use it in GitHub Desktop.
Ghidra Address Iteration Bruteforce Disasemble
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
import ghidra.app.script.GhidraScript | |
# I noticed that on some microcontrollers the ghidra analyzer doesn't auto analyze the entire binary. | |
# This Ghidra Script will iterate over every address in a binary and attempt to disassemble it. | |
counter = 0 | |
nextAddress = currentProgram.getMinAddress() | |
while nextAddress: | |
if disassemble(nextAddress): | |
counter = counter + 1 | |
nextAddress = nextAddress.next() | |
print ("Total Addresses Analyzed: " + str(counter) + " | Language ID: " + currentProgram.getLanguageID().toString() + " | ") |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Ah ok. If you think it should (not sure what your specific cases are), feel free to submit an issue to us and we can take a look!