Releases: akiselev/ghidra-cli
Releases · akiselev/ghidra-cli
v0.1.10
Full Changelog: v0.1.9...v0.1.10
v0.1.9
Full Changelog: v0.1.8...v0.1.9
v0.1.8
Full Changelog: v0.1.7...v0.1.8
v0.1.7
Full Changelog: v0.1.6...v0.1.7
v0.1.6
Full Changelog: v0.1.5...v0.1.6
v0.1.5
Full Changelog: v0.1.4...v0.1.5
v0.1.4
Full Changelog: v0.1.3...v0.1.4
v0.1.0 - Initial Release
Ghidra CLI v0.1.0
A powerful Rust CLI for automating Ghidra reverse engineering tasks, designed for both direct usage and AI agent integration.
Highlights
- Fast daemon mode - Keeps Ghidra loaded in memory for sub-second response times
- Comprehensive analysis - Functions, symbols, types, strings, cross-references
- Binary patching - Modify bytes, NOP instructions, export patches
- Call graphs - Generate caller/callee graphs, export to DOT format
- Search capabilities - Find strings, bytes, functions, crypto patterns
- Script execution - Run Python/Java scripts, inline or from files
- Flexible output - JSON, table, or count formats with field selection
Installation
git clone https://github.com/akiselev/ghidra-cli
cd ghidra-cli
cargo install --path .Requirements
- Ghidra 10.0+ (download)
- Java 17+
- Set
GHIDRA_INSTALL_DIRenvironment variable
Quick Start
# Check installation
ghidra doctor
# Import and analyze
ghidra import ./binary --project myproject --program mybinary
ghidra analyze --project myproject --program mybinary
# Start daemon for fast queries
ghidra daemon start --project myproject --program mybinary
# Query functions, decompile, search...
ghidra function list
ghidra decompile main
ghidra find string "password"See README.md for full documentation.