NationalSecurityAgency / ghidra

Ghidra is a software reverse engineering (SRE) framework
https://www.nsa.gov/ghidra
Apache License 2.0
49.06k stars 5.65k forks source link

In headless mode, how can I get the pseudo code corresponding to a section of assembly instructions? #6641

Closed ChengyueLiu closed 1 week ago

ChengyueLiu commented 2 weeks ago

Dear Ghidra Team, I am a student from Nanyang Technological University, currently focusing on binary analysis. I noticed that when I select a section of assembly instructions in the Ghidra GUI, the corresponding pseudocode is automatically highlighted. Could you please provide some insights into how Ghidra converts the mapping relationships between the assembly instructions and the corresponding pseudocode?(where is the calculating related source codes) Additionally, is this feature available in the headless mode of Ghidra? Any information or resources you can share would be greatly appreciated. Thank you for your time and consideration. Best regards,