Metadata-Version: 2.1
Name: ctadl-ghidra-fact-generator-plugin
Version: 0.0.2
Summary: CTADL GHIDRA Pcode fact generator plugin
Home-page: https://github.com/sandialabs/ctadl
Project-URL: Bug Tracker, https://github.com/sandialabs/ctadl/issues
Classifier: Programming Language :: Python :: 3.9
Classifier: Environment :: Console
Classifier: Environment :: Plugins
Classifier: License :: OSI Approved :: Apache Software License
Classifier: Operating System :: POSIX
Requires-Python: >=3.9
Description-Content-Type: text/markdown
License-File: LICENSE.txt

# CTADL Ghidra Pcode Fact Generator Plugin

This project is part of the [CTADL Taint Analyzer](https://github.com/sandialabs/ctadl).

This project provides a plugin for CTADL so that it can perform taint analysis on [Ghidra](https://github.com/NationalSecurityAgency/ghidra) Pcode.

# Installation

Use pip.

    $ pip install ctadl-ghidra-fact-generator

Afterward, if ctadl is installed, you can do:

    $ ctadl import pcode /path/to/a/binary

See `ctadl --help` for more detauls.

Make sure, when you run ctadl, that Ghidra runs in your environment and that `GHIDRA_HOME` is set.
If you forget, it'll remind you.

