Loading pkgs/tools/security/ghidra/extensions/ghidraninja-ghidra-scripts/default.nix +15 −5 Original line number Diff line number Diff line Loading @@ -5,6 +5,7 @@ binwalk, swift, yara, useSwift ? false, }: buildGhidraScripts { Loading @@ -20,11 +21,20 @@ buildGhidraScripts { postPatch = '' # Replace subprocesses with store versions substituteInPlace binwalk.py --replace-fail 'subprocess.call(["binwalk"' 'subprocess.call(["${binwalk}/bin/binwalk"' substituteInPlace swift_demangler.py --replace-fail '"swift"' '"${swift}/bin/swift"' substituteInPlace yara.py --replace-fail 'subprocess.check_output(["yara"' 'subprocess.check_output(["${yara}/bin/yara"' substituteInPlace YaraSearch.py --replace-fail '"yara "' '"${yara}/bin/yara "' ''; substituteInPlace binwalk.py --replace-fail 'subprocess.call(["binwalk"' 'subprocess.call(["${lib.getExe binwalk}"' substituteInPlace yara.py --replace-fail 'subprocess.check_output(["yara"' 'subprocess.check_output(["${lib.getExe yara}"' substituteInPlace YaraSearch.py --replace-fail '"yara "' '"${lib.getExe yara} "' '' + ( if useSwift then '' substituteInPlace swift_demangler.py --replace-fail '"swift"' '"${lib.getExe' swift "swift"}"' '' else '' rm swift_demangler.py '' ); meta = { description = "Scripts for the Ghidra software reverse engineering suite"; Loading Loading
pkgs/tools/security/ghidra/extensions/ghidraninja-ghidra-scripts/default.nix +15 −5 Original line number Diff line number Diff line Loading @@ -5,6 +5,7 @@ binwalk, swift, yara, useSwift ? false, }: buildGhidraScripts { Loading @@ -20,11 +21,20 @@ buildGhidraScripts { postPatch = '' # Replace subprocesses with store versions substituteInPlace binwalk.py --replace-fail 'subprocess.call(["binwalk"' 'subprocess.call(["${binwalk}/bin/binwalk"' substituteInPlace swift_demangler.py --replace-fail '"swift"' '"${swift}/bin/swift"' substituteInPlace yara.py --replace-fail 'subprocess.check_output(["yara"' 'subprocess.check_output(["${yara}/bin/yara"' substituteInPlace YaraSearch.py --replace-fail '"yara "' '"${yara}/bin/yara "' ''; substituteInPlace binwalk.py --replace-fail 'subprocess.call(["binwalk"' 'subprocess.call(["${lib.getExe binwalk}"' substituteInPlace yara.py --replace-fail 'subprocess.check_output(["yara"' 'subprocess.check_output(["${lib.getExe yara}"' substituteInPlace YaraSearch.py --replace-fail '"yara "' '"${lib.getExe yara} "' '' + ( if useSwift then '' substituteInPlace swift_demangler.py --replace-fail '"swift"' '"${lib.getExe' swift "swift"}"' '' else '' rm swift_demangler.py '' ); meta = { description = "Scripts for the Ghidra software reverse engineering suite"; Loading