SRA-1 is an LLM-powered bridge that brings high-level security analysis directly into your IDA Pro workflow. It transforms complex decompiled code into human-readable logic breakdowns, renames obscure variables, and generates functional exploit prototypes (Z3/pwntools) in seconds.
- โก Seamless IDA Integration: Right-click any decompiled function in the Hex-Rays view and "Send to SRA-1".
- ๐ง Advanced Reasoning: Powered by state-of-the-art LLMs (Mistral, Llama 3, etc.) via OpenRouter.
- ๐ ๏ธ Automated Tooling: Instantly generates:
- Logic Summaries: High-level explanations of what the code actually does.
- Variable Mapping: Intuitive renames for
v1,v2,a1style variables. - Exploit Prototypes: Functional Z3 scripts for constraint solving or pwntools scripts for I/O automation.
- ๐ Hybrid Architecture: A lightweight IDA plugin coupled with a powerful FastAPI bridge server for maximum flexibility and privacy control.
graph LR
A[IDA Pro Plugin] -- "Decompiled C" --> B[FastAPI Bridge Server]
B -- "Security Prompt" --> C[OpenRouter LLM]
C -- "Analysis" --> B
B -- "Structured Result" --> A
A -- "Display" --> D[IDA Output window]
- Navigate to the
bridge/directory. - Install dependencies:
pip install fastapi uvicorn requests pydantic. - API Key Setup: Go to OpenRouter and create an API key. Then, open
bridge/main.pyand replace"YOUR_OPENROUTER_API_KEY_HERE"with your actual API key. - Run the server:
python main.py.
- Copy
ida_plugin/sra1_plugin.pyto your IDAplugins/directory (or run it viaAlt+F7). - Make sure you have the
requestslibrary installed in your IDA Python environment.
Reverse engineering shouldn't be a chore of renaming variables and manual trace-backs. SRA-1 acts as your junior researcher, handling the grunt work of logic extraction so you can focus on the core vulnerabilities.
- Auto-patch suggestions directly in IDA.
- Multi-function context analysis.
- Support for local LLMs (Ollama/LM Studio).
Built with โค๏ธ for the security research community.