Sorry for the delay, but I'd like to share one of my recent updates:

Recently I open-sourced ghidralib - a library that makes #Ghidra scripts drastically shorter and easier to write. I've been using it daily for #reverseengineering and decided it’s time to share. The source code is here: https://github.com/msm-code/ghidralib, and the docs are https://msm-code.github.io/ghidralib/

GitHub - msm-code/ghidralib: A Pythonic Ghidra standard library

A Pythonic Ghidra standard library. Contribute to msm-code/ghidralib development by creating an account on GitHub.

GitHub

Actually, since the release a week ago, we already got a few new useful features, including:

* Even easier function emulation (`Function("Foo").emulate(1, 2, 3)` will correctly pass the parameters, emulate the call and return the result)
* Built-in patching, assembly, disassembly and searching for byte patterns
* And a parlor trick: instruction/function/things highlighting. `for i in Instruction.all(): if i.mnemonic == "CALL": i.highlight()`