Pyrrha is a filesystem cartography and correlation software focusing on visualization. It currently focuses on the relationship between executable files but aims at enabling anyone to map and visualize any relationship types. It uses the open-source code source explorer NumbatUI to provide users with an easy way to navigate through and search for path to function.
An example of the symbols and libraries imported by libgcc_s.so.1
and of the symbols which reference this library.
An example of the symlinks which point on busybox
.
The installation is done in three parts:
- Install mapper external dependencies: IDA dissassembler (with the decompilation option for the
exe-decomp
mapper) andQuokka
IDA plugin. - Install
Pyrrha
itself. - Install
NumbatUI
(orSourcetrail
) to be able to visualize Pyrrha's results.
Note
A quick start installation is available on Pyrrha documentation.
The usage workflow is composed of two steps which allow you to separate DB creation and result visualization.
- Run Pyrrha to obtain NumbatUI compatible files (
*.srctrlprj
for the project file and*.srctrldb
for the DB file). With the python package, you can just launch the commandpyrrha
. - Visualize your results with Sourcetrail/NumbatUI.
Note
The detailed documentation of each mapper is available in the documentation.
Pyrrha presentations, including live demos:
-
Pyrrha & Friends: Diving into Firmware Cartography, Eloïse Brocas & Robin Davis, SSTIC, Rennes, France, 2025. [slides] [video]
-
Pyrrha: navigate easily into your system binaries, Eloïse Brocas, Hack.lu, Luxembourg, 2023. [slides] [video]
-
Map your Firmware!, Eloïse Brocas, Pass The SALT, Lille, France, 2023. [slides] [video]
Theory behind implementations
- Streamlining Firmware Analysis with Inter-Image Call Graphs and Decompilation, Robin David, RE//verse.io, USA, 2025. [slides] [video]
- Eloïse Brocas (@ebrocas), Quarkslab
- Robin David (@RobinDavid), Quarkslab
- Pascal Wu (@pwu42), during his internship at Quarkslab