Repository navigation
angr
- Website
- Wikipedia
A powerful and user-friendly binary analysis platform!
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
Use angr in Ghidra
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.
Handy utilities for the angr binary analysis framework, most notably CFG visualization
Use angr in the IDA Pro debugger generating a state from the current debug session
Code and exercises for a workshop on z3 and angr
Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
The SAILR paper's evaluation pipline for measuring the quality of decompilation
A decompiler to automatically reverse-engineer the DNN semantics from its compiled binary using program analysis
A tool for finding the one gadget RCE in libc