angr is a platform-agnostic binary analysis framework brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish, the open source community, and @rhelmot. It is a suite of Python 3 libraries that enable tasks such as disassembly, lifting, program instrumentation, symbolic execution, control-flow analysis, data-dependency analysis, value-set analysis, and decompilation. The most common operation is loading a binary using angr.Project('/bin/bash').
This tool is not verified yet and doesn't have listed features.
Did you submit the verified tool? Sign in to add features.
Are you the author? Claim the tool by clicking the icon above. After claiming, you can add features.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
Microservice for scanning files with Yara
Compact C framework for analyzing suspected malware documents and detecting exploits and embedded executables.
Abusing the COM Registry Structure: CLSID, LocalServer32, & InprocServer32
A library for checking potentially malicious files and archives using YARA and making a decision about their harmfulness.
A tool to help exploit XXE vulnerabilities by sending a crafted XML file to the server and parsing it to extract the data.