angr Logo

angr

0
Free
Visit Website

angr is a platform-agnostic binary analysis framework brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish, the open source community, and @rhelmot. It is a suite of Python 3 libraries that enable tasks such as disassembly, lifting, program instrumentation, symbolic execution, control-flow analysis, data-dependency analysis, value-set analysis, and decompilation. The most common operation is loading a binary using angr.Project('/bin/bash').

FEATURES

ALTERNATIVES

A disassembly framework with support for multiple hardware architectures and clean API.

VxSig is a tool to automatically generate AV byte signatures from similar binaries.

ICSREF is a modular framework for automated reverse engineering of industrial control systems binaries

A tool for signature analysis of RTF files to detect potentially unique parts and malicious documents.

A tool for translating Dalvik bytecode to Java bytecode for analyzing Android applications.

Educational resources for reverse engineering tutorials by lena151.

One stop shop for decompiling Android apps with a focus on regenerating R references.

A tool that generates Yara rules for strings and their XOR encoded versions, as well as base64-encoded variations with different padding possibilities.