angr Logo

angr

0
Free
Visit Website

angr is a platform-agnostic binary analysis framework brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish, the open source community, and @rhelmot. It is a suite of Python 3 libraries that enable tasks such as disassembly, lifting, program instrumentation, symbolic execution, control-flow analysis, data-dependency analysis, value-set analysis, and decompilation. The most common operation is loading a binary using angr.Project('/bin/bash').

FEATURES

ALTERNATIVES

A Scriptable Android Debugger for reverse engineers and developers.

Fernflower is an analytical decompiler for Java with command-line options and support for external classes.

Original SmaliHook Java source for Android cracking and reversing.

Blazingly fast Yara queries for malware analysts with an analyst-friendly web GUI.

A library of PHP unserialize() payloads and a tool to generate them.

A Python script that finds endpoints in JavaScript files to identify potential security vulnerabilities.

Automated Android Malware Analysis tool

Automatic analysis of malware behavior using machine learning.