angr Logo

angr

0
Free
Visit Website

angr is a platform-agnostic binary analysis framework brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish, the open source community, and @rhelmot. It is a suite of Python 3 libraries that enable tasks such as disassembly, lifting, program instrumentation, symbolic execution, control-flow analysis, data-dependency analysis, value-set analysis, and decompilation. The most common operation is loading a binary using angr.Project('/bin/bash').

FEATURES

ALTERNATIVES

A tutorial on setting up a virtual ARM environment, reversing ARM binaries, and writing basic exploits for ARM using the trafman challenge of rwthCTF as an example.

Yara mode for GNU Emacs to edit Yara related files

Automatic YARA rule generation for malware repositories.

A collaborative malware analysis framework with various features for automated analysis tasks.

Automatic analysis of malware behavior using machine learning.

Tool for fingerprinting malware HTTP requests.

Binary analysis and management framework for organizing malware and exploit samples.

A semi-automatic tool to generate YARA rules from virus samples.