angr Logo

angr

0
Free
Visit Website

angr is a platform-agnostic binary analysis framework brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM at Arizona State University, their associated CTF team, Shellphish, the open source community, and @rhelmot. It is a suite of Python 3 libraries that enable tasks such as disassembly, lifting, program instrumentation, symbolic execution, control-flow analysis, data-dependency analysis, value-set analysis, and decompilation. The most common operation is loading a binary using angr.Project('/bin/bash').

FEATURES

ALTERNATIVES

A simple JWT token brute force cracker

A sandbox for quickly sandboxing known or unknown families of Android Malware

Yara mode for GNU Emacs to edit Yara related files

A new age tool for binary analysis that uses statistical visualizations to help find patterns in large amounts of binary data.

BARF is an open source binary analysis framework for supporting various binary code analysis tasks in information security.

Kaitai Struct is a declarative language for describing binary data structures.

Largest open collection of Android malware samples, with 298 samples and contributions welcome.

A program to extract IOCs from text files using regular expressions

PINNED