A powerful and user-friendly binary analysis platform!
-
Updated
Oct 31, 2024 - Python
A powerful and user-friendly binary analysis platform!
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Use angr in Ghidra
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.
Handy utilities for the angr binary analysis framework, most notably CFG visualization
Code and exercises for a workshop on z3 and angr
Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.
The SAILR paper's evaluation pipline for measuring the quality of decompilation
SEMA is based on angr, a symbolic execution engine used to extract API calls. Especially, we extend ANGR with strategies to create representative signatures based on System Call Dependency graph (SCDG). Those SCDGs can be exploited in machine learning modules to do classification/detection.
A tool for finding the one gadget RCE in libc
A decompiler to automatically reverse-engineer the DNN semantics from its compiled binary using program analysis
A pleasant, mild, dark (n)vim theme.
Add a description, image, and links to the angr topic page so that developers can more easily learn about it.
To associate your repository with the angr topic, visit your repo's landing page and select "manage topics."