LSE toolsLSE toolsangr (171)angr (171)

Tool and Usage

Angr is a security tool written in Python to allow analyzing binaries. It provides a combination of static and dynamic analysis.

Screenshot for angr tool review

Why this tool?

Tools like angr are great for performing in-depth analysis of binaries. This could be the analysis of an unknown binary, like a collected malware sample.

Background information

The angr project is created by the computer security lab at UC Santa Barbara.

Usage and audience

angr is commonly used for binary analysis or malware analysis. Target users for this tool are security professionals.

Tool review and remarks

The review and analysis of this project resulted in the following remarks for this security tool:


  • + More than 50 contributors
  • + More than 1000 GitHub stars
  • + The source code of this software is available



Several dependencies are required to use angr.

  • ana
  • archinfo
  • cachetools
  • capstone
  • claripy
  • cle
  • cooldict
  • futures
  • mulpyplexer
  • networkx
  • progressbar
  • pyvex
  • simuvex

angr alternatives

Similar tools to angr:



Pyelftools is a Python library to parse ELF files and DWARF debugging information. It can be useful to perform dynamic binary analysis on files.



Manticore is a binary analysis tool. It uses dynamic analysis, meaning parts of the binary will be executed and tested.



Bandit is an AST-based static analyzer for analyzing Python code. It helps with finding code flaws that could lead to security vulnerabilities.

See all alternatives tools for angr »

Found an improvement? Become an influencer and submit an update.
Project details
Latest releaseNo release found
LicenseBSD 2-clause

Project health

This score is calculated by different factors, like project age, last release date, etc.


 Project website
GitHub iconangr GitHub project


This tool is categorized as a dynamic code analyzer and static code analyzer.

Related terms