angr
Tool and Usage
Project details
- License
- BSD 2-clause
- Programming language
- Python
- Latest release
- 9.2.120
- Latest release date
Project health
Why this tool?
Tools like angr are great for performing in-depth analysis of binaries. This could be the analysis of an unknown binary, like a collected malware sample.
Background information
The angr project is created by the computer security lab at UC Santa Barbara.
Usage and audience
angr is commonly used for binary analysis or malware analysis. Target users for this tool are security professionals.
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
Strengths
- + More than 50 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
Installation
Dependencies
Several dependencies are required to use angr.
- ana
- archinfo
- cachetools
- capstone
- claripy
- cle
- cooldict
- futures
- mulpyplexer
- networkx
- progressbar
- pyvex
- simuvex
angr alternatives
Similar tools to angr:
BAP
BAP is the abbreviation for Binary Analysis Platform, a toolkit created by the Carnegie Mellon University. It helps with reverse engineering and program analysis. As it focuses on the analysis of binaries, it does not require the source code. Supported hardware architectures include ARM, x86, x86-64, PowerPC, and MIPS.
pyelftools
Pyelftools is a Python library to parse ELF files and DWARF debugging information. It can be useful to perform dynamic binary analysis on files.
Frida
Frida is a toolkit for reverse engineers, security researchers, and developers. It allows them injecting JavaScript to explore and understand the inner workings of applications on Windows, Mac, Linux, iOS, Android, and others.
This tool page was updated at . Found an improvement? Help the community by submitting an update.
Related tool information
Categories
This tool is categorized as a dynamic code analyzer and static code analyzer.