Tool and Usage
|License||Apache License 2.0|
|Latest release||0.3.3 |
Why this tool?
Manticore is a so-called symbolic execution tool to perform a binary analysis. It supports Linux ELF binaries and Ethereum smart contracts. The tool helps with researching binaries and their behavior. This might be useful to learn how malware works and troubleshooting.
How it works
When doing the binary analysis of ELF files, Manticore can be used from a command line interface or via a Python API. When using the CLI, simply run Manticore with the path to the binary to research. When needed, optional parameters can be passed
For researching Ethereum smart contracts, Manticore supports a symbolic Ethereum Virtual Machine (EVM). Manticore integrates with Ethersplay, which is visual disassembler for EVM bytecode also written by Trail of Bits. Also in this type of analysis, there is both the command line interface and a Python API.
Usage and audience
Manticore is commonly used for binary analysis, malware analysis, or reverse engineering. Target users for this tool are forensic specialists, malware analysts, and security professionals.
- Command line interface
- Has Python API
Tool review and remarks
The review and analysis of this project resulted in the following remarks for this security tool:
- + More than 25 contributors
- + More than 1000 GitHub stars
- + The source code of this software is available
Supported operating systems
Manticore is known to work on Linux.
Several dependencies are required to use Manticore.
Similar tools to Manticore:
Pyelftools is a Python library to parse ELF files and DWARF debugging information. It can be useful to perform dynamic binary analysis on files.
BAP is the abbreviation for Binary Analysis Platform, a toolkit created by the Carnegie Mellon University. It helps with reverse engineering and program analysis. As it focuses on the analysis of binaries, it does not require the source code. Supported hardware architectures include ARM, x86, x86-64, PowerPC, and MIPS.
LIEF is a library to analyze executable formats like ELF, MachO, and PE. It can be used during reverse engineering, binary analysis, and malware research.
This tool page was updated at . Found an improvement? Help the community by submitting an update.