degrigis / awesome-angrView external linksLinks
A collection of resources/tools and analyses for the angr binary analysis framework.
☆187Jul 28, 2022Updated 3 years ago
Alternatives and similar repositories for awesome-angr
Users that are interested in awesome-angr are comparing it to the libraries listed below
Sorting:
- ☆238Jan 14, 2024Updated 2 years ago
- ☆34Apr 7, 2022Updated 3 years ago
- Identify and test the security of dynamic memory allocators in monolithic firmware images☆47Sep 2, 2023Updated 2 years ago
- angr's exploration technique to perform taint analysis☆65Mar 26, 2020Updated 5 years ago
- fuzzing + concolic = fuzzolic :)☆127Nov 6, 2025Updated 3 months ago
- angr源码分析☆33Jan 6, 2020Updated 6 years ago
- Handy utilities for the angr binary analysis framework, most notably CFG visualization☆298Mar 15, 2019Updated 6 years ago
- MBA-Blast is a tool for simplification of MBA expressions.☆70Aug 6, 2021Updated 4 years ago
- Open source of the paper "击败SOTA反混淆方法"☆18Sep 10, 2022Updated 3 years ago
- Backward Taint Analysis (GUI) on Desktop : Analyzing trace log to determine exploitability by tracking data propagation☆49Jan 6, 2017Updated 9 years ago
- Code for the use cases presented in the paper Symbion: Interleaving Symbolic with Concrete Execution☆15Dec 30, 2021Updated 4 years ago
- ASPFuzz: Fuzzing the AMD SP's ROM bootloader with LibAFL using QEMU full-system emulation☆30Apr 12, 2023Updated 2 years ago
- Updated IDA ReObjc Plugin for 7.4+ and python3☆13Apr 17, 2021Updated 4 years ago
- SymFusion: Hybrid Instrumentation for Concolic Execution☆18May 5, 2023Updated 2 years ago
- Dice CTF 2022 breach write-up☆15Feb 14, 2022Updated 4 years ago
- Binary Code Similarity Analysis (BCSA) Tool☆124May 18, 2025Updated 8 months ago
- Code and exercises for a workshop on z3 and angr☆234Dec 29, 2020Updated 5 years ago
- A LLVM Sanitizer for Symbolic Tracing☆234Feb 7, 2026Updated last week
- A cross platform framework to recover driver's communication interface.☆11Mar 26, 2021Updated 4 years ago
- syzkaller is an unsupervised coverage-guided kernel fuzzer☆13Oct 3, 2020Updated 5 years ago
- Open Source Software modified or written by Tetrane https://www.tetrane.com for the REVEN product.☆21Feb 9, 2023Updated 3 years ago
- ☆17Sep 23, 2024Updated last year
- SymQEMU: Compilation-based symbolic execution for binaries☆370May 5, 2025Updated 9 months ago
- Python bindings to Ghidra's SLEIGH library for disassembly and lifting to P-Code IR☆207Updated this week
- An awesome & curated list of binary code similarity papers☆597Jan 5, 2026Updated last month
- A set of Android binary exploitation tasks for beginners.☆29Jul 16, 2019Updated 6 years ago
- A cheat sheet that summarises "strategies" (or techniques) to use with angr.☆32Jan 24, 2021Updated 5 years ago
- High-Efficiency eXpanded Coverage for Improved Testing of Executables☆25Jul 7, 2022Updated 3 years ago
- Sys: A Static/Symbolic Tool for Finding Good Bugs in Good (Browser) Code☆236Mar 14, 2022Updated 3 years ago
- Towards Facilitating Exploit Generation of Kernel Out-Of-Bounds Write Vulnerabilities☆91May 7, 2024Updated last year
- The official angr GUI.☆1,111Updated this week
- ☆71Oct 25, 2024Updated last year
- Open-source symbolic execution framework: https://maat.re☆648Sep 4, 2025Updated 5 months ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆547Feb 1, 2024Updated 2 years ago
- Repo for various angr ipython features to give it more of a cli feeling☆57Jan 15, 2025Updated last year
- Sys, but no longer in Haskell☆19Mar 14, 2022Updated 3 years ago
- A python symbolic execution framework using radare2's ESIL (Evaluable String Intermediate Language)☆166Dec 5, 2022Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- Source code for the DEF CON 30 CTF Qualifiers.☆268May 27, 2024Updated last year