There are 11 repositories under angr topic.
Reverse Engineering Resources About All Platforms(Windows/Linux/macOS/Android/iOS/IoT) And Every Aspect! (More than 3500 open source tools and 2300 posts&videos)
Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
Automatic Exploit Generation (AEG) and remote flag capture for exploitable CTF problems
Discovering vulnerabilities in firmware through concolic analysis and function clustering.
Decompilation as a Service. Explore multiple decompilers and compare their output with minimal effort. Upload binary, get decompilation.
Use angr in the IDA Pro debugger generating a state from the current debug session
Handy utilities for the angr binary analysis framework, most notably CFG visualization
Code and exercises for a workshop on z3 and angr
Use angr inside GDB. Create an angr state from the current debugger state.
Tutorial on Symbolic Execution. Hands-on session is based on the angr framework.
The SAILR paper's evaluation pipline for measuring the quality of decompilation
A tool for finding the one gadget RCE in libc
Abstract library to generate angr states from a debugger state
Backwards program slice stitching for automatic CTF problem solving.
ToolChain using Symbolic Execution for Malware Analysis.
Use angr inside the radare2 debugger. Create an angr state from the current debugger state.
Final project for the M.Sc. in Engineering in Computer Science at Università degli Studi di Roma "La Sapienza" (A.Y. 2016/2017).
Vagrant setup for building a machine for CTF/exploit development
angr-wrapper is a simple script to automatise and accelerate your basic use of angr (to solve CTF challenges for example)
An IDA_Wrapper for linux, shipped with an Function Identifier. It works well with Driller on static linked binaries.
lwipのバグを半自動検出くん。First introduced in 「2018年 暗号と情報セキュリティシンポジウム」(SCIS2018).