aboutsummaryrefslogtreecommitdiff
path: root/security/py-angr/pkg-descr
blob: 877232f49d7657c352599897ec47b0f9366b4348 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
angr is a platform-agnostic binary analysis framework in a form of a suite
of Python 3 libraries that let you load a binary and do a lot of cool things
to it:

- Disassembly and intermediate-representation lifting
- Program instrumentation
- Symbolic execution
- Control-flow analysis
- Data-dependency analysis
- Value-set analysis (VSA)
- Decompilation

The most common angr operation is loading a binary:

    p = angr.Project('/bin/bash')

If you do this in an enhanced REPL like IPython, you can use tab-autocomplete
to browse the top-level-accessible methods and their docstrings.

angr is brought to you by the Computer Security Lab at UC Santa Barbara, SEFCOM
at Arizona State University, their associated CTF team, Shellphish, the open
source community, and @rhelmot.

WWW: https://github.com/angr/angr