angr
angr copied to clipboard
A powerful and user-friendly binary analysis platform!
### Description Although flag calculation may be embedded in pcode IR (see below), the flag values are not stored as bits of the architectural flags register. Instead, they are stored...
### Question Hi! I am attempting to perform concrete execution (or emulate) of PE binaries (with obfuscation tools like UPX and Themida) using angr. Specifically, I am trying to utilize...
### Description arch = amd64 simulate code: ```assembly mov eax, 0x54ACBD02 shl eax, 0x69 ``` I get rflag after simulate this code by angr that is 0x004, but it should...
### Description Hi ! I am using angr to analyze some obfuscated binary. I find that sometimes angr behave not like real cpu. For example, ``` mov edx, 0xfb600000 imul...
### Question Hello, I'm facing some efficiency issues regarding `callable` function calls, where some are really fast and others (with minimal changes) are really slow. I'm experimenting with binaries originated...
The decompilation of `binaries/tests/x86_64/veritesting_skm` from the binaries repo is non-deterministic. ```diff --- ../binaries/tests/x86_64/veritesting_skm func 4202928 baseline +++ ../binaries/tests/x86_64/veritesting_skm func 4202928 attempt 2 @@ -8,7 +8,7 @@ extern void* stdout; -long...
The decompilation of `binaries/tests/x86_64/echo` from the binaries repo is non-deterministic. ```diff --- ../binaries/tests/x86_64/echo func 4199392 baseline +++ ../binaries/tests/x86_64/echo func 4199392 attempt 1 @@ -1,23 +1,17 @@ -typedef struct struct_2 {...