angr icon indicating copy to clipboard operation
angr copied to clipboard

A powerful and user-friendly binary analysis platform!

Results 456 angr issues
Sort by recently updated
recently updated
newest added

### Description Although flag calculation may be embedded in pcode IR (see below), the flag values are not stored as bits of the architectural flags register. Instead, they are stored...

bug

### Question Hi! I am attempting to perform concrete execution (or emulate) of PE binaries (with obfuscation tools like UPX and Themida) using angr. Specifically, I am trying to utilize...

bug

### Description arch = amd64 simulate code: ```assembly mov eax, 0x54ACBD02 shl eax, 0x69 ``` I get rflag after simulate this code by angr that is 0x004, but it should...

bug

### Description Hi ! I am using angr to analyze some obfuscated binary. I find that sometimes angr behave not like real cpu. For example, ``` mov edx, 0xfb600000 imul...

bug

### Question Hello, I'm facing some efficiency issues regarding `callable` function calls, where some are really fast and others (with minimal changes) are really slow. I'm experimenting with binaries originated...

question
needs-triage

The decompilation of `binaries/tests/x86_64/veritesting_skm` from the binaries repo is non-deterministic. ```diff --- ../binaries/tests/x86_64/veritesting_skm func 4202928 baseline +++ ../binaries/tests/x86_64/veritesting_skm func 4202928 attempt 2 @@ -8,7 +8,7 @@ extern void* stdout; -long...

The decompilation of `binaries/tests/x86_64/echo` from the binaries repo is non-deterministic. ```diff --- ../binaries/tests/x86_64/echo func 4199392 baseline +++ ../binaries/tests/x86_64/echo func 4199392 attempt 1 @@ -1,23 +1,17 @@ -typedef struct struct_2 {...