This is a collection of documentation for angr. By reading this, you'll become an angr pro and will be able to fold binaries to your whim.
We've tried to make using angr as pain-free as possible - our goal is to create a user-friendly binary analysis suite, allowing a user to simply start up iPython and easily perform intensive binary analyses with a couple of commands. That being said, binary analysis is complex, which makes angr complex. This documentation is an attempt to help out with that, providing narritive explanation and exploration of angr and its design.
Installation instructions can be found here.
To dive right into angr's capabilities, start with the top level methods, or read over the overview.
A searchable HTML version of this documentation is hosted at docs.angr.io, and an HTML API reference can be found at angr.io/api-doc.
If you use angr in an academic work, please cite the paper for which it was developed:
@article{shoshitaishvili2015firmalice,
title={Firmalice - Automatic Detection of Authentication Bypass Vulnerabilities in Binary Firmware},
author={Shoshitaishvili, Yan and Wang, Ruoyu and Hauser, Christophe and Kruegel, Christopher and Vigna, Giovanni},
year={2015}
}
To get help with angr, you can ask via:
- the mailing list: angr@lists.cs.ucsb.edu
- the IRC channel: #angr on freenode
- opening an issue on the appropriate github repository