EN
ENNA

angr vs Cutter

GitHub Stats

8.6k
Stars
18.6k
1.2k
Forks
1.3k
604
Issues
507
3d ago
Updated
6d ago
BSD-2-Clause
License
GPL-3.0
Python
Language
C++

About angr

angr is a platform-agnostic binary analysis framework developed at UC Santa Barbara's Seclab. It combines both static and dynamic symbolic (concolic) analysis, providing a powerful Python API for analyzing compiled binaries without source code. angr can automatically explore execution paths through a binary, solve for inputs that reach specific code locations, recover control flow graphs, perform taint analysis, and identify vulnerabilities like buffer overflows and format string bugs. Its architecture is modular - SimOS provides OS abstraction, SimEngine handles execution, and the exploration strategies (DFS, BFS, coverage-optimized) guide analysis through the program state space. angr is widely used in academic research and CTF competitions, and forms the backbone of several automated vulnerability discovery tools.

About Cutter

Cutter is a graphical user interface (GUI) for the Radare2 reversing framework, designed to make reverse engineering more accessible. It includes features like graph views, a decompiler, and a hex editor, enhancing the usability of Radare2's capabilities. Developed in C++, Cutter provides a user-friendly interface that simplifies complex analysis tasks, making it popular among both novice and experienced reverse engineers.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

angr only

symbolic-executionbinary-analysiscfrvulnerability-discoveryconcolicctf

Cutter only

reverse-engineeringguiradare2decompiler