angr vs dnSpy
GitHub Stats
About angr
angr is a platform-agnostic binary analysis framework developed at UC Santa Barbara's Seclab. It combines both static and dynamic symbolic (concolic) analysis, providing a powerful Python API for analyzing compiled binaries without source code. angr can automatically explore execution paths through a binary, solve for inputs that reach specific code locations, recover control flow graphs, perform taint analysis, and identify vulnerabilities like buffer overflows and format string bugs. Its architecture is modular - SimOS provides OS abstraction, SimEngine handles execution, and the exploration strategies (DFS, BFS, coverage-optimized) guide analysis through the program state space. angr is widely used in academic research and CTF competitions, and forms the backbone of several automated vulnerability discovery tools.
About dnSpy
dnSpy is a debugger and .NET assembly editor that allows you to decompile, modify, and debug .NET assemblies even without source code. It includes a full-featured debugger that can debug .NET Framework, .NET Core, and Unity game assemblies, with support for breakpoints, stepping, locals, watch windows, and the immediate window. The decompiler produces readable C# or Visual Basic code from compiled assemblies, and the built-in editor allows direct modification of IL code, metadata, and resources. dnSpy is an essential tool for malware analysts examining .NET malware, reverse engineers working with Unity games, and security researchers analyzing compiled .NET applications. While the original repository is archived, several actively maintained forks continue development.
Platform Support
Tags
angr only
dnSpy only