EN
ENNA

angr vs Radare2

GitHub Stats

8.6k
Stars
23.4k
1.2k
Forks
3.2k
604
Issues
829
3d ago
Updated
2d ago
BSD-2-Clause
License
-
Python
Language
C

About angr

angr is a platform-agnostic binary analysis framework developed at UC Santa Barbara's Seclab. It combines both static and dynamic symbolic (concolic) analysis, providing a powerful Python API for analyzing compiled binaries without source code. angr can automatically explore execution paths through a binary, solve for inputs that reach specific code locations, recover control flow graphs, perform taint analysis, and identify vulnerabilities like buffer overflows and format string bugs. Its architecture is modular - SimOS provides OS abstraction, SimEngine handles execution, and the exploration strategies (DFS, BFS, coverage-optimized) guide analysis through the program state space. angr is widely used in academic research and CTF competitions, and forms the backbone of several automated vulnerability discovery tools.

About Radare2

Radare2 is a portable reverse engineering framework that integrates disassembly, debugging, analysis, patching, and scripting capabilities in a single command-line interface. Known for its extensibility and modularity, it supports a wide range of binary formats and architectures. Written in C, Radare2 is a preferred tool among security researchers and reverse engineers for its powerful analysis features and cross-platform compatibility.

Platform Support

๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows
๐Ÿงlinux๐ŸŽmacos๐ŸชŸwindows

Tags

angr only

symbolic-executionbinary-analysiscfrvulnerability-discoveryconcolicctf

Radare2 only

reverse-engineeringdisassemblerdebuggerscripting