angr vs x64dbg
GitHub Stats
About angr
angr is a platform-agnostic binary analysis framework developed at UC Santa Barbara's Seclab. It combines both static and dynamic symbolic (concolic) analysis, providing a powerful Python API for analyzing compiled binaries without source code. angr can automatically explore execution paths through a binary, solve for inputs that reach specific code locations, recover control flow graphs, perform taint analysis, and identify vulnerabilities like buffer overflows and format string bugs. Its architecture is modular - SimOS provides OS abstraction, SimEngine handles execution, and the exploration strategies (DFS, BFS, coverage-optimized) guide analysis through the program state space. angr is widely used in academic research and CTF competitions, and forms the backbone of several automated vulnerability discovery tools.
About x64dbg
x64dbg is an open-source binary debugger for Windows, designed for malware analysis and reverse engineering of executables when source code is not available. It supports both x64 and x32 applications and provides features comparable to commercial debuggers like IDA Pro's debugger. Key capabilities include a full-featured disassembler, graph view for control flow visualization, conditional breakpoints with scripting support, a built-in assembler for live patching, memory map visualization, and an extensive plugin ecosystem. x64dbg includes IDAPython-style scripting, supports TLS callbacks and anti-debug bypass, and can handle packed/obfuscated binaries. Its active community maintains plugins for everything from API monitoring to de-obfuscation, making it the go-to free debugger for Windows binary analysis.
Platform Support
Tags
angr only
x64dbg only