About 3,250 results
Open links in new tab
  1. Proper workflow for x64dbg to Angr? - Reverse Engineering Stack …

    Feb 26, 2021 · I am trying to use Angr to reverse engineer a plugin for an application. This plugin is loaded via DLL by the main application. To debug, I use x64dbg to attach to the main …

  2. Basic `angr` framework question- is something wrong with my …

    Aug 24, 2020 · angr is solving every other character and matching half of the flag, as if the flag is being treaded as a wide character string/utf16. I modified your script slightly to have a 20 …

  3. buffer overflow - Using Angr in Vulnerability Research - Reverse ...

    Jul 4, 2019 · 4 I would like to use angr for vulnerability research. I was thinking that if I did the following: p = angr.Project('a.out', auto_load_libs=False) sm = p.factory.simulation_manager() …

  4. Angr - Solve for function return value - Reverse Engineering Stack …

    I have been scouring the angr examples for a way to solve a symbolic variable for a function return value, but this doesn't seem to be possible. I'm currently trying to use run or execute …

  5. angr - project.loader.find_symbol ("main") does not works

    Jun 8, 2023 · When I am running it under angr environment - it simply does not finds main () function, while it can do so for other things like strcmp etc. Also, the same program when run …

  6. Nice documentation of the binary analysis tool "angr", to analyse ...

    Sep 4, 2022 · So, can anyone give me suitable pointers to documentation, tutorial, or even YouTube videos, which would help me to get familiarized with "angr", the relevant sections …

  7. Symbolic gloabal variables in angr - Reverse Engineering Stack …

    Mar 2, 2021 · This could indicate unwanted behavior. WARNING | 2021-03-02 08:11:19,750 | angr.storage.memory_mixins.default_filler_mixin | angr will cope with this by generating an …

  8. Why did I have gotten only null bytes argv variable from angr?

    WARNING | 2023-02-13 23:57:05,077 | angr.storage.memory_mixins.default_filler_mixin | The program is accessing memory with an unspecified value. This could indicate unwanted behavior.

  9. How to export disassembly using angr - Reverse Engineering Stack …

    Apr 10, 2020 · Now getting every disassembled address in a linear format, like objdump, is much more hacky in angr. It would be much more advisable to use angr-management and copy the …

  10. Angr considers REP instruction as the end of a basic block

    Mar 16, 2023 · I'm developing a python script for angr that has to find all the basic blocks present in each function in a binary. I have noticed that angr splits the basic blocks when it finds a REP …