Introduction

A radare2 plugin to quickly perform symbolic execution inside radare2 with angr, a platform-agnostic binary analysis framework by the Computer Security Lab at UC Santa Barbara and SEFCOM at Arizona State University. This plugin is intended to integrate angr in a way that's (relativley) consistent with the r2cli conventions

Goals

This project intends to

  • Better integrate symbolic execution with the rest of the reverse engineering process

  • Provide a faster alternative to using angr than the python bindings

  • Allow for switching between concrete and symbolic execution (this feature is coming soon)

  • Provide useful visualizations of the angr backend

  • Include a suite of features for vulnerability detection, exploit generation, etc (coming soon)

Last updated

Was this helpful?