alive2
angr
Our great sponsors
alive2 | angr | |
---|---|---|
4 | 13 | |
667 | 7,131 | |
4.3% | 1.6% | |
9.3 | 9.7 | |
11 days ago | 6 days ago | |
C++ | Python | |
MIT License | BSD 2-clause "Simplified" License |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
alive2
-
Basic SAT model of x86 instructions using Z3, autogenerated from Intel docs
You can use it to (mostly) validate small snippets are the same. See Alive2 for the application of Z3/formalization of programs as SMT for that [1]. As far as I'm aware there are some problems scaling up to arbitrarily sized programs due to a lack of formalization in higher level languages in addition to computational constraints. With a lot of time and effort it can be done though [2].
-
Verifying GCC optimizations using an SMT solver
Yeah, this kind of thing is nice.
Alive had been used for years (almost a decade actually) by people to verify LLVM instcombine transforms.
Alive2 (https://github.com/AliveToolkit/alive2) makes it easier to do the same with most optimization passes.
-
Programming in Z3 by learning to think like a compiler
Alive/Alive2 [1] is one of the most famous frameworks for compiler transformation verification using BitVec logic
angr
-
30 Years of Decompilation and the Unsolved Structuring Problem: Part 1
That's awesome! That's exactly how modern decompilers deal with a special type of goto occurrence. They reduce gotos (or completely eliminate them) by introducing a `while(true)` loop, followed by corresponding `continue` and `breaks`... we all, of course, know that `while(true)` did not exist in the source, but it's a nice hack!
We even do this in the angr decompiler, found here: https://github.com/angr/angr/blob/8e48d001e18a913ecd4ed2e995...
- Ask not what the compiler can do for you
-
Any standard algorithms for parsing (disassembling) machine code?
BAP (https://github.com/binaryanalysisplatform/bap), angr (https://angr.io/) and others already do what you're asking for as more purpose-built solutions for dynamic analysis. Angr specifically in python.
-
Can anyone explain to me how to find main function in elf file?
As /u/hkei noted, it's actually quite difficult to do in general, and usually requires some kind of heuristic. For example, see https://github.com/dyninst/dyninst/blob/v12.1.0/dyninstAPI/src/image.C#L476. Full disclosure, I am a Dyninst developer. There is also the python-based angr that might be more amenable to a one-off solution.
-
Awesome Penetration Testing
angr - Platform-agnostic binary analysis framework.
-
Programming in Z3 by learning to think like a compiler
angr uses z3.
Supposedly, the DoD has used angr for some use cases.
-
Problem with angr
As per https://github.com/angr/angr/pull/2543#issuecomment-787550935 could you please provide the binary you are loading (if possible) and also the output of these commands:
I think it's probably a bug with the library, maybe due to some form of obfuscation in the binary, I opened a pull request with a band aid fix here: https://github.com/angr/angr/pull/2543.
What are some alternatives?
qiling - A True Instrumentable Binary Emulation Framework
pwntools - CTF framework and exploit development library
RustScan - π€ The Modern Port Scanner π€
frontier-silicon-firmwares - Frontier silicon internet radio firmware binaries
CrossHair - An analysis tool for Python that blurs the line between testing and type systems.
BinV - π Yet another binary vulnerbilities checker. An automated vulnerability scanner for ELF based on symbolic execution.
bap - Binary Analysis Platform
decompiler-explorer - Decompiler Explorer! Compare tools on the forefront of static analysis, now in your web browser!
awesome-pcaptools - A collection of tools developed by other researchers in the Computer Science area to process network traces. All the right reserved for the original authors.
klee - KLEE Symbolic Execution Engine
zz - πΊπ ZetZ a zymbolic verifier and tranzpiler to bare metal C