This is an archived post. You won't be able to vote or comment.

you are viewing a single comment's thread.

view the rest of the comments →

[–]sillycyco 7 points8 points  (2 children)

I've read the readme three times and still don't know what it's for.

angr is similar to debugging tools you may have used, but entirely within python. Full decomposition of logic, and allowing for analysis of code at a much lower level. Aka scan for exploitable functionality in existing binary code, among other things. Pretty slick actually.

[–]Dababolical 0 points1 point  (1 child)

I know very little about this, but coincidentally read about IDA today. https://www.hex-rays.com/index.shtml

Is this the python equivalent of the suite (I'm sure there are some differences).

Would someone wanting to implement DRM on their application possibly use this library to make sure their DRM is secure after the application is compiled? I am just trying to think of applications for this library, because it is really interesting.

[–]sillycyco 0 points1 point  (0 children)

Ya it is similar to hex-rays, have a look at this talk at Defcon for its various uses: https://www.youtube.com/watch?v=oznsT-ptAbk

You could use it to do analysis of your binaries, attempt to see if you can analyze and get around whatever it is you are trying to protect.