ANGR presenta nou àlbum: "The Darkness of Primordial Nonexistence" #Angr #BlackMetal #Març2026 #NouÀlbum #Metall #Metal #MúsicaMetal #MetalMusic

<3 angrop

#ctf #cybersecurity #angr #angrop #return-oriented-programming #ropchain #rop

#ReverseEngineering folx, have any of y'all tried #Angr's GUI, #AngrManagement ? What's your take?  

Very cool talk on fuzzers - reminds me of what the angr community does:

https://events.ccc.de/congress/2025/hub/en/event/detail/demystifying-fuzzer-behaviour

#39c3 #angr #fuzzing

[39c3] Demystifying Fuzzer Behaviour

Fuzz testing (or, "fuzzing") is a testing technique that passes randomly-generated inputs to a subject under test (SUT). This term was first coined in 1988 by Miller to describe sending random byte sequences to Unix utilities (1), but was arguably...

39c3

1/x

*** Update on my personal CyberSec journey

I haven‘t posted a lot recently, which doesn‘t mean I was lazy. The last weeks entertained several CTFs (PlatyPwn, Huntress, hack.lu, UniR) and also some fun professional events and great people with a focus on the EU Cyber Resilience Act (project networks, qSkills, and an event I hosted at my employer).

More in comments.

#ctf #cybersecurity #platypwn #huntress #hacklu #eucra #cra #arm64 #angr #tryhackme #thm #adventofcyber #39c3 #pwncollege

I went back to playing with angr recently, and learned about the CompleteCallingConvention function today. It analyses a binary and for each function found, it prints the calling convention, parameter and return type. Pretty funny!

Picture shows the angr script on the top, analysis of some random CTF binary's function and related ghidra output on the lower half.

#ctf #cybersecurity #angr #reveng

Did a presentation today on #symbolicexecution and demo'd some of the fine work by #angr as well as some interesting results from the #vsharp team. Not totally sure how the talk went with the audience; but, I'm trying to decide if I want to make some changes & maybe I put in for the Cactus Con CFP which is currently open.

I think idea be interested in showing some reversing analyses like deobfuscating some obfuscated malware maybe? I'm not sure if my skill with some of these tools is quite there yet though.

Playing more with angr, I got a hint that the "pacman" reverse-engineering challenge from this year's L3ak CTF can be solved with angr, and it can - pretty easy, even. :-)

No writeup but a screenshot... ;-)

#ctf #cybersecurity #angr #l3ak #l3akctf #reverseengineering

After reading angr docs for the better part of the day, I was able to solve OverTheWire's Leviathan levels 1->2 and 6->7. Not 3->4 so far, but that's left for tomorrow. It's definitely an exciting journey!

Wanna join in? Read up at https://docs.angr.io/en/latest/ and drop me a line!

#ctf #cybersecurity #overthewire #leviathan #angr #symbolicexecution

angr documentation

Monday is OverTheWire time.
Today: vortex19->20: check

Solution 1: compile decompiled code and calculate the needed value
Solution 2: use angr to determine the right value for a given input without decompiling

<3 angr

#ctf #cybersecurity #vortex #overthewire #ghidra #angr