Prerequisites
Before you begin, ensure you have:- Python 3.10 or higher
- A binary file to analyze (you can use any ELF, PE, or Mach-O executable)
- Basic familiarity with reverse engineering concepts
Installation
Install angr Management
First Analysis
Load a binary
- Click File → Load Binary or press
Ctrl+O - Select your binary file
- Wait for the initial analysis to complete
angr Management automatically performs CFG (Control Flow Graph) recovery when you load a binary. This may take a few seconds to several minutes depending on the binary size.
Explore the disassembly
The Disassembly view opens automatically, showing the control flow graph of the entry point.Key features:
- Graph view: Visual representation of control flow
- Linear view: Traditional flat disassembly listing
- Navigation: Double-click functions in the Functions view to jump to them
- Search: Press
Gto go to a specific address
View the decompilation
Right-click a function and select Decompile or press Interact with the decompilation:
F5.The Pseudocode view displays high-level C-like code:- Press
Nto rename variables - Press
Yto retype variables - Right-click for more options
Common Workflows
Finding and analyzing a specific function
Finding and analyzing a specific function
- Open the Functions view (usually on the left sidebar)
- Search for your function by name or filter by address
- Double-click the function to jump to it in the disassembly
- Press
F5to decompile - Press
Non variables or function names to rename them - Press
Yon variables to change their types
Searching for strings
Searching for strings
- Open View → Strings or press
Alt+8 - Browse the list of all strings found in the binary
- Double-click a string to see where it’s referenced
- Use the filter box to search for specific strings
Setting breakpoints for debugging
Setting breakpoints for debugging
- Right-click an instruction in the disassembly view
- Select Toggle Breakpoint or press
F2 - Open View → Breakpoints to manage all breakpoints
- Use Run → Continue (
F9) to start debugging - Use Run → Step Into (
F7) and Run → Step Over (F8) to step through code
Patching a binary
Patching a binary
- Right-click an instruction in the disassembly view
- Select Patch Instruction
- Enter new assembly code or hex bytes
- Open View → Patches to review all patches
- Click File → Export Patched Binary to save your changes
Keyboard Shortcuts
Here are the most useful keyboard shortcuts to get you started:| Shortcut | Action |
|---|---|
Ctrl+O | Open binary |
Ctrl+S | Save project |
F5 | Decompile function |
G | Go to address |
N | Rename variable/function |
Y | Retype variable |
X | Show cross-references |
F2 | Toggle breakpoint |
F9 | Continue (debugging) |
F7 | Step into |
F8 | Step over |
Ctrl+Shift+P | Open command palette |
Alt+1-9 | Switch between views |
Next Steps
User Guide
Learn about all the views and features
Decompilation Guide
Master the interactive decompiler
Analysis Capabilities
Explore symbolic execution and advanced analyses
Plugin System
Extend angr Management with plugins
Getting Help
If you run into issues, check the Troubleshooting Guide or FAQ.
- Discord: angr Discord Server
- GitHub Issues: Report bugs or request features
- Documentation: angr Documentation