"Swiss army knife for reverse engineers."
😼🕵️♂️ Binsider can perform static and dynamic analysis, inspect strings, examine linked libraries, and perform hexdumps, all within a user-friendly terminal user interface!
[!TIP] Watch the quickstart video to get a glimpse of what
binsider
can do: https://youtu.be/InhVCQoc5ZE
Install binsider
with cargo
:
cargo install binsider
[!NOTE]
See the other installation methods 📦
After the installation, you are pretty much set! 💯
Just dive into the binaries by running binsider
:
binsider <binary>
[!NOTE]
The detailed documentation is available at https://binsider.dev 📚
You can retrieve general binary file information, including file size, ownership, permissions, date, and linked shared libraries (similar to stat(1)
and ldd(1)
).
➡️ https://binsider.dev/usage/general-analysis
You can analyze the ELF layout (such as sections, segments, symbols, and relocations) and navigate through them to get an in-depth understanding of the binary.
➡️ https://binsider.dev/usage/static-analysis
It is possible to execute the binary and trace the system calls, signals, and the program's execution flow similar to strace(1)
and ltrace(1)
.
➡️ https://binsider.dev/usage/dynamic-analysis
Similar to the strings(1)
command, binsider
is able to extract strings from the binary file with the purpose of discovering interesting strings such as URLs, passwords, and other sensitive information.
➡️ https://binsider.dev/usage/strings
binsider
provides a rich dashboard along with a hexdump view to analyze the binary content in a structured manner.
➡️ https://binsider.dev/usage/hexdump
Shoutout to Harun Ocaksız for sticking with me during our military service in the summer of 2024 and creating the awesome binsider logo! (o7)
See the contribution guidelines.
Licensed under either of Apache License Version 2.0 or The MIT License at your option.
🦀 ノ( º _ º ノ) - respect crables!
Copyright © 2024, Orhun Parmaksız