Crates.io | binsec |
lib.rs | binsec |
version | 3.0.0 |
source | src |
created_at | 2020-03-12 06:54:28.051802 |
updated_at | 2021-05-28 16:50:23.783385 |
description | Swiss Army Knife for Binary (In)Security |
homepage | https://github.com/ex0dus-0x/binsec |
repository | https://github.com/ex0dus-0x/binsec |
max_upload_size | |
id | 217784 |
size | 43,929 |
Swiss Army Knife for Binary (In)security
binsec is a minimal static analysis utility for detecting security capabilities in ELF/PE/Mach-O executables. It's useful for reverse engineers and vulnerability researchers to gain quick and deeper insights into binary artifacts, build fast detection pipelines, and improve overall binary analysis.
The project currently supports static detection for a variety of executable checks:
Install binsec
as a command line application as so:
$ cargo install binsec
Using the application is meant to be very simple. Given any binary executable you want to conduct initial analysis, simply pass it in as a positional argument:
$ binsec -- ./suspicious
binsec
output can also be serialized into JSON:
# print to stdout
$ binsec --json - -- ./suspicious
# print to path
$ binsec --json report.json -- ./suspicious
This is something that is continually being developed! You can contribute by catching issues and bugs and submitting them through the issue tracker or making a pull request!