binsider

Crates.iobinsider
lib.rsbinsider
version0.2.1
sourcesrc
created_at2024-09-11 09:07:54.835979
updated_at2024-10-10 22:22:06.828682
descriptionAnalyze ELF binaries like a boss
homepagehttps://binsider.dev
repositoryhttps://github.com/orhun/binsider
max_upload_size
id1371727
size217,461
Orhun Parmaksız (orhun)

documentation

README




"Swiss army knife for reverse engineers."



Documentation | Website

😼🕵️‍♂️ Binsider can perform static and dynamic analysis, inspect strings, examine linked libraries, and perform hexdumps, all within a user-friendly terminal user interface!

Quickstart

[!TIP] Watch the quickstart video to get a glimpse of what binsider can do: https://youtu.be/InhVCQoc5ZE

Install binsider with cargo:

cargo install binsider

[!NOTE]
See the other installation methods 📦

After the installation, you are pretty much set! 💯

Just dive into the binaries by running binsider:

binsider <binary>

Demo

Features

[!NOTE]
The detailed documentation is available at https://binsider.dev 📚

General Analysis

You can retrieve general binary file information, including file size, ownership, permissions, date, and linked shared libraries (similar to stat(1) and ldd(1)).

General analysis

➡️ https://binsider.dev/usage/general-analysis

Static Analysis

You can analyze the ELF layout (such as sections, segments, symbols, and relocations) and navigate through them to get an in-depth understanding of the binary.

Static analysis

➡️ https://binsider.dev/usage/static-analysis

Dynamic Analysis

It is possible to execute the binary and trace the system calls, signals, and the program's execution flow similar to strace(1) and ltrace(1).

Dynamic analysis

➡️ https://binsider.dev/usage/dynamic-analysis

String Extraction

Similar to the strings(1) command, binsider is able to extract strings from the binary file with the purpose of discovering interesting strings such as URLs, passwords, and other sensitive information.

String extraction

➡️ https://binsider.dev/usage/strings

Hexdump

binsider provides a rich dashboard along with a hexdump view to analyze the binary content in a structured manner.

Hexdump

➡️ https://binsider.dev/usage/hexdump

Acknowledgements

Shoutout to Harun Ocaksız for sticking with me during our military service in the summer of 2024 and creating the awesome binsider logo! (o7)

Contributing

See the contribution guidelines.

License

Licensed under either of Apache License Version 2.0 or The MIT License at your option.

🦀 ノ( º _ º ノ) - respect crables!

Copyright

Copyright © 2024, Orhun Parmaksız

Commit count: 250

cargo fmt