binsider: A tool for analyzing Linux binaries

Orhun Parmaksiz orhun at archlinux.org
Tue Sep 17 06:40:17 UTC 2024


Hey again!

My current use cases (and the reason I built this) are:

- Identifying and analyzing linked libraries of a binary, which is helpful
for my packaging work for Arch Linux.
- Performing dynamic analysis to see the number of syscalls made during
execution, useful for uncovering performance bottlenecks (and just for
fun).
- Using the hex editor when working with binary data.
- Searching for specific debug symbols.

There has been some interest in the tool from reverse engineering
communities as well, so I may add support for attaching a debugger
(gdb/bugstalker) and improve platform/architecture support.

Also, maybe somehow having a diff feature (similar to diffoscope)
would be also nice.

I'm always happy to discuss it further!

Cheers,
Orhun
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xF83424824B3E4B90.asc
Type: application/pgp-keys
Size: 6421 bytes
Desc: OpenPGP public key
URL: <http://lists.reproducible-builds.org/pipermail/rb-general/attachments/20240917/2f6feadb/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <http://lists.reproducible-builds.org/pipermail/rb-general/attachments/20240917/2f6feadb/attachment.sig>


More information about the rb-general mailing list