binsider: A tool for analyzing Linux binaries
Orhun Parmaksiz
orhun at archlinux.org
Tue Sep 17 06:40:17 UTC 2024
Hey again!
My current use cases (and the reason I built this) are:
- Identifying and analyzing linked libraries of a binary, which is helpful
for my packaging work for Arch Linux.
- Performing dynamic analysis to see the number of syscalls made during
execution, useful for uncovering performance bottlenecks (and just for
fun).
- Using the hex editor when working with binary data.
- Searching for specific debug symbols.
There has been some interest in the tool from reverse engineering
communities as well, so I may add support for attaching a debugger
(gdb/bugstalker) and improve platform/architecture support.
Also, maybe somehow having a diff feature (similar to diffoscope)
would be also nice.
I'm always happy to discuss it further!
Cheers,
Orhun
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_0xF83424824B3E4B90.asc
Type: application/pgp-keys
Size: 6421 bytes
Desc: OpenPGP public key
URL: <http://lists.reproducible-builds.org/pipermail/rb-general/attachments/20240917/2f6feadb/attachment.key>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature.asc
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <http://lists.reproducible-builds.org/pipermail/rb-general/attachments/20240917/2f6feadb/attachment.sig>
More information about the rb-general
mailing list