{"id":26179661,"url":"https://github.com/0xdea/augur","last_synced_at":"2026-02-20T10:04:21.008Z","repository":{"id":273670886,"uuid":"902747185","full_name":"0xdea/augur","owner":"0xdea","description":"Reverse engineering assistant that extracts strings and related pseudocode from a binary file.","archived":false,"fork":false,"pushed_at":"2026-01-30T15:43:40.000Z","size":120813,"stargazers_count":92,"open_issues_count":1,"forks_count":6,"subscribers_count":1,"default_branch":"master","last_synced_at":"2026-01-31T08:14:07.787Z","etag":null,"topics":["ida-plugin","ida-pro","idalib","reverse-engineering","vulnerability-research"],"latest_commit_sha":null,"homepage":"https://hex-rays.com/ida-pro","language":"Rust","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/0xdea.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null},"funding":{"github":3562}},"created_at":"2024-12-13T07:28:00.000Z","updated_at":"2026-01-30T15:43:47.000Z","dependencies_parsed_at":"2025-03-01T17:26:47.314Z","dependency_job_id":"7a34806a-9cee-4aa7-b88f-8a35962f3add","html_url":"https://github.com/0xdea/augur","commit_stats":null,"previous_names":["0xdea/augur"],"tags_count":21,"template":false,"template_full_name":null,"purl":"pkg:github/0xdea/augur","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xdea%2Faugur","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xdea%2Faugur/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xdea%2Faugur/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xdea%2Faugur/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/0xdea","download_url":"https://codeload.github.com/0xdea/augur/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/0xdea%2Faugur/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":29647768,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-20T09:27:29.698Z","status":"ssl_error","status_checked_at":"2026-02-20T09:26:12.373Z","response_time":59,"last_error":"SSL_connect returned=1 errno=0 peeraddr=140.82.121.6:443 state=error: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["ida-plugin","ida-pro","idalib","reverse-engineering","vulnerability-research"],"created_at":"2025-03-11T21:51:56.104Z","updated_at":"2026-02-20T10:04:21.002Z","avatar_url":"https://github.com/0xdea.png","language":"Rust","readme":"# augur\n\n[![](https://img.shields.io/github/stars/0xdea/augur.svg?style=flat\u0026color=yellow)](https://github.com/0xdea/augur)\n[![](https://img.shields.io/crates/v/augur?style=flat\u0026color=green)](https://crates.io/crates/augur)\n[![](https://img.shields.io/crates/d/augur?style=flat\u0026color=red)](https://crates.io/crates/augur)\n[![](https://img.shields.io/badge/ida-9.3-violet)](https://hex-rays.com/ida-pro)\n[![](https://img.shields.io/badge/twitter-%400xdea-blue.svg)](https://twitter.com/0xdea)\n[![](https://img.shields.io/badge/mastodon-%40raptor-purple.svg)](https://infosec.exchange/@raptor)\n[![build](https://github.com/0xdea/augur/actions/workflows/build.yml/badge.svg)](https://github.com/0xdea/augur/actions/workflows/build.yml)\n[![doc](https://github.com/0xdea/augur/actions/workflows/doc.yml/badge.svg)](https://github.com/0xdea/augur/actions/workflows/doc.yml)\n\n\u003e \"In fact, I've actually triggered buffer overflows by just entering my real name.\"\n\u003e\n\u003e -- A.\n\nAugur is a blazing fast IDA Pro headless plugin that extracts strings and related pseudocode from a binary file.\nIt stores pseudocode of functions that reference strings in an organized directory tree.\n\n![](https://raw.githubusercontent.com/0xdea/augur/master/.img/screen01.png)\n\n## Features\n\n* Blazing fast, headless user experience courtesy of IDA Pro 9.x and Binarly's idalib Rust bindings.\n* Support for binary targets for any architecture implemented by IDA Pro's Hex-Rays decompiler.\n* Decompilation feature based on the `decompile_to_file` API exported by [haruspex](https://github.com/0xdea/haruspex).\n* Pseudocode of each function that references a specific string is stored in a separate directory.\n\n## Blog posts\n\n* \u003chttps://hex-rays.com/blog/streamlining-vulnerability-research-idalib-rust-bindings\u003e\n* \u003chttps://hnsecurity.it/blog/streamlining-vulnerability-research-with-ida-pro-and-rust\u003e\n\n## See also\n\n* \u003chttps://github.com/0xdea/rhabdomancer\u003e\n* \u003chttps://github.com/0xdea/haruspex\u003e\n* \u003chttps://docs.hex-rays.com/release-notes/9_0#headless-processing-with-idalib\u003e\n* \u003chttps://github.com/idalib-rs/idalib\u003e\n\n## Installing\n\nThe easiest way to get the latest release is via [crates.io](https://crates.io/crates/augur):\n\n1. Download, install, and configure IDA Pro (see \u003chttps://hex-rays.com/ida-pro\u003e).\n2. Install LLVM/Clang (see \u003chttps://rust-lang.github.io/rust-bindgen/requirements.html\u003e).\n3. On Linux/macOS, install as follows:\n    ```sh\n    export IDADIR=/path/to/ida # if not set, the build script will check common locations\n    cargo install augur\n    ```\n   On Windows, instead, use the following commands:\n    ```powershell\n    $env:LIBCLANG_PATH=\"\\path\\to\\clang+llvm\\bin\"\n    $env:PATH=\"\\path\\to\\ida;$env:PATH\"\n    $env:IDADIR=\"\\path\\to\\ida\" # if not set, the build script will check common locations\n    cargo install augur\n    ```\n\n## Compiling\n\nAlternatively, you can build from [source](https://github.com/0xdea/augur):\n\n1. Download, install, and configure IDA Pro (see \u003chttps://hex-rays.com/ida-pro\u003e).\n2. Install LLVM/Clang (see \u003chttps://rust-lang.github.io/rust-bindgen/requirements.html\u003e).\n3. On Linux/macOS, compile as follows:\n    ```sh\n    git clone --depth 1 https://github.com/0xdea/augur\n    cd augur\n    export IDADIR=/path/to/ida # if not set, the build script will check common locations\n    cargo build --release\n    ```\n   On Windows, instead, use the following commands:\n    ```powershell\n    git clone --depth 1 https://github.com/0xdea/augur\n    cd augur\n    $env:LIBCLANG_PATH=\"\\path\\to\\clang+llvm\\bin\"\n    $env:PATH=\"\\path\\to\\ida;$env:PATH\"\n    $env:IDADIR=\"\\path\\to\\ida\" # if not set, the build script will check common locations\n    cargo build --release\n    ```\n\n## Usage\n\n1. Make sure IDA Pro is properly configured with a valid license.\n2. Run as follows:\n    ```sh\n    augur \u003cbinary_file\u003e\n    ```\n3. Find the extracted pseudocode of each decompiled function in the `binary_file.str` directory, organized by string:\n    ```sh\n    vim \u003cbinary_file\u003e.str\n    code \u003cbinary_file\u003e.str\n    ```\n\n## Compatibility\n\n* IDA Pro 9.0.241217 - Latest compatible: v0.2.3.\n* IDA Pro 9.1.250226 - Latest compatible: v0.6.2.\n* IDA Pro 9.2.250908 - Latest compatible: v0.7.5.\n* IDA Pro 9.3.260213 - Latest compatible: current version.\n\n*Note: check [idalib](https://github.com/idalib-rs/idalib) documentation for additional information.*\n\n## Changelog\n\n* [CHANGELOG.md](CHANGELOG.md)\n\n## TODO\n\n* Integrate with [oneiromancer](https://github.com/0xdea/oneiromancer).\n* Allow users to choose to process string cross-references even if the decompiler is unavailable.\n* Consider converting `traverse_xrefs` to an iterative walk to avoid potential stack overflows and infinite loops.\n* Consider integrating [proptest](https://proptest-rs.github.io/proptest/intro.html) to complement unit testing.\n* Implement functionality similar to \u003chttps://github.com/joxeankoret/idamagicstrings\u003e.\n","funding_links":["https://github.com/sponsors/3562"],"categories":["Applications","IDA Plugins"],"sub_categories":["Security tools"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F0xdea%2Faugur","html_url":"https://awesome.ecosyste.ms/projects/github.com%2F0xdea%2Faugur","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2F0xdea%2Faugur/lists"}