{"id":14672292,"url":"https://github.com/orhun/binsider","last_synced_at":"2026-02-01T12:11:42.946Z","repository":{"id":190871423,"uuid":"678562120","full_name":"orhun/binsider","owner":"orhun","description":"Analyze ELF binaries like a boss 😼🕵️‍♂️","archived":false,"fork":false,"pushed_at":"2026-01-25T00:14:07.000Z","size":19945,"stargazers_count":3864,"open_issues_count":30,"forks_count":93,"subscribers_count":8,"default_branch":"main","last_synced_at":"2026-01-25T13:44:20.271Z","etag":null,"topics":["analysis","binary","binary-data","dynamic-analysis","elf","hex-editor","hexdump","linux","ratatui","reverse-engineering","rust","static-analysis","terminal","terminal-ui","terminal-user-interface","tui"],"latest_commit_sha":null,"homepage":"https://binsider.dev/","language":"Rust","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"apache-2.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/orhun.png","metadata":{"files":{"readme":"README.md","changelog":"CHANGELOG.md","contributing":"CONTRIBUTING.md","funding":".github/FUNDING.yml","license":"LICENSE-APACHE","code_of_conduct":"CODE_OF_CONDUCT.md","threat_model":null,"audit":null,"citation":null,"codeowners":".github/CODEOWNERS","security":"SECURITY.md","support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null,"notice":null,"maintainers":null,"copyright":null,"agents":null,"dco":null,"cla":null},"funding":{"github":"orhun","patreon":"orhunp","buy_me_a_coffee":"orhun"}},"created_at":"2023-08-14T21:00:36.000Z","updated_at":"2026-01-24T22:16:10.000Z","dependencies_parsed_at":"2024-04-06T21:21:15.044Z","dependency_job_id":"7c70a849-3980-4dfd-afe5-13eff1ea8286","html_url":"https://github.com/orhun/binsider","commit_stats":{"total_commits":256,"total_committers":11,"mean_commits":"23.272727272727273","dds":0.0859375,"last_synced_commit":"85485672f055af0c42b9de0c93239317ba6f735c"},"previous_names":["orhun/binsider"],"tags_count":7,"template":false,"template_full_name":null,"purl":"pkg:github/orhun/binsider","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/orhun%2Fbinsider","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/orhun%2Fbinsider/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/orhun%2Fbinsider/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/orhun%2Fbinsider/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/orhun","download_url":"https://codeload.github.com/orhun/binsider/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/orhun%2Fbinsider/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":28977811,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-02-01T11:31:13.034Z","status":"ssl_error","status_checked_at":"2026-02-01T11:30:25.558Z","response_time":56,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["analysis","binary","binary-data","dynamic-analysis","elf","hex-editor","hexdump","linux","ratatui","reverse-engineering","rust","static-analysis","terminal","terminal-ui","terminal-user-interface","tui"],"created_at":"2024-09-12T05:01:11.877Z","updated_at":"2026-02-01T12:11:42.916Z","avatar_url":"https://github.com/orhun.png","language":"Rust","readme":"\u003cp align=\"center\"\u003e\n    \u003cimg src=\"https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-logo-dark.png#gh-dark-mode-only\" width=\"300\"\u003e\u003c/a\u003e\n    \u003cimg src=\"https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-logo-light.png#gh-light-mode-only\" width=\"300\"\u003e\u003c/a\u003e\n    \u003cbr\u003e\n    \u003cimg src=\"https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-text-dark.png#gh-dark-mode-only\" width=\"170\"\u003e\u003c/a\u003e\n    \u003cimg src=\"https://raw.githubusercontent.com/orhun/binsider/main/website/src/assets/binsider-text-light.png#gh-light-mode-only\" width=\"170\"\u003e\u003c/a\u003e\n    \u003cbr\u003e\n    \u003cbr\u003e\n    \u003cem\u003e\"Swiss army knife for reverse engineers.\"\u003c/em\u003e\n    \u003cbr\u003e\n    \u003cbr\u003e\n    \u003ca href=\"https://github.com/orhun/binsider/releases\"\u003e\n        \u003cimg src=\"https://img.shields.io/github/v/release/orhun/binsider?style=flat\u0026labelColor=1d1d1d\u0026color=f8be75\u0026logo=GitHub\u0026logoColor=white\"\u003e\u003c/a\u003e\n    \u003ca href=\"https://crates.io/crates/binsider/\"\u003e\n        \u003cimg src=\"https://img.shields.io/crates/v/binsider?style=flat\u0026labelColor=1d1d1d\u0026color=f8be75\u0026logo=Rust\u0026logoColor=white\"\u003e\u003c/a\u003e\n    \u003cbr\u003e\n    \u003ca href=\"https://github.com/orhun/binsider/actions?query=workflow%3A%22CI%22\"\u003e\n        \u003cimg src=\"https://img.shields.io/github/actions/workflow/status/orhun/binsider/ci.yml?style=flat\u0026labelColor=1d1d1d\u0026color=white\u0026logo=GitHub%20Actions\u0026logoColor=white\"\u003e\u003c/a\u003e\n    \u003ca href=\"https://github.com/orhun/binsider/actions?query=workflow%3A%22CD%22\"\u003e\n        \u003cimg src=\"https://img.shields.io/github/actions/workflow/status/orhun/binsider/cd.yml?style=flat\u0026labelColor=1d1d1d\u0026color=white\u0026logo=GitHub%20Actions\u0026logoColor=white\u0026label=deploy\"\u003e\u003c/a\u003e\n    \u003ca href=\"https://hub.docker.com/r/orhunp/binsider\"\u003e\n        \u003cimg src=\"https://img.shields.io/github/actions/workflow/status/orhun/binsider/docker.yml?style=flat\u0026labelColor=1d1d1d\u0026color=white\u0026label=docker\u0026logo=Docker\u0026logoColor=white\"\u003e\u003c/a\u003e\n    \u003ca href=\"https://docs.rs/binsider/\"\u003e\n        \u003cimg src=\"https://img.shields.io/docsrs/binsider?style=flat\u0026labelColor=1d1d1d\u0026color=white\u0026logo=Rust\u0026logoColor=white\"\u003e\u003c/a\u003e\n    \u003cbr\u003e\n    \u003ca href=\"https://discord.gg/zphNxEcEK7\"\u003e\n        \u003cimg src=\"https://img.shields.io/discord/1289166752311148554?color=f8be75\u0026label=discord\u0026labelColor=1d1d1d\u0026logo=discord\u0026logoColor=white\"\u003e\u003c/a\u003e\n\u003c/p\u003e\n\n\u003ch4 align=\"center\"\u003e\n  \u003ca href=\"https://binsider.dev/getting-started/\"\u003eDocumentation\u003c/a\u003e |\n  \u003ca href=\"https://binsider.dev/\"\u003eWebsite\u003c/a\u003e\n\u003c/h4\u003e\n\n😼🕵️‍♂️ **Binsider** can perform static and dynamic analysis, inspect strings, examine linked libraries, and perform hexdumps, all within a user-friendly terminal user interface!\n\n## Quickstart\n\n\u003e [!TIP]\n\u003e Watch the quickstart video to get a glimpse of what `binsider` can do: [https://youtu.be/InhVCQoc5ZE](https://youtu.be/InhVCQoc5ZE)\n\nInstall `binsider` with `cargo`:\n\n```bash\ncargo install binsider\n```\n\n\u003e [!NOTE]  \n\u003e See the other [installation methods](https://binsider.dev/installation/other/) 📦\n\nAfter the installation, you are pretty much set! 💯\n\nJust dive into the binaries by running `binsider`:\n\n```bash\nbinsider \u003cbinary\u003e\n```\n\n![Demo](website/src/content/assets/quickstart.gif)\n\n## Features\n\n\u003e [!NOTE]  \n\u003e The detailed documentation is available at \u003chttps://binsider.dev\u003e 📚\n\n### General Analysis\n\nYou can retrieve general binary file information, including file size, ownership, permissions, date, and linked shared libraries (similar to [`stat(1)`](https://www.man7.org/linux/man-pages/man1/stat.1.html) and [`ldd(1)`](https://www.man7.org/linux/man-pages/man1/ldd.1.html)).\n\n[![General analysis](website/src/assets/demo/binsider-general-analysis.gif)](https://binsider.dev/usage/general-analysis)\n\n➡️ \u003chttps://binsider.dev/usage/general-analysis\u003e\n\n### Static Analysis\n\nYou can analyze the ELF layout (such as sections, segments, symbols, and relocations) and navigate through them to get an in-depth understanding of the binary.\n\n[![Static analysis](website/src/assets/demo/binsider-static-analysis.gif)](https://binsider.dev/usage/static-analysis)\n\n➡️ \u003chttps://binsider.dev/usage/static-analysis\u003e\n\n### Dynamic Analysis\n\nIt is possible to execute the binary and trace the system calls, signals, and the program's execution flow similar to [`strace(1)`](https://man7.org/linux/man-pages/man1/strace.1.html) and [`ltrace(1)`](https://man7.org/linux/man-pages/man1/ltrace.1.html).\n\n[![Dynamic analysis](website/src/assets/demo/binsider-dynamic-analysis.gif)](https://binsider.dev/usage/dynamic-analysis)\n\n➡️ \u003chttps://binsider.dev/usage/dynamic-analysis\u003e\n\n### String Extraction\n\nSimilar to the [`strings(1)`](https://linux.die.net/man/1/strings) command, `binsider` is able to extract strings from the binary file with the purpose of discovering interesting strings such as URLs, passwords, and other sensitive information.\n\n[![String extraction](website/src/assets/demo/binsider-strings.gif)](https://binsider.dev/usage/strings)\n\n➡️ \u003chttps://binsider.dev/usage/strings\u003e\n\n### Hexdump\n\n`binsider` provides a rich dashboard along with a hexdump view to analyze the binary content in a structured manner.\n\n[![Hexdump](website/src/assets/demo/binsider-hexdump.gif)](https://binsider.dev/usage/hexdump)\n\n➡️ \u003chttps://binsider.dev/usage/hexdump\u003e\n\n## Acknowledgements\n\nShoutout to [@harunocaksiz](https://github.com/harunocaksiz) for sticking with me during our military service in the summer of 2024 and creating the awesome **binsider** logo! (o7)\n\n## Contributing\n\nSee the [contribution guidelines](CONTRIBUTING.md).\n\n\u003ca href=\"https://discord.gg/zphNxEcEK7\"\u003e\n   \u003cimg src=\"https://discord.com/api/guilds/1289166752311148554/embed.png?style=banner2\"\u003e\u003c/a\u003e\n\n## License\n\nLicensed under either of [Apache License Version 2.0](./LICENSE-APACHE) or [The MIT License](./LICENSE-MIT) at your option.\n\n🦀 ノ( º \\_ º ノ) - respect crables!\n\n## Copyright\n\nCopyright © 2024, [Orhun Parmaksız](mailto:orhunparmaksiz@gmail.com)\n","funding_links":["https://github.com/sponsors/orhun","https://patreon.com/orhunp","https://buymeacoffee.com/orhun"],"categories":["Rust","\u003ca name=\"programming\"\u003e\u003c/a\u003eProgramming","💻 Apps","Reverse Engineering","Other","Table of Contents"],"sub_categories":["🚀 Productivity and Utilities","Malware Articles and Sources","Other"],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Forhun%2Fbinsider","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Forhun%2Fbinsider","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Forhun%2Fbinsider/lists"}