{"id":26917514,"url":"https://github.com/seekbytes/inspector","last_synced_at":"2026-03-07T09:32:54.107Z","repository":{"id":275620983,"uuid":"924262311","full_name":"seekbytes/insPEctor","owner":"seekbytes","description":"An experimental disassembler for PE executable file (x86_64)","archived":false,"fork":false,"pushed_at":"2025-02-03T22:17:46.000Z","size":33,"stargazers_count":6,"open_issues_count":0,"forks_count":0,"subscribers_count":2,"default_branch":"main","last_synced_at":"2025-08-16T11:48:16.340Z","etag":null,"topics":["binary-analysis","disassembler","llvm","reverse-engineering","rust"],"latest_commit_sha":null,"homepage":"https://nicolo.dev/en/blog/disassembling-binary-linear-recursive/","language":"Rust","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/seekbytes.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2025-01-29T17:40:26.000Z","updated_at":"2025-02-05T15:26:04.000Z","dependencies_parsed_at":null,"dependency_job_id":"f1a5ff9f-a77a-44cf-a9ab-f15af27d451c","html_url":"https://github.com/seekbytes/insPEctor","commit_stats":null,"previous_names":["seekbytes/inspector"],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/seekbytes/insPEctor","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/seekbytes%2FinsPEctor","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/seekbytes%2FinsPEctor/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/seekbytes%2FinsPEctor/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/seekbytes%2FinsPEctor/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/seekbytes","download_url":"https://codeload.github.com/seekbytes/insPEctor/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/seekbytes%2FinsPEctor/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":286080680,"owners_count":30210846,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2026-03-07T09:02:10.694Z","status":"ssl_error","status_checked_at":"2026-03-07T09:02:08.429Z","response_time":53,"last_error":"SSL_read: unexpected eof while reading","robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":false,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["binary-analysis","disassembler","llvm","reverse-engineering","rust"],"created_at":"2025-04-01T20:37:08.485Z","updated_at":"2026-03-07T09:32:54.087Z","avatar_url":"https://github.com/seekbytes.png","language":"Rust","readme":"[See the most current branch](https://github.com/seekbytes/insPEctor/tree/1_disassembler)\n# InsPEctor\n\nThis project is a simple proof of concept to explain various concepts among the domain of reverse engineering and  will be developed in several blog posts in [my blog](https://nicolo.dev). Every concept will be introduced by an  article, and every new feature will be based on a branch that will contain the common core and the new feature.\n\nThe idea behind InsPEctor is to have a Rust-based binary analysis software for which we could say some information  (e.g. data flow analysis, CFG, or your own analysis) about PE executable files targeting Intel x86_64 architecture. Among all the articles, we will use the same binary: the goal would be for you to write the various analysis, and extract some precious information about how it works and try to guess what it is.\n\n| Date       | Title                                                        | Branch                                                                                                                                                                      | Concept            |\n|------------|--------------------------------------------------------------|------------------------------------------------------------------------------------------------------------------------------------------------------------------------------|-------------------|\n| 2025-02-03 | [Obtaining instructions: linear sweep and recursive traversal](https://nicolo.dev/en/blog/disassembling-binary-linear-recursive/) | [`1-disassembler`](https://github.com/seekbytes/insPEctor/tree/1_disassembler) | Explains the first problems of retriving instructions for a given binary, highlighting the two different algorithms for disassembling: linear sweep and recursive traversal. | \n\n**Warning**: this code represents an experiment and does not represent any valid production-ready code. Be aware that the code may not work for all the cases and for the all binaries.\n\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fseekbytes%2Finspector","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fseekbytes%2Finspector","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fseekbytes%2Finspector/lists"}