A binary file analysis tool that colorizes and displays internal structures of ELF, Mach-O, PE, and archive formats.
bingrep is a Rust-based binary inspection tool that colorizes and displays internal structures of executable files. It helps developers quickly examine symbols, sections, headers, and addresses across formats like ELF, Mach-O, and PE without switching between multiple utilities.
Low-level developers, reverse engineers, and security researchers who need to inspect binary files regularly. It's particularly useful for those working with cross-platform binaries or analyzing compiled artifacts.
Developers choose bingrep for its visual colorization that speeds up binary analysis, its support for multiple formats in one tool, and its focus on practical workflow efficiency over traditional verbose output from tools like objdump.
like grep UBER, but for binaries
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
Supports ELF, Mach-O, PE, and archives with 32/64-bit and multiple architectures, reducing the need to juggle tools like objdump and nm.
Highlights addresses, sizes, and offsets in color for rapid identification, as emphasized in the philosophy for quick binary inspection.
With the -D flag, it converts mangled C++ symbols to human-readable names, improving readability during analysis of compiled artifacts.
The -d option outputs internal parsed structures, enabling deeper inspection of binary internals for debugging purposes.
PE file analysis is labeled as 'debug only' in the README, limiting its functionality compared to ELF and Mach-O for comprehensive Windows binary inspection.
Search functionality is experimental and currently only works for ELF files, making it unreliable for general string searches across formats.
Requires rustc 1.74 or greater, which can be a barrier for users with outdated compilers or in environments with strict versioning constraints.