Hey everyone,
I’m working on a Rust library for static analysis of ELF binaries , designed to help with function extraction, syscall tracking, and call graph generation . This library is not trying to replace IDA or Ghidra—just a lightweight tool for quick analysis and structured reporting, written entirely in Rust.
What it does:
- Extracts functions & disassembly .
- Builds call graphs to visualize function interactions.
- Tracks system calls invoked by the binary.
- Generates JSON & HTML reports for easy exploration.
Why Rust?
- Performance & safety benefits.
- Easily integrable into other Rust-based security tools.
- Simple API for automation.
Example Output GIF
Looking for input from the community:
- Do you see value in a Rust-based lightweight analysis tool like this?
- What kind of binaries do you typically analyze? (ELF, PE, Mach-O?)
- Which architectures do you work with most? (x86-64, ARM, RISC-V?)
- Would you prefer output in JSON, HTML, or something else?
The project is still under development and the intention is to release it as open-source, because I strongly believe in the value of sharing and collaboration. At this stage, I am not looking for feedback on how it works or for code revision, but simply for thoughts on the development path to follow in order to create a useful and easily adoptable tool. If anyone is interested, I can provide more details!
Appreciate any insights!