Rust-based ELF analysis library – Looking for insights

Hey everyone,

I’m working on a Rust library for static analysis of ELF binaries , designed to help with function extraction, syscall tracking, and call graph generation . This library is not trying to replace IDA or Ghidra—just a lightweight tool for quick analysis and structured reporting, written entirely in Rust.

:small_blue_diamond: What it does:

  • Extracts functions & disassembly .
  • Builds call graphs to visualize function interactions.
  • Tracks system calls invoked by the binary.
  • Generates JSON & HTML reports for easy exploration.

:small_blue_diamond: Why Rust?

  • Performance & safety benefits.
  • Easily integrable into other Rust-based security tools.
  • Simple API for automation.

:small_blue_diamond: Example Output GIF

Looking for input from the community:

  • Do you see value in a Rust-based lightweight analysis tool like this?
  • What kind of binaries do you typically analyze? (ELF, PE, Mach-O?)
  • Which architectures do you work with most? (x86-64, ARM, RISC-V?)
  • Would you prefer output in JSON, HTML, or something else?

The project is still under development and the intention is to release it as open-source, because I strongly believe in the value of sharing and collaboration. At this stage, I am not looking for feedback on how it works or for code revision, but simply for thoughts on the development path to follow in order to create a useful and easily adoptable tool. If anyone is interested, I can provide more details!

Appreciate any insights! :rocket:

5 Likes