OffsetInspect is a lightweight PowerShell-based hex-context inspection utility designed for red team operators, malware analysts, and security researchers who require precise insight into file offsets.
It functions as a terminal-native, HxD-inspired viewer that:
- Highlights the byte located at a specified offset
- Displays surrounding context bytes
- Maps raw offsets back to file line numbers
- Shows aligned ASCII representations
- Positions a caret indicating the approximate character location within a source line
- Provides configurable context window sizes
OffsetInspect is intended for fast, accurate validation of static indicators during offensive security operations and detection research.
During red team operations and detection engineering, analysts frequently encounter detections that reference raw byte offsets rather than readable source context.
GUI hex editors provide visibility, but they often lack:
- Scriptability
- Repeatability
- Terminal-first workflows
- Fast offset-to-line correlation
OffsetInspect bridges this gap by enabling operators to quickly answer a critical question:
What is actually at this offset?
The tool is deliberately scoped to inspection and validation, allowing analysts to correlate byte-level indicators back to meaningful source constructs without abstraction or side effects.
- Exact byte highlighting at user-specified offsets
- Mapping of raw offsets to file line numbers
- Configurable byte window size
- Structured hex + ASCII output
- Color-coded terminal rendering for clarity
- Read-only operation with no external dependencies
- Compatible with Windows PowerShell 5.1 and PowerShell 7
https://github.com/warpedatom/OffsetInspect/releases/latest
Clone the repository:
git clone https://github.com/warpedatom/OffsetInspect.git
cd OffsetInspectAll releases include an automatically generated checksums.txt file created by GitHub Actions.
Verify using:
Get-FileHash -Algorithm SHA256 .\OffsetInspect.ps1Run
.\OffsetInspect.ps1 <FilePath> <Offset>Basic Example:
.\OffsetInspect.ps1 C:\AD\PowerView.ps1 0xE1AB1Decimal Offset Example:
.\OffsetInspect.ps1 payload.bin 1024Adjust Byte Window Size:
.\OffsetInspect.ps1 file.bin 0x200 -ByteWindow 64OffsetInspect can also be used as an importable module:
Import-Module ./module/OffsetInspect.psm1Invoke-OffsetInspect -FilePath C:\AD\PowerView.ps1 -OffsetInput 0xE1AB1
File Information
File: C:\AD\PowerView.ps1
Offset (input): 0xE1AB1
Offset (decimal): 924337
File Size: 924339 bytes
Line Number: 24810-
Displays metadata for the inspected file
-
Normalizes and converts the provided offset
-
Maps the raw byte offset back to a source line
Line 24810: Set-Alias Get-DomainPolicy Get-DomainPolicyData
^-
Prints the full source line containing the target byte
-
The caret indicates the approximate character position corresponding to the offset
-
Useful for quickly identifying affected strings, aliases, or instructions
Note: Offsets are byte-based while source lines are character-based. The caret represents a best-effort positional mapping.
Hex Dump
000E1A91 6F 6D 61 69 6E 50 6F 6C 69 63 79 20 47 65 74 2D omainPolicy Get-
000E1AA1 44 6F 6D 61 69 6E 50 6F 6C 69 63 79 44 61 74 61 DomainPolicyData
000E1AB1 0D 0A ..-
Contextual hex dump centered around the inspected offset
-
Offsets displayed as eight-digit hexadecimal values
-
Target byte is visually highlighted in supported terminals
-
Surrounding bytes rendered in a secondary color
-
ASCII output aligned to the right for readability
OffsetInspect is well suited for:
- Red team operations
- Malware analysis and reverse engineering
- Script and payload debugging
- Identifying offset-based indicators
- Inspecting PE, binary, shellcode, PowerShell, or encoded data
- Forensic analysis of embedded byte sequences
- Low-level troubleshooting during security research
OffsetInspect supports workflows where precision matters more than automation.
Common scenarios include:
- Investigating static detections referencing byte offsets
- Validating offset drift after obfuscation or packing
- Identifying which semantic construct triggers detection
- Performing targeted modifications rather than blind mutation
This enables operators to preserve functionality while testing detection resilience.
OffsetInspect is intentionally:
- Terminal-native
- Read-only
- Dependency-free
- Focused on accuracy over abstraction
It is designed to complement existing tooling such as:
- YARA rules
- Static AV/EDR detections
- Obfuscators and packers
- Reverse engineering workflows
Planned enhancements under consideration:
- Support for inspecting multiple offsets in a single invocation
- Offset range diffing between two files
- Improved handling of non-ASCII encodings
- Optional structured output (JSON) for pipeline integration
- Optional symbol or function boundary hints when available
PowerView Static Detection & Obfuscation Workflow
This tool is intended for authorized security testing, research, and educational purposes only.
The author assumes no responsibility for misuse, unauthorized activity, or policy violations.
OffsetInspect is released under the MIT License.
Attribution is appreciated but not required.
© 2025 Velkris — Educational Red Team Research | MIT Licensed
All testing conducted in isolated lab environments for research and training purposes only.