These tools were originally designed as a research project for industrial control systems (ICSs) and a drop-in replacement for readelf, objcopy, and objdump, utilising the Capstone disassembly framework. The project then began to grow into a collection of tools for malware and binary analysis supporting x86, ARM, AARCH64 and RISC-V.
convert-ng is a Swiss Army Knife for manipulating data in complex ways using operations, xor, addition, subtraction, logical shifts and rotations, base32, base58, base64, base85 and vigeneree cipher.
objcopy-ng copies the contents of an object file to another using the GNU BFD Library to readand write the object files. It can write the destination object file in a format different from that of the source object file.
objdump-ng displays information about one or more object files. This information is useful to malware researchers and binary analysis, as this utility is lightweight compared to many commercial applications (x86, ARM, AARCH64 and RISC-V).
objdwarf-ng displays the dwarf information about one or more ELF format object files in standard and enhanced formats.
objhash-ng generates hashes of ELF format object files for malware detection and digital forensics. The utility is capable of fuzz-hashing and context-triggered piecewise hashing.
readelf-ng displays information about one or more ELF format object files.
readpe-ng displays information about one or more PE format object files.
If you can contribute or you want to, feel free to do it at PayPal, I will be really thankful for anything, even if it is a coffee, because that helps me a lot to know that you care:)
If you find this project useful and would like to keep it maintained, new features added and a regular release cycle. Then, could you think about sponsorship at PayPal.
https://github.com/capstone-engine/capstone - BSD license
https://github.com/ssdeep-project/ssdeep - GPL-2.0 license
https://github.com/davea42/libdwarf-code - LGPL license
objtools-ng is published under the MIT license.