Veles: Open-source tool for binary data analysis
Veles is an open-source binary analysis tool by CodiSec, aiding in visualizing and analyzing binary data. It offers a hex explorer, data visualization, and extensibility through Python functions. Continuously updated since 2016, Veles supports Windows, Linux, and macOS.
Read original articleVeles is an open-source binary analysis tool developed by CodiSec. It offers features for binary data visualization and analysis, making it easier to identify patterns in large amounts of binary data. The tool combines a hex explorer, data visualization capabilities, and a flexible framework for tasks like reverse engineering, exploring file system images, and steganography. Veles is designed to be easily extendable, allowing users to implement Python functions to parse data and obtain results. Released in 2016, Veles continues to be updated monthly as an open-source project. The tool is tested in Capture The Flag (CTF) competitions to handle various challenges and edge cases, proving its effectiveness in real-world scenarios. Veles is available for download on Windows, Linux, and macOS platforms, catering to a wide range of users working with binary data.
Related
A Hex Editor for Reverse Engineers
ImHex is a versatile Hex Editor catering to Reverse Engineers and Programmers. It offers byte patching, search functions, theming, data interpretation tools, and more. The GitHub repository provides additional information.
Show HN: ViperIDE – An Innovative MicroPython IDE for Web and Mobile
ViperIDE is a modern MicroPython IDE for web and mobile platforms. It offers features like no installation required, cross-platform connectivity, file editor, package manager, terminal/REPL, and device support. Explore on ViperIDE's website or GitHub.
Malware Developers Increasingly Use V8 JavaScript for Evasion
Researchers from Check Point Research (CPR) discovered a surge in malware using compiled V8 JavaScript to avoid detection. CPR's View8 tool helps analyze hidden malicious code, highlighting the challenge for cybersecurity.
PEV2: PostgreSQL Execution Plan Visualizer
The PEV2 VueJS component visualizes PostgreSQL execution plans interactively. Users access it via Dalibo service, GitHub download, or web integration. PEV2 is a revamped version of pev by Alex Tatiyants.
Carving ELF Files
The blog by Joren Vrancken delves into carving ELF files for digital forensics and reverse engineering. It explains analyzing headers to locate file boundaries, program loading, and data description. Computation examples are provided.
- Some users express interest in Veles, noting its utility for binary data analysis.
- Concerns are raised about the tool's archived status and lack of recent updates.
- Alternatives to Veles, such as ImHex and other binary analysis tools, are suggested.
- Users share personal experiences and projects related to binary data visualization.
- There is mention of the original developers' involvement in other projects and groups.
I ended up writing my own script for visualizing my particular problem (trying to work out what's going on in the "mett" data frames in videos from my pixel phone, I was able to make some headway but I've gotten distracted by other projects, if anyone has info I'd appreciate it)
learnt so much CMakeFile pain...
* fq - like jq for binary data: https://github.com/wader/fq
* Kaitai Struct - https://kaitai.io/
* visualizer, for the above: https://github.com/kaitai-io/kaitai_struct_visualizer/
* HexFiend - a hex editor, but with "binary templates" feature : https://github.com/HexFiend/HexFiend
* binary templates, for the above: https://github.com/HexFiend/HexFiend/blob/master/templates/T...
* binspector - https://github.com/binspector/binspector
* binary-parsing - a collection of links to similar such tools : https://github.com/dloss/binary-parsing
* unblob - https://github.com/onekey-sec/unblob
* ImHex - https://github.com/WerWolv/ImHex
* GNU Poke - https://www.gnu.org/software/poke/
* dtrx - https://github.com/dtrx-py/dtrx/ dtrx
* feng - https://github.com/martinlindhe/feng
** they also have a similar list of prior art: https://github.com/martinlindhe/feng/blob/main/RESOURCES.md
And some previous HN threads for similar such tools:
* https://news.ycombinator.com/item?id=34434249 (unblob)
* https://news.ycombinator.com/item?id=34986042 (GNU Poke #1)
* https://news.ycombinator.com/item?id=36182873 (GNU Poke #2)
Related
A Hex Editor for Reverse Engineers
ImHex is a versatile Hex Editor catering to Reverse Engineers and Programmers. It offers byte patching, search functions, theming, data interpretation tools, and more. The GitHub repository provides additional information.
Show HN: ViperIDE – An Innovative MicroPython IDE for Web and Mobile
ViperIDE is a modern MicroPython IDE for web and mobile platforms. It offers features like no installation required, cross-platform connectivity, file editor, package manager, terminal/REPL, and device support. Explore on ViperIDE's website or GitHub.
Malware Developers Increasingly Use V8 JavaScript for Evasion
Researchers from Check Point Research (CPR) discovered a surge in malware using compiled V8 JavaScript to avoid detection. CPR's View8 tool helps analyze hidden malicious code, highlighting the challenge for cybersecurity.
PEV2: PostgreSQL Execution Plan Visualizer
The PEV2 VueJS component visualizes PostgreSQL execution plans interactively. Users access it via Dalibo service, GitHub download, or web integration. PEV2 is a revamped version of pev by Alex Tatiyants.
Carving ELF Files
The blog by Joren Vrancken delves into carving ELF files for digital forensics and reverse engineering. It explains analyzing headers to locate file boundaries, program loading, and data description. Computation examples are provided.