Extrude - Analyse Binaries For Missing Security Features, Information Disclosure And More...

AVvXsEjMpNK6ke1fMDaTp3RU_dC5NuigZxpNAUS1hYMy1SLi0veJSiMVOts2jqCZK3LFM6iiAq-pYiOzinewBQIvkLmbc25i3UBTZd_sRBoj2YxpOZuGaYdSjRha5ZIi1cM-DlHeqLJWkU6U_rg3T7nHulq2MQTPoOF0UQxmjX8K_4Y4jp7pRFJ-VZiLOEgEnCqO=w640-h438
Analyse binaries for missing security features, information disclosure and more.
Extrude is in the early stages of development, and currently only supports ELF and MachO binaries. PE (Windows) binaries will be supported soon.

Usage​

코드:
Usage:
  extrude [flags] [file]

Flags:
  -a, --all               Show details of all tests, not just those which failed.
  -w, --fail-on-warning   Exit with a non-zero status even if only warnings are discovered.
  -h, --help              help for extrude

Docker​

You can optionally run extrude with docker via:
docker run -v `pwd`:/blah -it ghcr.io/liamg/extrude /blah/targetfile

Supported Checks​

ELF​

  • PIE
  • RELRO
  • BIND NOW
  • Fortified Source
  • Stack Canary
  • NX Stack

MachO​

  • PIE
  • Stack Canary
  • NX Stack
  • NX Heap
  • ARC

Windows​

Coming soon...

TODO​

  • Add support for PE
  • Add secret scanning
  • Detect packers
 
뒤로
상단