frontpage.
newsnewestaskshowjobs

Made with ♥ by @iamnishanth

Open Source @Github

fp.

Open in hackernews

Show HN: Missing puzzle in binary analysis: finding num constants in .so/.bin

4•DenisDolya•1mo ago
I was annoyed by reverse engineering binaries and .so traditional tools like objdump, readelf and even strings fail at one critical task: finding numeric constants.

Sections .rodata та .dynstr contain only names. That's why I created DYNUM scanner numeric constants, enough digging in Hex!

How it works: 1. Scans files as raw bytes, interpreting them as every possible numeric type (int8, int32, float, double, both endianness) 2. Filters out noise: aligned addresses, reasonable values, no NaN/Inf 3. Optionally integrates with nm/readelf to show symbol names 4. Architecture-aware (x86, x64, ARMv7, ARM64) 5. Follows Unix philosophy: text output, pipes friendly, single purpose

GitHub: https://github.com/Ferki-git-creator/dynum