Thanks to visit codestin.com
Credit goes to github.com

Skip to content

Conversation

@Frank01001
Copy link
Member

@Frank01001 Frank01001 commented Sep 26, 2025

This draft PR introduces an API to inspect ELF files associated with the traced process — both the main binary and its libraries.
Libraries are parsed when loaded by the OS interpreter at process start, as well as when dynamically loaded at runtime via dlopen.

The new ELF inspection API provides access to detailed information such as:

  • Build ID
  • Sections and dynamic sections
  • Symbols
  • Program headers
  • GNU Properties
  • Runtime security mitigations (work in progress)

Current Status

✅ Python objects for relevant ELF structures
✅ Nanobind implementation for parsing ELF objects
✅ Parsing of libraries
✅ Parsing of security mitigations
✅ Reorganization into a single nanobind module (excluding symbols, which are to be kept separate)
✅ Documentation
⬜ Test suite

Notes

This PR is still in draft form — many features and improvements are ongoing.

This pr addresses #188

@Frank01001 Frank01001 self-assigned this Sep 26, 2025
@Frank01001 Frank01001 added the enhancement New feature or request label Sep 26, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

enhancement New feature or request

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants