Skip to main content
Glama

analyze

Analyze binary files to extract disassembly, headers, strings, and metadata for reverse engineering and debugging purposes.

Instructions

Static binary analysis tool for reverse engineering and debugging. Operations: disassemble (x86/x64/ARM/ARM64 disassembly), pe_info (PE header/sections/imports/exports), elf_info (ELF header/sections/symbols), macho_info (Mach-O header/segments/symbols), strings (extract printable strings from binary), hexdump (hex+ASCII view), pattern_search (hex byte pattern with ?? wildcards), entropy (Shannon entropy per section), bin_diff (two-file byte comparison), resource_info (PE resources and version info), imphash (PE import hash for malware classification), rich_header (PE build tool fingerprint), overlay_detect (detect appended data after last section), dwarf_info (debug symbol info). Pure Go implementation — no external tools needed. Supports x86, x64, ARM, ARM64. For runtime debugging, use the debug tool instead.

Input Schema

TableJSON Schema
NameRequiredDescriptionDefault
operationYesOperation: disassemble, pe_info, elf_info, macho_info, strings, hexdump, pattern_search, entropy, bin_diff, resource_info, imphash, rich_header, overlay_detect, dwarf_info,required
file_pathYesAbsolute path to the binary file,required
offsetNoByte offset to start from. Default: 0
countNoNumber of instructions (disassemble). Default: 50, Max: 200
modeNoCPU mode: 32 or 64. Default: 64
base_addrNoBase address for display (hex string, e.g. '0x140001000'). Default: 0x0
archNoCPU architecture: x86 (default) or arm. For disassemble
min_lengthNoMinimum string length for strings operation. Default: 4
max_resultsNoMaximum number of results for strings. Default: 500, Max: 2000
encodingNoString encoding to search for: ascii (default) or utf8
lengthNoNumber of bytes for hexdump. Default: 256, Max: 4096
sectionNoFilter by section name (e.g. '.text', '.rdata'). Empty = show all
rvaNoRVA to convert to file offset (hex string, e.g. '0x36A20'). For pe_info only
patternNoHex byte pattern with ?? wildcards (e.g. '4D 5A ?? ?? 50 45'). For pattern_search
file_path_bNoAbsolute path to the second file for bin_diff comparison

Latest Blog Posts

MCP directory API

We provide all the information about MCP servers via our MCP API.

curl -X GET 'https://glama.ai/api/mcp/v1/servers/knewstimek/agent-tool'

If you have feedback or need assistance with the MCP directory API, please join our Discord server