binwalk
« Back to VersTracker
Description:
Searches a binary image for embedded files and executable code
Type: Formula  |  Latest Version: 3.1.0@0  |  Tracked Since: Dec 17, 2025
Links: Homepage  |  formulae.brew.sh
Category: Security
Tags: firmware-analysis reverse-engineering security forensics binary-analysis
Install: brew install binwalk
About:
Binwalk is a firmware analysis tool that scans binary images to identify and extract embedded filesystems, compressed archives, and executable code. It supports signature-based scanning and automated extraction of embedded components, making it essential for reverse engineering proprietary firmware. The tool helps security researchers analyze device firmware without needing vendor-specific tools.
Key Features:
  • Signature-based scanning for file formats and executable code
  • Automatic extraction of embedded filesystems and archives
  • Entropy analysis for visualizing encrypted or compressed data
  • Plugin architecture for custom signatures and analysis modules
  • Recursive extraction capabilities for nested data structures
Use Cases:
  • Security researchers analyzing firmware for vulnerabilities or backdoors
  • Embedded systems engineers extracting proprietary device filesystems
  • Malware analysts dissecting malicious binaries for embedded payloads
Alternatives:
  • foremost – Foremost is a simpler file carver that lacks binwalk's advanced entropy analysis and signature database
  • hexdump – Hexdump provides raw binary viewing but no automated analysis or extraction capabilities
License: MIT
Dependencies: p7zip, xz, fontconfig, freetype
Bottles available for: arm64_tahoe, arm64_sequoia, arm64_sonoma, arm64_ventura, sonoma, ventura, arm64_linux, x86_64_linux
Version History
Detected Version Rev Change Commit
Oct 27, 2025 11:45pm 0 VERSION_BUMP a734821b
Sep 12, 2025 6:59pm 0 VERSION_BUMP bd4b3e5a
Oct 12, 2024 12:51am 0 VERSION_BUMP 0b4115b7
Sep 14, 2024 7:53pm 1 VERSION_BUMP dc38fe5e