Skip to content
| Marketplace
Sign in
Visual Studio Code>Other>BinSleuthNew to Visual Studio Code? Get it now.
BinSleuth

BinSleuth

long-910

910.jp
|
1 install
| (0) | Free
| Sponsor
Binary analysis visualizer — section map, entropy heatmap, security flags
Installation
Launch VS Code Quick Open (Ctrl+P), paste the following command, and press enter.
Copied to clipboard
More Info

vscode-binsleuth

Binary analysis — section map, entropy heatmap, and security flags right inside VS Code.

vscode-binsleuth

VS Code License: MIT Rust binsleuth CI Release Sponsor Ko-fi

🌐 English | 日本語 | 中文


What It Shows

Binary file  ──►  binsleuth-bridge (Rust)  ──►  JSON  ──►  Webview sidebar
                  · section info                           · Section Map
                  · Shannon entropy                        · Section Heatmap
                  · security flags                         · Security Score
                  · dangerous symbols                      · Dangerous Symbols
                                                      click any chart → jump to offset

The Rust bridge runs as a subprocess — no network calls, no telemetry.


BinSleuth demo

Features

Section Map

A doughnut chart that shows how each section contributes to the binary's on-disk size.

  • Neon-coloured arcs keyed by section type (.text green, .data cyan, .bss purple, …)
  • Centre label: total file size and section count
  • Hover tooltip: name · size · file offset · entropy · permissions (RWX)
  • Click any slice → jumps to that section's offset in the Hex Editor (falls back to vscode.open)

Section Heatmap

A horizontal bar chart that visualises both size and entropy of every section at once.

Visual element What it encodes
Bar length Section size (x-axis in bytes)
Bar colour Shannon entropy — cold blue (0 bits) → hot red (8 bits)
Number on bar Exact entropy value
Neon glow Entropy > 6.5 — likely packed or encrypted content

A gradient colour legend (0–8 bits) is drawn above the chart for reference.

Sort selector (top-right of the panel):

Option Order
OFFSET ↑ File offset, ascending (default)
SIZE ↓ / SIZE ↑ Largest / smallest section first
ENTROPY ↓ / ENTROPY ↑ Highest / lowest entropy first
NAME A-Z Alphabetical

Click any bar → jumps to that section's file offset.

Security Flags Panel

At-a-glance hardening badges:

Badge Meaning
NX Non-executable stack / DEP
PIE Position-independent executable
RELRO Relocation read-only (Full / Partial)
CANARY Stack canary (__stack_chk_fail)
FORTIFY FORTIFY_SOURCE
STRIP Debug symbols stripped

Colour coding: green = Enabled · orange = Partial · red = Disabled · grey = N/A

A Security Score (0–100) is shown in the header — higher is better.

Dangerous Symbol Detection

If the binary imports symbols in high-risk categories (shell execution, network I/O, memory manipulation), they are listed with their category tag directly in the sidebar.

Auto-Detection

Opening any file with a recognised binary extension triggers analysis automatically. No command needed.


Usage

Triggering Analysis

How When to use
Open a binary file in the editor Quickest — analysis starts automatically
Right-click file in Explorer → BinSleuth: Analyze Binary Analyze without opening the file
Ctrl+Shift+P → BinSleuth: Analyze Active File Re-analyze the currently focused file

Header Buttons

Button Action
OPEN Open the analyzed binary in the Hex Editor (or default editor)
EXPORT ▾ Save a report — choose Markdown, JSON, or CSV

Navigating to a Section

Click any slice in the Section Map or any bar in the Section Heatmap. If the Hex Editor extension is installed, the cursor jumps directly to the section's file offset. Otherwise VS Code opens the file with vscode.open.

Exporting a Report

  1. Click EXPORT ▾ in the sidebar header.
  2. Choose the format: Markdown (human-readable), JSON (machine-readable), or CSV (spreadsheet).
  3. A save dialog opens — pick the destination and save.

The report includes: binary metadata, per-section table (name · size · offset · entropy · permissions), security flags, and dangerous symbols.


WSL / Windows Support

Scenario WSL required?
VS Code inside WSL (Remote - WSL) No
Windows VS Code with win32-x64 VSIX No
Windows VS Code with a locally-built VSIX from WSL Yes

Installation

VS Code Marketplace (Recommended)

  1. Open Extensions (Ctrl+Shift+X) in VS Code.
  2. Search for BinSleuth.
  3. Click Install.

Or install directly from the VS Code Marketplace page.

From GitHub Releases

If you need a specific platform build, download the VSIX from the Releases page:

File Platform
*-linux-x64.vsix Linux x64
*-darwin-arm64.vsix macOS Apple Silicon
*-darwin-x64.vsix macOS Intel
*-win32-x64.vsix Windows x64

Install: Extensions (Ctrl+Shift+X) → ⋯ → Install from VSIX…

Windows tip: Save the .vsix to a local Windows drive (e.g. C:\Users\...\Downloads\) before installing — VS Code cannot install from a WSL UNC path.

Requirements

Dependency Version Notes
VS Code ≥ 1.85
Hex Editor any Optional — enables click-to-offset navigation
WSL (Windows only) any Only needed when not using the win32-x64 VSIX

Roadmap

Feature Status
Section Map (doughnut chart) ✅ v0.1.0
Section Heatmap (size + entropy, neon glow) ✅ v0.1.0
Security flags panel (NX / PIE / RELRO / …) ✅ v0.1.0
Security Score (0–100) ✅ v0.1.0
Dangerous symbol detection ✅ v0.1.0
Click-to-offset navigation ✅ v0.1.0
Auto-analysis on binary open ✅ v0.1.0
Export report (Markdown / JSON / CSV) ✅ v0.1.0
Multi-OS support (Windows native, macOS, Linux) ✅ v0.1.0
i18n — Japanese & Simplified Chinese ✅ v0.1.0
VS Code Marketplace publication ✅ v0.1.0
Configurable bridge binary path 🔲 planned
PE / Mach-O format badges 🔲 planned
Diff view (compare two binaries) 🔲 planned

Related Projects

  • BinSleuth — the underlying Rust analysis library
  • vscode-claude-status — Claude Code token usage in the VS Code status bar

Contributing

See CONTRIBUTING.md for development setup, build instructions, and project architecture.


License

MIT — © 2026 long-910

  • Contact us
  • Jobs
  • Privacy
  • Manage cookies
  • Terms of use
  • Trademarks
© 2026 Microsoft