summaryrefslogtreecommitdiffstats
path: root/utils/binwalk/DETAILS
blob: 981089db5d72701038a2324b9278df4017f73231 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
           SPELL=binwalk
         VERSION=2.0.1
          SOURCE=$SPELL-$VERSION.tar.gz
   SOURCE_URL[0]=https://github.com/devttys0/$SPELL/archive/v$VERSION.tar.gz
     SOURCE_HASH=sha512:de223f61a0a212469c21b8e36d02cadc83f1cdb96a0f6114490d15d8dc12c93a86b46ef74379acb96b32b305e75ca66e940d7a18a8dc3b5036ebe8946dcca0f3
SOURCE_DIRECTORY="${BUILD_DIRECTORY}/${SPELL}-${VERSION}"
        WEB_SITE=http://code.google.com/p/binwalk/
      LICENSE[0]=MIT
         ENTERED=20121219
           SHORT="firmware analysis tool"
cat << EOF
Binwalk is a tool for searching a given binary image for embedded files and
executable code. Specifically, it is designed for identifying files and code
embedded inside of firmware images. Binwalk uses the libmagic library, so it
is compatible with magic signatures created for the Unix file utility.

Binwalk also includes a custom magic signature file which contains improved
signatures for files that are commonly found in firmware images such as
compressed/archived files, firmware headers, Linux kernels, bootloaders,
filesystems, etc.
EOF