Skip to content
Firmware Analysis Tool
Branch: master
Clone or download
Type Name Latest commit message Commit time
Failed to load latest commit information.
images Added images/ Dec 23, 2015
testing Added LZMA tests Nov 21, 2017
.editorconfig Added .editorconfig Nov 29, 2018
.travis.yml Added backports.lzma to .travis.yml Nov 21, 2017 Merged sundhaug92's updates to documentation and .gitignore/.travis.yml Mar 15, 2017
LICENSE Fix perm messup Apr 30, 2016 Update Aug 15, 2018 fix issue #343 Aug 29, 2018


Build Status Maintenance GitHub license GitHub stars

Binwalk is a fast, easy to use tool for analyzing, reverse engineering, and extracting firmware images.

Installation and Usage

More information on Wiki

Quick start


Binwalk follows the standard Python installation procedure:

$ sudo python install

If you're running Python 2.x, installing the optional Python lzma module is strongly recommended (but not required):

$ sudo apt-get install python-lzma

For instructions on installing other optional dependencies, see installation guide.


Basic usage is simple:

$ binwalk firmware.bin

0             0x0             TRX firmware header, little endian, header size: 28 bytes, image size: 14766080 bytes, CRC32: 0x6980E553 flags: 0x0, version: 1
28            0x1C            LZMA compressed data, properties: 0x5D, dictionary size: 65536 bytes, uncompressed size: 5494368 bytes
2319004       0x23629C        Squashfs filesystem, little endian, version 4.0, compression: xz, size: 12442471 bytes, 3158 inodes, blocksize: 131072 bytes, blocksize: 131072 bytes, created: 2014-05-21 22:38:47

For additional examples and descriptions of advanced options, see the wiki.

You can’t perform that action at this time.