cleave stable

Deep static analysis engine. Combines AST-aware inspection with automated binary reverse engineering to extract capabilities and behaviors from software. Designed as an input to other analysis tools — it detects neutral micro-behaviors aligned with the Malware Behavior Catalog.

Capabilities

  • 20+ languages — Python, JavaScript, TypeScript, Go, Rust, C/C++, Java, C#, Swift, Ruby, PHP, Perl, Lua, Shell, PowerShell, and more
  • Binary formats — ELF, PE (Windows), Mach-O (macOS)
  • Archive formats — ZIP, TAR (gz/bz2/xz/zst), 7z, RAR, plus package formats (JAR, deb, rpm, apk, gem, crate, wheel)
  • Document & data formats — RTF, LNK, PNG steganography, PDF, plist, VBScript, Batch, manifests, GitHub Actions workflows
  • AST traversal via Tree-sitter for source-level analysis
  • Binary reverse engineering via Radare2/Rizin
  • Signature matching via YARA-X
  • String extraction via stng for payload decoding

Install

$ cargo install --git https://codeberg.org/atomdrift/cleave

Usage

$ cleave suspicious.elf
$ cleave /tmp/box-o-malware/
$ cleave package.tar.gz