Ligand is a terminal-based intelligence tool focused on binary inspection, system analysis, and live network observation. It is designed for reverse engineering, security research, and low-level inspection tasks.
ELF parsing, string extraction, symbol inspection, and x86-64 disassembly.
Static capability detection based on embedded strings and execution indicators.
Live packet capture across multiple interfaces with protocol awareness.
High-performance TUI built for keyboard-driven workflows.
Memory-safe implementation focused on performance and portability.
Intended for malware analysis, CTFs, and experimental reverse engineering.
Ligand integrates multiple low-level components into a single interface:
+-------------------+
| Ligand |
+-------------------+
| Interface Layer |
+-------------------+
| ELF | Net | Sys |
+-------------------+
| Capstone | Pnet |
+-------------------+
| Kernel / NIC |
+-------------------+
Ligand is under active development. Features and stability will improve over time.