Skip to content

search_strings

Decompilation

Searches the User Strings (#US) heap in the assembly metadata for string literals matching a pattern. This reads directly from metadata without decompilation, making it significantly faster than IL-based approaches. Essential for security audits, finding configuration values, and locating embedded URLs or credentials.

ParameterTypeRequiredDefaultDescription
assembly_pathstringYesPath to the .dll or .exe file
patternstringYesString pattern to search for
case_sensitiveboolNofalseCase-sensitive matching
use_regexboolNofalseTreat pattern as a regular expression
max_resultsintNo100Maximum number of matches to return
{
"tool": "search_strings",
"arguments": {
"assembly_path": "/path/to/MyApp.dll",
"pattern": "https://",
"use_regex": false,
"max_results": 50
}
}

Returns a list of matching string literals found in the assembly. Long strings are truncated to 200 characters for display. The total match count is shown, with a note when results are capped at max_results.