Skip to content

Small and Simple x86/amd64 disassembler (just for fun).

Notifications You must be signed in to change notification settings

static-void/dismantle

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

        	       ___                            __  __   
         	  ____/ (_)________ ___  ____ _____  / /_/ /__ 
        	 / __  / / ___/ __ `__ \/ __ `/ __ \/ __/ / _ \
        	/ /_/ / (__  ) / / / / / /_/ / / / / /_/ /  __/
        	\__,_/_/____/_/ /_/ /_/\__,_/_/ /_/\__/_/\___/ 

        	      Small i386/amd64 binary browser

        	  (c) Edd Barrett 2011	<[email protected]>
        	  (c) Ed Robbins 2011	<[email protected]>

=============================================================================

We just started hacking and this happened. A small binary file browser and
disassembler (x86/64) with control flow recovery and SSA code output.
The project is inspired by radare2.

Commands:
	General
		info/i			Show file information
		help/?			Show this help
		CTRL+D			Exit
		seek/s addr		Seek to an address
		debug [level]		Get/set debug level (0-3)
		set [var] [val]		Show/ammend settings
		ansii			Get/set ANSII colours setting
	Disassembler/Hex/ASCII
		dis/pd [ops]		Disassemble (8 or 'ops' operations)
		disf/pdf		Disassemble function (up until the next RET)
		bits [set_to]		Get/set architecture (32 or 64)
		/ str			Find ASCII string from current pos
		hex/px [len]		Dump hex (64 or 'len' bytes)
	Symbols/tables
		funcs/f			Show functions from dwarf data
		pht			Show program header table
		sht			Show section header table
		nsym			Find nearest symbol to address
		findbranch [address]	Search for branches with 'address' as target
	Advanced
		cfg			Recover & display control flow graph
					starting from current address
		dom			Calculate dominance tree and frontiers of
					current func, display tree
		ssa			Disassemble in SSA form

Settings
	General
		dbg.level	Debug level
		arch.bits	64 or 32 bit architecture
		pref.ansi	Use ANSI colour terminal
	CFG
		cfg.fcalls	Follow calls/jumps? 
					0 = ignore all branch instructions
					1 = stop at 1st branch instruction
					2 = follow all local jumps
					3 = follow all local jumps and calls
					    (recover Call Graph as well as CFG)
					4 = follow all jumps and calls, local or
					    otherwise (except indirect)
		cfg.verbose	Control flow graph verbosity - controls
				what will be printed in graph nodes
					0 = postorder number of node
					1 = start address
					2 = full instruction listing
	SSA
		ssa.flatten	SSA: Flatten indirect addressing
				(1 = default = On, 0 = off)
		ssa.transform	SSA: Instruction transforming (e.g. push/pop, jump etc)
				(1 = default = On, 0 = off)

About

Small and Simple x86/amd64 disassembler (just for fun).

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Shell 67.0%
  • C 28.1%
  • Python 4.2%
  • Other 0.7%