PLASMA is an interactive disassembler that can generate more readable assembly (pseudo code) with colored syntax. It supports architectures like x86{64}, ARM, MIPS{64} (partially for ARM and MIPS) and formats such as ELF, PE, RAW. The project is still in active development and provides a Python API for scripting. Note that until structures and type definitions are implemented, database compatibility could be broken. Requirements include Python >= 3.4, capstone, python-pyelftools, pefile, python3-future, python-msgpack, c++filt, and a terminal supporting UTF8 and 256 colors. Optional components include python-qt4 for the memory map and keystone for the script asm.py. Installation can be done using the provided script.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A tool to detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.
A malware/botnet analysis framework with a focus on network analysis and process comparison.
Dynamic binary analysis library with various analysis and emulation capabilities.
Generate Yara rules from function basic blocks in x64dbg.
A collection of publicly available YARA rules for detecting and classifying malware.
Hyara is a plugin that simplifies writing YARA rules with various convenient features.
PINNED

Mandos
Fractional CISO service that helps B2B companies implement security leadership to win enterprise deals, achieve compliance, and develop strategic security programs.

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.