PLASMA is an interactive disassembler that can generate more readable assembly (pseudo code) with colored syntax. It supports architectures like x86{64}, ARM, MIPS{64} (partially for ARM and MIPS) and formats such as ELF, PE, RAW. The project is still in active development and provides a Python API for scripting. Note that until structures and type definitions are implemented, database compatibility could be broken. Requirements include Python >= 3.4, capstone, python-pyelftools, pefile, python3-future, python-msgpack, c++filt, and a terminal supporting UTF8 and 256 colors. Optional components include python-qt4 for the memory map and keystone for the script asm.py. Installation can be done using the provided script.
FEATURES
EXPLORE BY TAGS
SIMILAR TOOLS
A binary analysis and management framework for organizing and analyzing malware and exploit samples, and creating plugins.
Intezer is a cloud-based malware analysis platform that detects and classifies malware using genetic code analysis.
A static analysis tool for PE files that detects malicious behavior and provides information for manual analysis.
Falcon Sandbox is a malware analysis framework that provides in-depth static and dynamic analysis of files, offering hybrid analysis, behavior indicators, and integrations with various security tools.
PinCTF is a tool for using Intel's Pin Tool to instrument reverse engineering binaries and count instructions.
Code to prevent a managed .NET debugger/profiler from working.
PINNED

Checkmarx SCA
A software composition analysis tool that identifies vulnerabilities, malicious code, and license risks in open source dependencies throughout the software development lifecycle.

Orca Security
A cloud-native application protection platform that provides agentless security monitoring, vulnerability management, and compliance capabilities across multi-cloud environments.

DryRun
A GitHub application that performs automated security code reviews by analyzing contextual security aspects of code changes during pull requests.