PLASMA Logo

PLASMA

0
Free
Visit Website

PLASMA is an interactive disassembler that can generate more readable assembly (pseudo code) with colored syntax. It supports architectures like x86{64}, ARM, MIPS{64} (partially for ARM and MIPS) and formats such as ELF, PE, RAW. The project is still in active development and provides a Python API for scripting. Note that until structures and type definitions are implemented, database compatibility could be broken. Requirements include Python >= 3.4, capstone, python-pyelftools, pefile, python3-future, python-msgpack, c++filt, and a terminal supporting UTF8 and 256 colors. Optional components include python-qt4 for the memory map and keystone for the script asm.py. Installation can be done using the provided script.

FEATURES

ALTERNATIVES

Microservice for scanning files with Yara

Tools for working with Android .dex and Java .class files, including dex-reader/writer, d2j-dex2jar, and smali/baksmali.

A tool that executes programs in memory from various sources

A collection of Android Fakebank and Tizi samples for analyzing spyware on Android devices.

OCaml wrapper for YARA matching engine for malware identification

UDcide provides an alternative approach to dealing with Android malware by targeting specific behaviors for removal.

Bindings for the Yara library from VirusTotal with support for Yara v4.2 and various features like rule compilation and scanning.

Repository of scripts, signatures, and IOCs related to various malware analysis topics.

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Copyright © 2024 - All rights reserved