Open nfreitas11 opened 6 years ago
Hello, first of all congratz on the tool. I've tried it out and I really enjoyed using it. One thing that I think may be useful is adding the opcodes between the address and the assembly instructions. Making it look like the output of objdump:
Shellen:
L:dsm:x86_32 > \xb0\x0b\x31\xc9\x51\x68\x2f\x2f\x73\x68\x68\x2f\x62\x69\x6e\x89\xe3\xcd\x80 0x00080000: mov al, 0xb 0x00080002: xor ecx, ecx 0x00080004: push ecx 0x00080005: push 0x68732f2f 0x0008000A: push 0x6e69622f 0x0008000F: mov ebx, esp 0x00080011: int 0x80
Objdump:
8048091: b0 0b mov al,0xb 8048093: 31 c9 xor ecx,ecx 8048095: 51 push ecx 8048096: 68 2f 2f 73 68 push 0x68732f2f 804809b: 68 2f 62 69 6e push 0x6e69622f 80480a0: 89 e3 mov ebx,esp 80480a2: cd 80 int 0x80
For instance, it might be useful while writing Shellcode to see how many bytes took a certain instruction... What do you think?
Kind regards
Hi and Thank you!
Hmm, looks interesting. I will try to add it
Thanks
Alright, I came back for some time to this project, so will try to resolve all current issues! :dancer:
Hello, first of all congratz on the tool. I've tried it out and I really enjoyed using it. One thing that I think may be useful is adding the opcodes between the address and the assembly instructions. Making it look like the output of objdump:
Shellen:
Objdump:
For instance, it might be useful while writing Shellcode to see how many bytes took a certain instruction... What do you think?
Kind regards