Files
metasploit-gs/tools/nasm_shell.rb
T

37 lines
850 B
Ruby
Raw Normal View History

2005-12-17 06:46:23 +00:00
#!/usr/bin/env ruby
#
# This tool provides an easy way to see what opcodes are associated with
# certain x86 instructions by making use of nasm if it is installed and
# reachable through the PATH environment variable.
#
2005-12-08 15:37:10 +00:00
$:.unshift(File.join(File.dirname(__FILE__), '..', 'lib'))
require 'rex'
require 'rex/ui'
# Check to make sure nasm is installed and reachable through the user's PATH.
begin
Rex::Assembly::Nasm.check
rescue RuntimeError
puts "#{$!}"
exit
end
# Start a pseudo shell and dispatch lines to be assembled and then
# disassembled.
2005-12-08 15:37:10 +00:00
shell = Rex::Ui::Text::PseudoShell.new("%bnasm%c")
shell.run { |line|
line.gsub!(/(\r|\n)/, '')
line.gsub!(/\\n/, "\n")
break if (line =~ /^(exit|quit)/i)
2005-12-09 04:54:37 +00:00
begin
puts(Rex::Assembly::Nasm.disassemble(
Rex::Assembly::Nasm.assemble(line)))
rescue RuntimeError
puts "Error: #{$!}"
end
2008-10-19 21:03:39 +00:00
}