smap is a sophisticated shellcode analysis tool that provides disassembly capabilities and bad character detection for security researchers and penetration testers.
- Shellcode analysis in
\xXXformat - Architecture-aware disassembly (i386/x86_64)
- Multiple syntax formats (Intel/AT&T)
- Bad character detection
- ASCII representation of shellcode
- Visual highlighting of assembly instructions
- Section analysis of binary payloads
- Python2
- OBJDump
- Argparse (via pip2)
- Clone git repository
git clone https://github.com/Andrey-oss/smap.git
cd smap- Install required library
pip2 install argparseBasic usage:
./smap.py -f <shellcode_file> [-a architecture] [-sf syntax_format]Example:
./smap.py -f shellcode.txt -a i386 -sf intel- Fork the repository
- Create your feature branch (git checkout -b feature/your-feature)
- Commit your changes (git commit -am 'Add some feature')
- Push to the branch (git push origin feature/your-feature)
- Open a Pull Request
MIT License. See LICENSE for details.