===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h-122-	R_386_TLS_GD_PUSH  = 25, /* Tag for pushl in GD TLS code */
edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h:123:	R_386_TLS_GD_CALL  = 26, /* Relocation for call to __tls_get_addr() */
edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h-124-	R_386_TLS_GD_POP   = 27, /* Tag for popl in GD TLS code */
##############################################
edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h-126-	R_386_TLS_LDM_PUSH = 29, /* Tag for pushl in LDM TLS code */
edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h:127:	R_386_TLS_LDM_CALL = 30, /* Relocation for call to __tls_get_addr() in LDM code */
edb-debugger-1.2.0/libELF/include/libELF/elf_binary.h-128-	R_386_TLS_LDM_POP  = 31, /* Tag for popl in LDM TLS code */
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-742-	auto &bytes  = parts[1];
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:743:	auto &disasm = parts[2];
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-744-	addr         = addr.trimmed().toUpper();
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-748-	bytes  = bytes.trimmed().toUpper();
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:749:	disasm = disasm.trimmed().replace(QRegExp("  +"), " ");
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-750-
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-758-	for (unsigned i = 3; i < parts.size(); ++i)
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:759:		disasm += " " + parts[i];
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-760-#endif
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-861-	auto &bytes  = parts[1];
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:862:	auto &disasm = parts[2];
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-863-
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-948-	auto bytes        = expectedFormat.cap(3).trimmed();
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:949:	const auto disasm = expectedFormat.cap(1).trimmed().replace(QRegExp("  +"), " ");
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-950-	const auto result = addr + "   " + bytes + "   " + disasm;
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-990-					EV_CURRENT,
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:991:					Elf32_Addr(address.toUint()),            // entry point
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-992-					offsetof(FileData, programHeader),       // program header table offset
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1003-
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1004:				const edb::value32 insnAddr(address);
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1005-
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1015-					0,                             // start of file is beginning of segment
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1016:					Elf32_Addr(fileAddr.toUint()), // vaddr of the segment
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1017-					0,                             // paddr of the segment, irrelevant
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1027-					SHF_ALLOC | SHF_EXECINSTR,
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1028:					Elf32_Addr(address.toUint()),
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1029-					insnAddr - fileAddr, // section offset in file
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1030:					Elf32_Addr(bytes.size()),
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1031-					SHN_UNDEF, // sh_link
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1070-					EV_CURRENT,
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1071:					Elf64_Addr(address.toUint()),            // entry point
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1072-					offsetof(FileData, programHeader),       // program header table offset
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1083-
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1084:				const edb::value64 insnAddr(address);
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1085-				// aligned on page boundary and one page before
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1095-					0,                             // start of file is beginning of segment
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1096:					Elf64_Addr(fileAddr.toUint()), // vaddr of the segment
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1097-					0,                             // paddr of the segment, irrelevant
##############################################
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1106-					SHF_ALLOC | SHF_EXECINSTR,
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp:1107:					Elf64_Addr(address.toUint()),
edb-debugger-1.2.0/plugins/InstructionInspector/Plugin.cpp-1108-					insnAddr - fileAddr, // section offset in file
##############################################
edb-debugger-1.2.0/plugins/ODbgRegisterView/arch/x86-generic/x86Groups.cpp-125-	char fenv[28];
edb-debugger-1.2.0/plugins/ODbgRegisterView/arch/x86-generic/x86Groups.cpp:126:	asm volatile("fldz\n"
edb-debugger-1.2.0/plugins/ODbgRegisterView/arch/x86-generic/x86Groups.cpp-127-				 "fstp %%st(0)\n"
##############################################
edb-debugger-1.2.0/plugins/FasLoader/.gitignore-46-*.orig
edb-debugger-1.2.0/plugins/FasLoader/.gitignore:47:# temporary files to analyze changes in asm files 
edb-debugger-1.2.0/plugins/FasLoader/.gitignore-48-
##############################################
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-221- */
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp:222:void seek_addr(QFile &file, edb::address_t address) {
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-223-	if (address <= UINT64_MAX / 2) {
##############################################
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-294-			if (readOnlyMemFile_) {
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp:295:				seek_addr(*readOnlyMemFile_, address);
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-296-				read = readOnlyMemFile_->read(ptr, 1);
##############################################
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-312-		if (readOnlyMemFile_) {
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp:313:			seek_addr(*readOnlyMemFile_, address);
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-314-			read = readOnlyMemFile_->read(ptr, len);
##############################################
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-404-		if (readWriteMemFile_) {
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp:405:			seek_addr(*readWriteMemFile_, address);
edb-debugger-1.2.0/plugins/DebuggerCore/unix/linux/PlatformProcess.cpp-406-			written = readWriteMemFile_->write(reinterpret_cast<const char *>(buf), len);
##############################################
edb-debugger-1.2.0/plugins/HeapAnalyzer/DialogHeap.cpp-487-
edb-debugger-1.2.0/plugins/HeapAnalyzer/DialogHeap.cpp:488:	edb::address_t test_addr(0);
edb-debugger-1.2.0/plugins/HeapAnalyzer/DialogHeap.cpp-489-	if (IProcess *process = edb::v1::debugger_core->process()) {
##############################################
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-3-	<assembler name="yasm" arch="x86">
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml:4:		<executable command_line="/usr/bin/yasm -f bin %IN% -o %OUT%" extension="asm" />
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-5-		<template>
##############################################
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-24-	<assembler name="nasm" arch="x86">
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml:25:		<executable command_line="/usr/bin/nasm -f bin %IN% -o %OUT%" extension="asm" />
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-26-		<template>
##############################################
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-45-	<assembler name="fasm" arch="x86">
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml:46:		<executable command_line="fasm %IN% %OUT%" extension="asm" />
edb-debugger-1.2.0/plugins/Assembler/xml/assemblers.xml-47-		<template>
##############################################
edb-debugger-1.2.0/plugins/Assembler/DialogAssembler.cpp-234-
edb-debugger-1.2.0/plugins/Assembler/DialogAssembler.cpp:235:			qDebug() << "RUNNING ASM TOOL: " << program << arguments;
edb-debugger-1.2.0/plugins/Assembler/DialogAssembler.cpp-236-
##############################################
edb-debugger-1.2.0/src/FloatX.cpp-36-// NOTE(eteran): this thin wrapper function make look pointless... and it REALLY does.
edb-debugger-1.2.0/src/FloatX.cpp:37:// However, I could not get plugins to be able to see the functions defined in .asm files
edb-debugger-1.2.0/src/FloatX.cpp-38-// unless I wrapped them in a concrete function like this. It's dumb, but it works
##############################################
edb-debugger-1.2.0/CHANGELOG-1182-  
edb-debugger-1.2.0/CHANGELOG:1183:* Added some regression tests to edisassm. Unfortunately nasm and edisassm 
edb-debugger-1.2.0/CHANGELOG-1184-  disagree on some syntax points and likes to re-order expressions sometimes, 
##############################################
edb-debugger-1.2.0/CHANGELOG-1766-
edb-debugger-1.2.0/CHANGELOG:1767:* Fixed crashable bug in QDisassembly view, involving libdisasm, libdisasm will
edb-debugger-1.2.0/CHANGELOG-1768-  do a double free if "x86_oplist_free" is called on invalid opcodes, this is
##############################################
edb-debugger-1.2.0/CHANGELOG-2014-
edb-debugger-1.2.0/CHANGELOG:2015:* Isolated libdisasm calls to a single part of the code, this allowed 
edb-debugger-1.2.0/CHANGELOG-2016-  consolidation of common functions as well as creating a central point to 
edb-debugger-1.2.0/CHANGELOG:2017:  replace the code as I feel that libdisasm will likely be dropped in a later 
edb-debugger-1.2.0/CHANGELOG-2018-  version.
##############################################
edb-debugger-1.2.0/CHANGELOG-2049-
edb-debugger-1.2.0/CHANGELOG:2050:* Corrected bug in libdisasm which caused the instruction  8e e8 to disassemble 
edb-debugger-1.2.0/CHANGELOG-2051-  incorrectly as "mov ds, ax" instead of the correct "mov gs, ax".
##############################################
edb-debugger-1.2.0/CHANGELOG-2159-
edb-debugger-1.2.0/CHANGELOG:2160:* Removed parts of libdisasm which aren't needed for libdisasm.a to build
edb-debugger-1.2.0/CHANGELOG-2161-  this cuts the download size by 75%!
##############################################
edb-debugger-1.2.0/CHANGELOG-2165-
edb-debugger-1.2.0/CHANGELOG:2166:* Removed parts of libdisasm from source tree that aren't related to the build
edb-debugger-1.2.0/CHANGELOG-2167-  which cut the tarball down to a quarter of the size :)