===========================================================
                                      .___ __  __   
          _________________  __ __  __| _/|__|/  |_ 
         / ___\_` __ \__  \ |  |  \/ __ | | \\_  __\
        / /_/  >  | \// __ \|  |  / /_/ | |  ||  |  
        \___  /|__|  (____  /____/\____ | |__||__|  
       /_____/            \/           \/           
              grep rough audit - static analysis tool
                  v2.8 written by @Wireghoul
=================================[justanotherhacker.com]===
sandsifter-1.04/disas/disas_32.sh-2-
sandsifter-1.04/disas/disas_32.sh:3:echo -ne `echo $1 | sed 's/\(..\)/\\\\x\1/g' ` > temp.bin
sandsifter-1.04/disas/disas_32.sh-4-
sandsifter-1.04/disas/disas_32.sh-5-echo
sandsifter-1.04/disas/disas_32.sh:6:echo "=== ndisasm ==="
sandsifter-1.04/disas/disas_32.sh-7-echo
sandsifter-1.04/disas/disas_32.sh:8:ndisasm -b32 temp.bin
sandsifter-1.04/disas/disas_32.sh-9-
##############################################
sandsifter-1.04/disas/disas_64.sh-2-
sandsifter-1.04/disas/disas_64.sh:3:echo -ne `echo $1 | sed 's/\(..\)/\\\\x\1/g' ` > temp.bin
sandsifter-1.04/disas/disas_64.sh-4-
sandsifter-1.04/disas/disas_64.sh-5-echo
sandsifter-1.04/disas/disas_64.sh:6:echo "=== ndisasm ==="
sandsifter-1.04/disas/disas_64.sh-7-echo
sandsifter-1.04/disas/disas_64.sh:8:ndisasm -b64 temp.bin
sandsifter-1.04/disas/disas_64.sh-9-
##############################################
sandsifter-1.04/sifter-summarize.py-731-                if not asm:
sandsifter-1.04/sifter-summarize.py:732:                    asm = "(unknown)"
sandsifter-1.04/sifter-summarize.py-733-                if not raw:
##############################################
sandsifter-1.04/sifter.py-136-
sandsifter-1.04/sifter.py:137:# ndisasm disassembler
sandsifter-1.04/sifter.py:138:# (ndidsasm breaks unnecessary prefixes onto its own line, which makes parsing
sandsifter-1.04/sifter.py-139-# the output difficult.  really only useful with the -P0 flag to disallow
##############################################
sandsifter-1.04/sifter.py-143-    if arch == "64":
sandsifter-1.04/sifter.py:144:        dis, errors = subprocess.Popen("echo -ne '%s' | ndisasm -b64 - | head -2" % b,
sandsifter-1.04/sifter.py-145-                stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).communicate()
sandsifter-1.04/sifter.py-146-    else:
sandsifter-1.04/sifter.py:147:        dis, errors = subprocess.Popen("echo -ne '%s' | ndisasm -b32 - | head -2" % b,
sandsifter-1.04/sifter.py-148-                stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).communicate()