=========================================================== .___ __ __ _________________ __ __ __| _/|__|/ |_ / ___\_` __ \__ \ | | \/ __ | | \\_ __\ / /_/ > | \// __ \| | / /_/ | | || | \___ /|__| (____ /____/\____ | |__||__| /_____/ \/ \/ grep rough audit - static analysis tool v2.8 written by @Wireghoul =================================[justanotherhacker.com]=== sandsifter-1.04/disas/disas_32.sh-2- sandsifter-1.04/disas/disas_32.sh:3:echo -ne `echo $1 | sed 's/\(..\)/\\\\x\1/g' ` > temp.bin sandsifter-1.04/disas/disas_32.sh-4- sandsifter-1.04/disas/disas_32.sh-5-echo sandsifter-1.04/disas/disas_32.sh:6:echo "=== ndisasm ===" sandsifter-1.04/disas/disas_32.sh-7-echo sandsifter-1.04/disas/disas_32.sh:8:ndisasm -b32 temp.bin sandsifter-1.04/disas/disas_32.sh-9- ############################################## sandsifter-1.04/disas/disas_64.sh-2- sandsifter-1.04/disas/disas_64.sh:3:echo -ne `echo $1 | sed 's/\(..\)/\\\\x\1/g' ` > temp.bin sandsifter-1.04/disas/disas_64.sh-4- sandsifter-1.04/disas/disas_64.sh-5-echo sandsifter-1.04/disas/disas_64.sh:6:echo "=== ndisasm ===" sandsifter-1.04/disas/disas_64.sh-7-echo sandsifter-1.04/disas/disas_64.sh:8:ndisasm -b64 temp.bin sandsifter-1.04/disas/disas_64.sh-9- ############################################## sandsifter-1.04/sifter-summarize.py-731- if not asm: sandsifter-1.04/sifter-summarize.py:732: asm = "(unknown)" sandsifter-1.04/sifter-summarize.py-733- if not raw: ############################################## sandsifter-1.04/sifter.py-136- sandsifter-1.04/sifter.py:137:# ndisasm disassembler sandsifter-1.04/sifter.py:138:# (ndidsasm breaks unnecessary prefixes onto its own line, which makes parsing sandsifter-1.04/sifter.py-139-# the output difficult. really only useful with the -P0 flag to disallow ############################################## sandsifter-1.04/sifter.py-143- if arch == "64": sandsifter-1.04/sifter.py:144: dis, errors = subprocess.Popen("echo -ne '%s' | ndisasm -b64 - | head -2" % b, sandsifter-1.04/sifter.py-145- stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).communicate() sandsifter-1.04/sifter.py-146- else: sandsifter-1.04/sifter.py:147: dis, errors = subprocess.Popen("echo -ne '%s' | ndisasm -b32 - | head -2" % b, sandsifter-1.04/sifter.py-148- stdout=subprocess.PIPE, stderr=subprocess.PIPE, shell=True).communicate()