Get started quickly by adding Inline Disassembler to your bookmarks.

If you have any questions feel free to email me at williammahler84@gmail.com
Additionally feel free to connect with me on LinkedIn.

Usage

Select any bytes you would like to disassemble on any page and then click the Inline Disassembler link or your bookmarklet. The disassembly engine will load for a moment and then prompt you to set configuration options before beginning disassembly.


Examples

Source: https://www.exploit-db.com/exploits/38005/ - SQL Server 2000/2005 SQLNS Unhandled Pointer Exploit

"\x64\x8B\x25\x00\x00\x00\x00\xeb\x07\x90\x90\x90"

'0C0C0C6C   64:8B25 00000000          MOV ESP,DWORD PTR FS:[0]
'0C0C0C73   EB 07                     JMP SHORT 0C0C0C7C
'0C0C0C75   90                        NOP
'0C0C0C76   90                        NOP
'0C0C0C77   90                        NOP
'12 bytes


"\x83\xEC\x24\x8B\xEC\x83\xC5\x30"

'0C0C0C7C   83EC 24                   SUB ESP,24
'0C0C0C7F   8BEC                      MOV EBP,ESP
'0C0C0C81   83C5 30                   ADD EBP,30
'8 bytes


'''''''''''''''''''''''''''''shellcode WinExec (win2k sp2)
"\xd9\xee\x9b\xd9\x74\x24\xf4\x5e\x83\xc6\x1a\x33\xc0\x50\x56\x68\x41\x41\x41\x41\x68\x16\x41\x86\x7c\xc3"

'D9EE            FLDZ
'9B              WAIT
'D97424 F4       FSTENV (28-BYTE) PTR SS:[ESP-C]
'5E              POP ESI
'83C6 1a                   ADD ESI,1a
'33C0                      XOR EAX,EAX
'50                        PUSH EAX
'56                        PUSH ESI
'68 F1F8807C               PUSH kernel32.ExitThread
'68 1641867C               PUSH kernel32.WinExec
'C3                        RETN
'''''''''''''''''''''''''''''main