jhark/dizazm
A command-line tool for Windows that disassembles symbols in PE files.
0e2491d8e6d2be38dc0c2ce8e103469886e468bb6035a194bea8472c463345b86c3ef9333490ecfeA command-line tool for Windows that disassembles symbols in PE files.
Uses Capstone and dbghelp.dll.
zig build
Usage: dizazm [-s | --symbol <symbol>] [-a | --address <address>]
[-l | --length <length>] [-b | --bytes] [-h | --help] <IMAGE_PATH>
Disassembles a specified symbol from a Portable Executable (PE) file (.exe, .dll).
Example:
dizazm -s CreateFileW kernel32.dll
Options:
-s, --symbol The name of the symbol to disassemble
-a, --address The address to disassemble (e.g., 0x1000)
-l, --length Number of bytes to disassemble
-b, --bytes Print raw instruction bytes
-h, --help Show this help and exit
Arguments:
<IMAGE_PATH>
Note: For dbghelp support you will need to place dbghelp.dll (and optionally symsrv.dll) in the same directory as dizazm.exe. You can get these from the Windows Debugging Tools. The DLL is loaded on demand, so dizazm will work without it, but only be able to find symbols in the export table.
If symsrv.dll is made available then you may also specify a symbol path via _NT_SYMBOL_PATH see Using SymSrv.
E.g. _NT_SYMBOL_PATH="srv*https://msdl.microsoft.com/download/symbols".
This project is licensed under the ISC License - see the LICENSE file for details.