https://github.com/mariosieg/maschinengott
Extremly fast x86-64 PE disassembler
https://github.com/mariosieg/maschinengott
assembly disassembler hacking hacking-tools machine-coding reverse-engineering x86-64
Last synced: about 1 month ago
JSON representation
Extremly fast x86-64 PE disassembler
- Host: GitHub
- URL: https://github.com/mariosieg/maschinengott
- Owner: MarioSieg
- License: mit
- Created: 2022-06-26T15:52:00.000Z (over 3 years ago)
- Default Branch: main
- Last Pushed: 2023-01-04T13:10:19.000Z (almost 3 years ago)
- Last Synced: 2025-04-03T18:51:24.506Z (7 months ago)
- Topics: assembly, disassembler, hacking, hacking-tools, machine-coding, reverse-engineering, x86-64
- Language: Rust
- Homepage:
- Size: 17.6 KB
- Stars: 8
- Watchers: 1
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# Maschinengott
The machine god (German: Maschinengott) is a very fast terminal disassembler for x86-64.
It uses all available CPU cores to disassemble huge binaries in a very short amount of time.
It also shows some information about the machine code - for example the most used assembly instructions
and the used ISA extensions.
## Why another disassembler?
I created my own little disassembler because the other ones were just too slow when disassembling huge
(300 MB+) binaries. I also wanted some quick information about used ISA extensions and instructions.
## Current features:
* Works with Windows and Linux binaries
* PE multithreaded disassembly for executable and dynamic link libraries (.exe and .dll)
* View most used assembly instructions
* View total assembly instruction count
* View used ISA extensions (e. g. AVX, FMA3 or AVX512F)
* View disassembled code in AT&T or Intel syntax
* View instruction encoding
## Examples
Example output from a program analysis:

Example disassembly in AT&T syntax:
The relative address, machine language and instruction encoding is displayed too.
