objdump -s my_program # See all the sections in binary format
readelf -a my_program # Show all kinds of information about an ELF
objcopy -O binary my_program my_program.bin # Gets the flat binary for an ELF
setarch `uname -m` -R ./my_program # Run with ASLR off
echo 2 | sudo tee /proc/sys/kernel/randomize_va_space # Turn off ASLR globally temporarily
pmap # see memory mapping
objdump -b binary --adjust-vma=0x0 -m i386:x86-64 -D pure_binary_executable
objdump -b binary --adjust-vma=0x0 -mi386 -Maddr16,data16 -D for32.bin # works with bootloaders
# or equivalently
objdump -b binary --adjust-vma=0x0 -mi8086 -D for32.bin
In gdb:
set disable-randomization off