miasm
Reverse engineering framework
bad_block.py File Reference

Namespaces

 bad_block
 

Functions

def bad_block.code_sentinelle (jitter)
 
def bad_block.raise_me (jitter)
 

Variables

 bad_block.machine = Machine("x86_32")
 
 bad_block.loc_db = LocationDB()
 
 bad_block.jitter = machine.jitter(loc_db, sys.argv[1])
 
 bad_block.data = decode_hex("90b842000000ffff90909090")
 
bool bad_block.error_raised = False
 
int bad_block.run_addr = 0x40000000