miasm
Reverse engineering framework
dg_check.py File Reference

Namespaces

 dg_check
 

Variables

 dg_check.expected_file = sys.argv[1]
 
 dg_check.dg = subprocess.Popen([sys.executable] + sys.argv[2:], stdout=subprocess.PIPE)
 
 dg_check.stdout
 
 dg_check.expected = json.load(open(expected_file))
 
 dg_check.result = json.loads(stdout.decode())