miasm
Reverse engineering framework
build_pe Namespace Reference

Variables

 pe_object = PE()
 
string payload = b"\xc3"
 
 s_text
 
 AddressOfEntryPoint
 
list new_dll
 
 s_myimp = pe_object.SHList.add_section(name="myimp", rawsize=0x1000)
 

Variable Documentation

◆ AddressOfEntryPoint

build_pe.AddressOfEntryPoint

◆ new_dll

list build_pe.new_dll
Initial value:
1 = [
2  ({"name": "kernel32.dll",
3  "firstthunk": s_text.addr + 0x100},
4  ["CreateFileA", "SetFilePointer", "WriteFile", "CloseHandle"]
5  ),
6  ({"name": "USER32.dll",
7  "firstthunk": None},
8  ["SetDlgItemInt", "GetMenu", "HideCaret"]
9  )
10 ]

◆ payload

string build_pe.payload = b"\xc3"

◆ pe_object

build_pe.pe_object = PE()

◆ s_myimp

build_pe.s_myimp = pe_object.SHList.add_section(name="myimp", rawsize=0x1000)

◆ s_text

build_pe.s_text
Initial value:
1 = pe_object.SHList.add_section(
2  name="text", addr=0x1000, rawsize=0x1000, data=payload
3 )