![]() |
miasm
Reverse engineering framework
|
Variables | |
| expected_file = sys.argv[1] | |
| dg = subprocess.Popen([sys.executable] + sys.argv[2:], stdout=subprocess.PIPE) | |
| stdout | |
| expected = json.load(open(expected_file)) | |
| result = json.loads(stdout.decode()) | |
| dg_check.dg = subprocess.Popen([sys.executable] + sys.argv[2:], stdout=subprocess.PIPE) |
| dg_check.expected = json.load(open(expected_file)) |
| dg_check.expected_file = sys.argv[1] |
| dg_check.result = json.loads(stdout.decode()) |
| dg_check.stdout |