miasm
Reverse engineering framework
|
Functions | |
def | code_sentinelle (jitter) |
def | init_jitter (loc_db) |
def | cb (jitter) |
Variables | |
data = decode_hex("b810000000bb0100000083e8010f44cb75f8c3") | |
int | run_addr = 0x40000000 |
loc_db = LocationDB() | |
def | myjit = init_jitter(loc_db) |
bool | first_call = True |
Let's specify a max_exec_per_call 5: main/loop_main, loop_main. More... | |
EAX | |
Second run. More... | |
exec_cb | |
int | counter = 0 |
def jit_options.cb | ( | jitter | ) |
def jit_options.code_sentinelle | ( | jitter | ) |
def jit_options.init_jitter | ( | loc_db | ) |
int jit_options.counter = 0 |
jit_options.data = decode_hex("b810000000bb0100000083e8010f44cb75f8c3") |
jit_options.EAX |
Second run.
jit_options.exec_cb |
bool jit_options.first_call = True |
Let's specify a max_exec_per_call 5: main/loop_main, loop_main.
jit_options.loc_db = LocationDB() |
def jit_options.myjit = init_jitter(loc_db) |
int jit_options.run_addr = 0x40000000 |