![]() |
miasm
Reverse engineering framework
|
Functions | |
| def | code_sentinelle (jitter) |
| def | init_jitter (loc_db) |
| def | cb (jitter) |
Variables | |
| data = decode_hex("b810000000bb0100000083e8010f44cb75f8c3") | |
| int | run_addr = 0x40000000 |
| loc_db = LocationDB() | |
| def | myjit = init_jitter(loc_db) |
| bool | first_call = True |
| Let's specify a max_exec_per_call 5: main/loop_main, loop_main. More... | |
| EAX | |
| Second run. More... | |
| exec_cb | |
| int | counter = 0 |
| def jit_options.cb | ( | jitter | ) |
| def jit_options.code_sentinelle | ( | jitter | ) |
| def jit_options.init_jitter | ( | loc_db | ) |
| int jit_options.counter = 0 |
| jit_options.data = decode_hex("b810000000bb0100000083e8010f44cb75f8c3") |
| jit_options.EAX |
Second run.
| jit_options.exec_cb |
| bool jit_options.first_call = True |
Let's specify a max_exec_per_call 5: main/loop_main, loop_main.
| jit_options.loc_db = LocationDB() |
| def jit_options.myjit = init_jitter(loc_db) |
| int jit_options.run_addr = 0x40000000 |