miasm
Reverse engineering framework
|
Functions | |
def | code_sentinelle (jitter) |
Variables | |
data = decode_hex("8d49048d5b0180f90174058d5bffeb038d5b0189d8c3") | |
loc_db = LocationDB() | |
myjit = Machine("x86_32").jitter(loc_db, sys.argv[1]) | |
int | run_addr = 0x40000000 |
eax = ExprId("RAX", 64)[:32] | |
imm0 | |
imm4 | |
imm4_64 | |
memdata = ExprMem(ExprInt(run_addr, 32), len(data) * 8) | |
def jitload.code_sentinelle | ( | jitter | ) |
jitload.data = decode_hex("8d49048d5b0180f90174058d5bffeb038d5b0189d8c3") |
jitload.eax = ExprId("RAX", 64)[:32] |
jitload.imm0 |
jitload.imm4 |
jitload.imm4_64 |
jitload.loc_db = LocationDB() |
int jitload.run_addr = 0x40000000 |