![]() |
miasm
Reverse engineering framework
|
Functions | |
| def | code_sentinelle (jitter) |
Variables | |
| data = decode_hex("8d49048d5b0180f90174058d5bffeb038d5b0189d8c3") | |
| loc_db = LocationDB() | |
| myjit = Machine("x86_32").jitter(loc_db, sys.argv[1]) | |
| int | run_addr = 0x40000000 |
| eax = ExprId("RAX", 64)[:32] | |
| imm0 | |
| imm4 | |
| imm4_64 | |
| memdata = ExprMem(ExprInt(run_addr, 32), len(data) * 8) | |
| def jitload.code_sentinelle | ( | jitter | ) |
| jitload.data = decode_hex("8d49048d5b0180f90174058d5bffeb038d5b0189d8c3") |
| jitload.eax = ExprId("RAX", 64)[:32] |
| jitload.imm0 |
| jitload.imm4 |
| jitload.imm4_64 |
| jitload.loc_db = LocationDB() |
| int jitload.run_addr = 0x40000000 |