miasm
Reverse engineering framework
jitload Namespace Reference

Functions

def code_sentinelle (jitter)
 

Variables

 data = decode_hex("8d49048d5b0180f90174058d5bffeb038d5b0189d8c3")
 
 loc_db = LocationDB()
 
 myjit = Machine("x86_32").jitter(loc_db, sys.argv[1])
 
int run_addr = 0x40000000
 
 eax = ExprId("RAX", 64)[:32]
 
 imm0
 
 imm4
 
 imm4_64
 
 memdata = ExprMem(ExprInt(run_addr, 32), len(data) * 8)
 

Function Documentation

◆ code_sentinelle()

def jitload.code_sentinelle (   jitter)

Variable Documentation

◆ data

jitload.data = decode_hex("8d49048d5b0180f90174058d5bffeb038d5b0189d8c3")

◆ eax

jitload.eax = ExprId("RAX", 64)[:32]

◆ imm0

jitload.imm0

◆ imm4

jitload.imm4

◆ imm4_64

jitload.imm4_64

◆ loc_db

jitload.loc_db = LocationDB()

◆ memdata

jitload.memdata = ExprMem(ExprInt(run_addr, 32), len(data) * 8)

◆ myjit

jitload.myjit = Machine("x86_32").jitter(loc_db, sys.argv[1])

◆ run_addr

int jitload.run_addr = 0x40000000