miasm
Reverse engineering framework
|
Variables | |
parser = Sandbox_Linux_arml.parser(description="ELF sandboxer") | |
help | |
options = parser.parse_args() | |
loc_db = LocationDB() | |
sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals()) | |
cont = Container.from_stream(fdesc, loc_db) | |
loc_key = cont.loc_db.get_name_location("md5_starts") | |
addr_to_call = cont.loc_db.get_location_offset(loc_key) | |
addr = linobjs.heap.alloc(sb.jitter, 0x64) | |
This example illustrate the Sandbox.call API, for direct call of a given function
sandbox_call.addr = linobjs.heap.alloc(sb.jitter, 0x64) |
sandbox_call.addr_to_call = cont.loc_db.get_location_offset(loc_key) |
sandbox_call.cont = Container.from_stream(fdesc, loc_db) |
sandbox_call.help |
sandbox_call.loc_db = LocationDB() |
sandbox_call.loc_key = cont.loc_db.get_name_location("md5_starts") |
sandbox_call.options = parser.parse_args() |
sandbox_call.parser = Sandbox_Linux_arml.parser(description="ELF sandboxer") |
sandbox_call.sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals()) |