![]() |
miasm
Reverse engineering framework
|
Variables | |
| parser = Sandbox_Linux_arml.parser(description="ELF sandboxer") | |
| help | |
| options = parser.parse_args() | |
| loc_db = LocationDB() | |
| sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals()) | |
| cont = Container.from_stream(fdesc, loc_db) | |
| loc_key = cont.loc_db.get_name_location("md5_starts") | |
| addr_to_call = cont.loc_db.get_location_offset(loc_key) | |
| addr = linobjs.heap.alloc(sb.jitter, 0x64) | |
This example illustrate the Sandbox.call API, for direct call of a given function
| sandbox_call.addr = linobjs.heap.alloc(sb.jitter, 0x64) |
| sandbox_call.addr_to_call = cont.loc_db.get_location_offset(loc_key) |
| sandbox_call.cont = Container.from_stream(fdesc, loc_db) |
| sandbox_call.help |
| sandbox_call.loc_db = LocationDB() |
| sandbox_call.loc_key = cont.loc_db.get_name_location("md5_starts") |
| sandbox_call.options = parser.parse_args() |
| sandbox_call.parser = Sandbox_Linux_arml.parser(description="ELF sandboxer") |
| sandbox_call.sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals()) |