miasm
Reverse engineering framework
sandbox_call Namespace Reference

Variables

 parser = Sandbox_Linux_arml.parser(description="ELF sandboxer")
 
 help
 
 options = parser.parse_args()
 
 loc_db = LocationDB()
 
 sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals())
 
 cont = Container.from_stream(fdesc, loc_db)
 
 loc_key = cont.loc_db.get_name_location("md5_starts")
 
 addr_to_call = cont.loc_db.get_location_offset(loc_key)
 
 addr = linobjs.heap.alloc(sb.jitter, 0x64)
 

Detailed Description

This example illustrate the Sandbox.call API, for direct call of a given
function

Variable Documentation

◆ addr

sandbox_call.addr = linobjs.heap.alloc(sb.jitter, 0x64)

◆ addr_to_call

sandbox_call.addr_to_call = cont.loc_db.get_location_offset(loc_key)

◆ cont

sandbox_call.cont = Container.from_stream(fdesc, loc_db)

◆ help

sandbox_call.help

◆ loc_db

sandbox_call.loc_db = LocationDB()

◆ loc_key

sandbox_call.loc_key = cont.loc_db.get_name_location("md5_starts")

◆ options

sandbox_call.options = parser.parse_args()

◆ parser

sandbox_call.parser = Sandbox_Linux_arml.parser(description="ELF sandboxer")

◆ sb

sandbox_call.sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals())