![]() |
miasm
Reverse engineering framework
|
Variables | |
| loc_db = LocationDB() | |
| l = mn_x86.fromstring('MOV EAX, EBX', loc_db, 32) | |
| x = mn_x86.asm(l) | |
| y = mn_x86.asm(l) | |
| int | START_ADDR = 0 |
| machine = Machine("x86_32") | |
| line = machine.mn.fromstring("MOV EAX, EBX", loc_db, 32) | |
| Ensure that attributes 'offset' and 'l' are set. More... | |
| asm = machine.mn.asm(line)[0] | |
| cont = Container.from_string(asm, loc_db = loc_db) | |
| mdis = machine.dis_engine(cont.bin_stream, loc_db=loc_db) | |
| lines_wd | |
| asm_block = mdis.dis_block(START_ADDR) | |
| ira = machine.ira(mdis.loc_db) | |
| ircfg = ira.new_ircfg() | |
| symb = SymbolicExecutionEngine(ira) | |
| cur_addr = symb.run_at(ircfg, START_ADDR) | |
| Emulation of several basic blocks can be done through .emul_ir_blocks. More... | |
| mems | |
| ids | |
| eax | |
| ebx | |
| single_instr.asm = machine.mn.asm(line)[0] |
| single_instr.asm_block = mdis.dis_block(START_ADDR) |
| single_instr.cont = Container.from_string(asm, loc_db = loc_db) |
| single_instr.cur_addr = symb.run_at(ircfg, START_ADDR) |
Emulation of several basic blocks can be done through .emul_ir_blocks.
| single_instr.eax |
| single_instr.ebx |
| single_instr.ids |
| single_instr.ira = machine.ira(mdis.loc_db) |
| single_instr.ircfg = ira.new_ircfg() |
| single_instr.l = mn_x86.fromstring('MOV EAX, EBX', loc_db, 32) |
| single_instr.line = machine.mn.fromstring("MOV EAX, EBX", loc_db, 32) |
Ensure that attributes 'offset' and 'l' are set.
| single_instr.lines_wd |
| single_instr.loc_db = LocationDB() |
| single_instr.machine = Machine("x86_32") |
| single_instr.mems |
| int single_instr.START_ADDR = 0 |
| single_instr.symb = SymbolicExecutionEngine(ira) |
| single_instr.x = mn_x86.asm(l) |
| single_instr.y = mn_x86.asm(l) |