miasm
Reverse engineering framework
|
Functions | |
def | deal_exception_access_violation (jitter) |
def | deal_exception_breakpoint (jitter) |
def | deal_exception_div (jitter) |
def | deal_exception_privileged_instruction (jitter) |
def | deal_exception_illegal_instruction (jitter) |
def | deal_exception_single_step (jitter) |
def | return_from_seh (jitter) |
Variables | |
parser = Sandbox_Win_x86_32.parser(description="PE sandboxer") | |
help | |
options = parser.parse_args() | |
usesegm | |
use_windows_structs | |
loc_db = LocationDB() | |
sb = Sandbox_Win_x86_32(loc_db, options.filename, options, globals()) | |
def test_x86_32_seh.deal_exception_access_violation | ( | jitter | ) |
def test_x86_32_seh.deal_exception_breakpoint | ( | jitter | ) |
def test_x86_32_seh.deal_exception_div | ( | jitter | ) |
def test_x86_32_seh.deal_exception_illegal_instruction | ( | jitter | ) |
def test_x86_32_seh.deal_exception_privileged_instruction | ( | jitter | ) |
def test_x86_32_seh.deal_exception_single_step | ( | jitter | ) |
def test_x86_32_seh.return_from_seh | ( | jitter | ) |
test_x86_32_seh.help |
test_x86_32_seh.loc_db = LocationDB() |
test_x86_32_seh.options = parser.parse_args() |
test_x86_32_seh.parser = Sandbox_Win_x86_32.parser(description="PE sandboxer") |
test_x86_32_seh.sb = Sandbox_Win_x86_32(loc_db, options.filename, options, globals()) |
test_x86_32_seh.use_windows_structs |
test_x86_32_seh.usesegm |