miasm
Reverse engineering framework
test_x86_32_seh Namespace Reference

Functions

def deal_exception_access_violation (jitter)
 
def deal_exception_breakpoint (jitter)
 
def deal_exception_div (jitter)
 
def deal_exception_privileged_instruction (jitter)
 
def deal_exception_illegal_instruction (jitter)
 
def deal_exception_single_step (jitter)
 
def return_from_seh (jitter)
 

Variables

 parser = Sandbox_Win_x86_32.parser(description="PE sandboxer")
 
 help
 
 options = parser.parse_args()
 
 usesegm
 
 use_windows_structs
 
 loc_db = LocationDB()
 
 sb = Sandbox_Win_x86_32(loc_db, options.filename, options, globals())
 

Function Documentation

◆ deal_exception_access_violation()

def test_x86_32_seh.deal_exception_access_violation (   jitter)

◆ deal_exception_breakpoint()

def test_x86_32_seh.deal_exception_breakpoint (   jitter)

◆ deal_exception_div()

def test_x86_32_seh.deal_exception_div (   jitter)

◆ deal_exception_illegal_instruction()

def test_x86_32_seh.deal_exception_illegal_instruction (   jitter)

◆ deal_exception_privileged_instruction()

def test_x86_32_seh.deal_exception_privileged_instruction (   jitter)

◆ deal_exception_single_step()

def test_x86_32_seh.deal_exception_single_step (   jitter)

◆ return_from_seh()

def test_x86_32_seh.return_from_seh (   jitter)

Variable Documentation

◆ help

test_x86_32_seh.help

◆ loc_db

test_x86_32_seh.loc_db = LocationDB()

◆ options

test_x86_32_seh.options = parser.parse_args()

◆ parser

test_x86_32_seh.parser = Sandbox_Win_x86_32.parser(description="PE sandboxer")

◆ sb

test_x86_32_seh.sb = Sandbox_Win_x86_32(loc_db, options.filename, options, globals())

◆ use_windows_structs

test_x86_32_seh.use_windows_structs

◆ usesegm

test_x86_32_seh.usesegm