miasm
Reverse engineering framework
|
Functions | |
def | parse_fmt (s) |
def | xxx___printf_chk (jitter) |
def | xxx_puts (jitter) |
Variables | |
stdout = stdout.buffer | |
int | nb_tests = 1 |
parser = Sandbox_Linux_x86_32.parser(description="ELF sandboxer") | |
help | |
options = parser.parse_args() | |
expected = open(options.expected) | |
loc_db = LocationDB() | |
sb = Sandbox_Linux_x86_32(loc_db, options.filename, options, globals()) | |
addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value | |
GS | |
def testqemu.parse_fmt | ( | s | ) |
def testqemu.xxx___printf_chk | ( | jitter | ) |
Tiny implementation of printf_chk
def testqemu.xxx_puts | ( | jitter | ) |
#include <stdio.h> int puts(const char *s); writes the string s and a trailing newline to stdout.
testqemu.addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value |
testqemu.expected = open(options.expected) |
testqemu.GS |
testqemu.help |
testqemu.loc_db = LocationDB() |
int testqemu.nb_tests = 1 |
testqemu.options = parser.parse_args() |
testqemu.parser = Sandbox_Linux_x86_32.parser(description="ELF sandboxer") |
testqemu.sb = Sandbox_Linux_x86_32(loc_db, options.filename, options, globals()) |
testqemu.stdout = stdout.buffer |