miasm
Reverse engineering framework
|
Functions | |
def | parse_fmt (s) |
def | xxx___printf_chk (jitter) |
def | xxx_puts (jitter) |
Variables | |
stdout = stdout.buffer | |
int | nb_tests = 1 |
parser = Sandbox_Linux_x86_64.parser(description="ELF sandboxer") | |
help | |
options = parser.parse_args() | |
expected = open(options.expected) | |
loc_db = LocationDB() | |
sb = Sandbox_Linux_x86_64(loc_db, options.filename, options, globals()) | |
addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value | |
FS | |
def testqemu64.parse_fmt | ( | s | ) |
def testqemu64.xxx___printf_chk | ( | jitter | ) |
Tiny implementation of printf_chk
def testqemu64.xxx_puts | ( | jitter | ) |
#include <stdio.h> int puts(const char *s); writes the string s and a trailing newline to stdout.
testqemu64.addr = sb.elf.getsectionbyname(".symtab")[options.funcname].value |
testqemu64.expected = open(options.expected) |
testqemu64.FS |
testqemu64.help |
testqemu64.loc_db = LocationDB() |
int testqemu64.nb_tests = 1 |
testqemu64.options = parser.parse_args() |
testqemu64.parser = Sandbox_Linux_x86_64.parser(description="ELF sandboxer") |
testqemu64.sb = Sandbox_Linux_x86_64(loc_db, options.filename, options, globals()) |
testqemu64.stdout = stdout.buffer |