![]() |
miasm
Reverse engineering framework
|
Classes | |
| class | ESETrackMemory |
Functions | |
| def | instr_hook (jitter) |
Variables | |
| int | instr_count = 0 |
| parser = Sandbox_Linux_arml.parser(description="Tracer") | |
| help | |
| options = parser.parse_args() | |
| SymbExecClass | |
| jitter | |
| loc_db = LocationDB() | |
| sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals()) | |
| jit_maxline | |
| max_exec_per_call | |
| exec_cb | |
| start_time = time.time() | |
| stop_time = time.time() | |
This example demonstrates two instrumentation possibility: - instrumentation executed at each instruction - instrumentation on jitter behavior (here, memory tracking) Note: for better performance, one can also extend Codegen to produce instrumentation at the C / LLVM level
| def trace.instr_hook | ( | jitter | ) |
| trace.exec_cb |
| trace.help |
| int trace.instr_count = 0 |
| trace.jit_maxline |
| trace.jitter |
| trace.loc_db = LocationDB() |
| trace.max_exec_per_call |
| trace.options = parser.parse_args() |
| trace.parser = Sandbox_Linux_arml.parser(description="Tracer") |
| trace.sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals()) |
| trace.start_time = time.time() |
| trace.stop_time = time.time() |
| trace.SymbExecClass |