miasm
Reverse engineering framework
|
Classes | |
class | ESETrackMemory |
Functions | |
def | instr_hook (jitter) |
Variables | |
int | instr_count = 0 |
parser = Sandbox_Linux_arml.parser(description="Tracer") | |
help | |
options = parser.parse_args() | |
SymbExecClass | |
jitter | |
loc_db = LocationDB() | |
sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals()) | |
jit_maxline | |
max_exec_per_call | |
exec_cb | |
start_time = time.time() | |
stop_time = time.time() | |
This example demonstrates two instrumentation possibility: - instrumentation executed at each instruction - instrumentation on jitter behavior (here, memory tracking) Note: for better performance, one can also extend Codegen to produce instrumentation at the C / LLVM level
def trace.instr_hook | ( | jitter | ) |
trace.exec_cb |
trace.help |
int trace.instr_count = 0 |
trace.jit_maxline |
trace.jitter |
trace.loc_db = LocationDB() |
trace.max_exec_per_call |
trace.options = parser.parse_args() |
trace.parser = Sandbox_Linux_arml.parser(description="Tracer") |
trace.sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals()) |
trace.start_time = time.time() |
trace.stop_time = time.time() |
trace.SymbExecClass |