miasm
Reverse engineering framework
|
Functions | |
def | code_sentinelle (jitter) |
Variables | |
parser = ArgumentParser(description="x86 32 basic Jitter") | |
help | |
default | |
args = parser.parse_args() | |
loc_db = LocationDB() | |
myjit = Machine("x86_32").jitter(loc_db, args.jitter) | |
data = open(args.filename, 'rb').read() | |
int | run_addr = 0x40000000 |
def x86_32.code_sentinelle | ( | jitter | ) |
x86_32.args = parser.parse_args() |
x86_32.data = open(args.filename, 'rb').read() |
x86_32.default |
x86_32.help |
x86_32.loc_db = LocationDB() |
x86_32.parser = ArgumentParser(description="x86 32 basic Jitter") |
int x86_32.run_addr = 0x40000000 |