![]() |
miasm
Reverse engineering framework
|
Functions | |
| def | code_sentinelle (jitter) |
Variables | |
| parser = ArgumentParser(description="x86 32 basic Jitter") | |
| help | |
| default | |
| args = parser.parse_args() | |
| loc_db = LocationDB() | |
| myjit = Machine("x86_32").jitter(loc_db, args.jitter) | |
| data = open(args.filename, 'rb').read() | |
| int | run_addr = 0x40000000 |
| def x86_32.code_sentinelle | ( | jitter | ) |
| x86_32.args = parser.parse_args() |
| x86_32.data = open(args.filename, 'rb').read() |
| x86_32.default |
| x86_32.help |
| x86_32.loc_db = LocationDB() |
| x86_32.parser = ArgumentParser(description="x86 32 basic Jitter") |
| int x86_32.run_addr = 0x40000000 |