miasm
Reverse engineering framework
x86_64 Namespace Reference

Functions

def code_sentinelle (jitter)
 
def log_syscalls (jitter)
 

Variables

dictionary SYSCALL
 
 parser = ArgumentParser(description="x86 64 basic Jitter")
 
 help
 
 default
 
 action
 
 args = parser.parse_args()
 
 loc_db = LocationDB()
 
 myjit = Machine("x86_64").jitter(loc_db, args.jitter)
 
 data = f.read()
 
int run_addr = 0x40000000
 

Function Documentation

◆ code_sentinelle()

def x86_64.code_sentinelle (   jitter)

◆ log_syscalls()

def x86_64.log_syscalls (   jitter)

Variable Documentation

◆ action

x86_64.action

◆ args

x86_64.args = parser.parse_args()

◆ data

x86_64.data = f.read()

◆ default

x86_64.default

◆ help

x86_64.help

◆ loc_db

x86_64.loc_db = LocationDB()

◆ myjit

x86_64.myjit = Machine("x86_64").jitter(loc_db, args.jitter)

◆ parser

x86_64.parser = ArgumentParser(description="x86 64 basic Jitter")

◆ run_addr

int x86_64.run_addr = 0x40000000

◆ SYSCALL

dictionary x86_64.SYSCALL
Initial value:
1 = {
2  0: "read",
3  1: "write",
4  2: "open",
5  0x9: "mmap",
6  0x27: "getpid",
7  0x29: "socket",
8  0x2a: "connect",
9  0x2b: "accept",
10  0x2c: "sendto",
11  0x2d: "recvfrom",
12  0x31: "bind",
13  0x32: "listen",
14  0x33: "getsockname",
15  0x34: "getpeername",
16  0x3b: "execve",
17  0x3c: "exit",
18  0x3d: "wait4",
19  0x3e: "kill",
20  0x57: "unlink",
21  0x5a: "chmod",
22  0x5b: "fchmod",
23  0x5c: "chown"
24 }