miasm
Reverse engineering framework
|
Functions | |
def | code_sentinelle (jitter) |
def | log_syscalls (jitter) |
Variables | |
dictionary | SYSCALL |
parser = ArgumentParser(description="x86 64 basic Jitter") | |
help | |
default | |
action | |
args = parser.parse_args() | |
loc_db = LocationDB() | |
myjit = Machine("x86_64").jitter(loc_db, args.jitter) | |
data = f.read() | |
int | run_addr = 0x40000000 |
def x86_64.code_sentinelle | ( | jitter | ) |
def x86_64.log_syscalls | ( | jitter | ) |
x86_64.action |
x86_64.args = parser.parse_args() |
x86_64.data = f.read() |
x86_64.default |
x86_64.help |
x86_64.loc_db = LocationDB() |
x86_64.parser = ArgumentParser(description="x86 64 basic Jitter") |
int x86_64.run_addr = 0x40000000 |
dictionary x86_64.SYSCALL |