miasm
Reverse engineering framework
sandbox_call.py File Reference

Namespaces

 sandbox_call
 

Variables

 sandbox_call.parser = Sandbox_Linux_arml.parser(description="ELF sandboxer")
 
 sandbox_call.help
 
 sandbox_call.options = parser.parse_args()
 
 sandbox_call.loc_db = LocationDB()
 
 sandbox_call.sb = Sandbox_Linux_arml(loc_db, options.filename, options, globals())
 
 sandbox_call.cont = Container.from_stream(fdesc, loc_db)
 
 sandbox_call.loc_key = cont.loc_db.get_name_location("md5_starts")
 
 sandbox_call.addr_to_call = cont.loc_db.get_location_offset(loc_key)
 
 sandbox_call.addr = linobjs.heap.alloc(sb.jitter, 0x64)