miasm
Reverse engineering framework
|
Namespaces | |
single_instr | |
Variables | |
int | single_instr.START_ADDR = 0 |
single_instr.machine = Machine("x86_32") | |
single_instr.line = machine.mn.fromstring("MOV EAX, EBX", loc_db, 32) | |
Ensure that attributes 'offset' and 'l' are set. More... | |
single_instr.asm = machine.mn.asm(line)[0] | |
single_instr.cont = Container.from_string(asm, loc_db = loc_db) | |
single_instr.mdis = machine.dis_engine(cont.bin_stream, loc_db=loc_db) | |
single_instr.lines_wd | |
single_instr.asm_block = mdis.dis_block(START_ADDR) | |
single_instr.ira = machine.ira(mdis.loc_db) | |
single_instr.ircfg = ira.new_ircfg() | |
single_instr.symb = SymbolicExecutionEngine(ira) | |
single_instr.cur_addr = symb.run_at(ircfg, START_ADDR) | |
Emulation of several basic blocks can be done through .emul_ir_blocks. More... | |
single_instr.mems | |
single_instr.ids | |
single_instr.eax | |
single_instr.ebx | |