miasm
Reverse engineering framework
single_instr.py File Reference

Namespaces

 single_instr
 

Variables

int single_instr.START_ADDR = 0
 
 single_instr.machine = Machine("x86_32")
 
 single_instr.line = machine.mn.fromstring("MOV EAX, EBX", loc_db, 32)
 Ensure that attributes 'offset' and 'l' are set. More...
 
 single_instr.asm = machine.mn.asm(line)[0]
 
 single_instr.cont = Container.from_string(asm, loc_db = loc_db)
 
 single_instr.mdis = machine.dis_engine(cont.bin_stream, loc_db=loc_db)
 
 single_instr.lines_wd
 
 single_instr.asm_block = mdis.dis_block(START_ADDR)
 
 single_instr.ira = machine.ira(mdis.loc_db)
 
 single_instr.ircfg = ira.new_ircfg()
 
 single_instr.symb = SymbolicExecutionEngine(ira)
 
 single_instr.cur_addr = symb.run_at(ircfg, START_ADDR)
 Emulation of several basic blocks can be done through .emul_ir_blocks. More...
 
 single_instr.mems
 
 single_instr.ids
 
 single_instr.eax
 
 single_instr.ebx