miasm
Reverse engineering framework
|
Namespaces | |
jitload | |
Functions | |
def | jitload.code_sentinelle (jitter) |
Variables | |
jitload.data = decode_hex("8d49048d5b0180f90174058d5bffeb038d5b0189d8c3") | |
jitload.loc_db = LocationDB() | |
jitload.myjit = Machine("x86_32").jitter(loc_db, sys.argv[1]) | |
int | jitload.run_addr = 0x40000000 |
jitload.eax = ExprId("RAX", 64)[:32] | |
jitload.imm0 | |
jitload.imm4 | |
jitload.imm4_64 | |
jitload.memdata = ExprMem(ExprInt(run_addr, 32), len(data) * 8) | |