miasm
Reverse engineering framework
jitload.py File Reference

Namespaces

 jitload
 

Functions

def jitload.code_sentinelle (jitter)
 

Variables

 jitload.data = decode_hex("8d49048d5b0180f90174058d5bffeb038d5b0189d8c3")
 
 jitload.loc_db = LocationDB()
 
 jitload.myjit = Machine("x86_32").jitter(loc_db, sys.argv[1])
 
int jitload.run_addr = 0x40000000
 
 jitload.eax = ExprId("RAX", 64)[:32]
 
 jitload.imm0
 
 jitload.imm4
 
 jitload.imm4_64
 
 jitload.memdata = ExprMem(ExprInt(run_addr, 32), len(data) * 8)