miasm
Reverse engineering framework
test_x86_32_seh.py File Reference

Namespaces

 test_x86_32_seh
 

Functions

def test_x86_32_seh.deal_exception_access_violation (jitter)
 
def test_x86_32_seh.deal_exception_breakpoint (jitter)
 
def test_x86_32_seh.deal_exception_div (jitter)
 
def test_x86_32_seh.deal_exception_privileged_instruction (jitter)
 
def test_x86_32_seh.deal_exception_illegal_instruction (jitter)
 
def test_x86_32_seh.deal_exception_single_step (jitter)
 
def test_x86_32_seh.return_from_seh (jitter)
 

Variables

 test_x86_32_seh.parser = Sandbox_Win_x86_32.parser(description="PE sandboxer")
 
 test_x86_32_seh.help
 
 test_x86_32_seh.options = parser.parse_args()
 
 test_x86_32_seh.usesegm
 
 test_x86_32_seh.use_windows_structs
 
 test_x86_32_seh.loc_db = LocationDB()
 
 test_x86_32_seh.sb = Sandbox_Win_x86_32(loc_db, options.filename, options, globals())