miasm
Reverse engineering framework
|
Namespaces | |
test_x86_32_seh | |
Functions | |
def | test_x86_32_seh.deal_exception_access_violation (jitter) |
def | test_x86_32_seh.deal_exception_breakpoint (jitter) |
def | test_x86_32_seh.deal_exception_div (jitter) |
def | test_x86_32_seh.deal_exception_privileged_instruction (jitter) |
def | test_x86_32_seh.deal_exception_illegal_instruction (jitter) |
def | test_x86_32_seh.deal_exception_single_step (jitter) |
def | test_x86_32_seh.return_from_seh (jitter) |
Variables | |
test_x86_32_seh.parser = Sandbox_Win_x86_32.parser(description="PE sandboxer") | |
test_x86_32_seh.help | |
test_x86_32_seh.options = parser.parse_args() | |
test_x86_32_seh.usesegm | |
test_x86_32_seh.use_windows_structs | |
test_x86_32_seh.loc_db = LocationDB() | |
test_x86_32_seh.sb = Sandbox_Win_x86_32(loc_db, options.filename, options, globals()) | |