miasm
Reverse engineering framework
x86_32.py File Reference

Namespaces

 x86_32
 

Functions

def x86_32.code_sentinelle (jitter)
 

Variables

 x86_32.parser = ArgumentParser(description="x86 32 basic Jitter")
 
 x86_32.help
 
 x86_32.default
 
 x86_32.args = parser.parse_args()
 
 x86_32.loc_db = LocationDB()
 
 x86_32.myjit = Machine("x86_32").jitter(loc_db, args.jitter)
 
 x86_32.data = open(args.filename, 'rb').read()
 
int x86_32.run_addr = 0x40000000