miasm
Reverse engineering framework
|
Namespaces | |
x86_32 | |
Functions | |
def | x86_32.code_sentinelle (jitter) |
Variables | |
x86_32.parser = ArgumentParser(description="x86 32 basic Jitter") | |
x86_32.help | |
x86_32.default | |
x86_32.args = parser.parse_args() | |
x86_32.loc_db = LocationDB() | |
x86_32.myjit = Machine("x86_32").jitter(loc_db, args.jitter) | |
x86_32.data = open(args.filename, 'rb').read() | |
int | x86_32.run_addr = 0x40000000 |