miasm
Reverse engineering framework
x86_64.py File Reference

Namespaces

 x86_64
 

Functions

def x86_64.code_sentinelle (jitter)
 
def x86_64.log_syscalls (jitter)
 

Variables

dictionary x86_64.SYSCALL
 
 x86_64.parser = ArgumentParser(description="x86 64 basic Jitter")
 
 x86_64.help
 
 x86_64.default
 
 x86_64.action
 
 x86_64.args = parser.parse_args()
 
 x86_64.loc_db = LocationDB()
 
 x86_64.myjit = Machine("x86_64").jitter(loc_db, args.jitter)
 
 x86_64.data = f.read()
 
int x86_64.run_addr = 0x40000000