./security/py-miasm [reverse engineering framework in Python]
[+] Add this package to your ports tracker

[ CVSweb ] [ Homepage ] [ RSS feed ]

Version: 2.0.1.1, Package name: py-miasm-2.0.1.1
Maintained by: Remi Pointel
Master sites:
Description
Miasm is a free and open source reverse engineering framework. Miasm aims to
analyze / modify / generate binary programs. Here is a non exhaustive list of
features:
- Opening / modifying / generating PE / ELF 32 / 64 LE / BE using Elfesteem
- Assembling / Disassembling X86 / ARM / MIPS / SH4 / MSP430
- Representing assembly semantic using intermediate language
- Emulating using JIT (dynamic code analysis, unpacking, ...)
- Expression simplification for automatic de-obfuscation


Filesize: 978.647 KB
Version History (View Complete History)
  • (2019-01-26) Updated to version: py-miasm-2.0.1.1
  • (2018-06-27) Package added to openports.se, version py-miasm-2.0 (created)
[show/hide] View available PLISTS (Can be a lot of data)

CVS Commit History:

   2019-01-25 23:45:20 by Remi Pointel | Files touched by this commit (3)
Log message:
update miasm to latest release: 0.1.1.
ok benoit@.
   2019-01-25 23:45:20 by Remi Pointel | Files touched by this commit (3)
Log message:
update miasm to latest release: 0.1.1.
ok benoit@.
   2019-01-25 23:45:20 by Remi Pointel | Files touched by this commit (3)
Log message:
update miasm to latest release: 0.1.1.
ok benoit@.
   2018-07-01 13:13:59 by Stuart Henderson | Files touched by this commit (1)
Log message:
broken on i386 (and must be more besides - problem is uint128_t - but
I don't have a list of arches). ONLY_FOR_ARCHS might make more sense.