./security/py-miasm [reverse engineering framework in Python]
[+] Add this package to your ports tracker

[ CVSweb ] [ Homepage ] [ RSS feed ]

Version:, Package name: py-miasm-
Maintained by: Remi Pointel
Master sites:
Miasm is a free and open source reverse engineering framework. Miasm aims to
analyze / modify / generate binary programs. Here is a non exhaustive list of
- Opening / modifying / generating PE / ELF 32 / 64 LE / BE using Elfesteem
- Assembling / Disassembling X86 / ARM / MIPS / SH4 / MSP430
- Representing assembly semantic using intermediate language
- Emulating using JIT (dynamic code analysis, unpacking, ...)
- Expression simplification for automatic de-obfuscation

Filesize: 978.647 KB
Version History (View Complete History)
  • (2019-01-26) Updated to version: py-miasm-
  • (2018-06-27) Package added to openports.se, version py-miasm-2.0 (created)
[show/hide] View available PLISTS (Can be a lot of data)

CVS Commit History:

   2019-07-12 14:50:18 by Stuart Henderson | Files touched by this commit (845)
Log message:
   2019-05-15 06:04:43 by Kurt Mosiejczuk | Files touched by this commit (167)
Log message:
Add RUN_DEPENDS to TEST_DEPENDS automatically for ports using the
lang/python port module. I've not yet come up with a port that
would not need this and one can always set MODPY_TESTDEP to "no"
to prevent the module from touching TEST_DEPENDS.
Idea from afresh1 who pointed out the cpan module already does this.
aja "I support this move."
OK sthen@
   2019-01-25 23:45:20 by Remi Pointel | Files touched by this commit (3)
Log message:
update miasm to latest release: 0.1.1.
ok benoit@.
   2018-07-01 13:13:59 by Stuart Henderson | Files touched by this commit (1)
Log message:
broken on i386 (and must be more besides - problem is uint128_t - but
I don't have a list of arches). ONLY_FOR_ARCHS might make more sense.