Skip to content
#

reverse-engineering

Here are 1,597 public repositories matching this topic...

astrelsky
astrelsky commented Dec 3, 2019

Is your feature request related to a problem? Please describe.
In the current api documentation classes from external libraries are displayed with their full package name. This leaves the user to search for the documentation for the external library themselves for which they must also find the correct version number.

Describe the solution you'd like
It would be nice to have the extern

ITAYC0HEN
ITAYC0HEN commented Dec 17, 2019

Describe the bug

The dialog of edit-bytes doesn't respect multiple instructions. For example, 90909090 will only show as Unknown Instruction and not as nop; nop; nop; nop. And this is a simple example, the preview should handle more complicated byte sequences of multiple instructions.

![image](https://user-images.githubusercontent.com/20182642/70980750-7493b880-20bc-11ea-9c3a-f

sushi2k
sushi2k commented Aug 11, 2019

Describe the issue
Needle doesn't seem to be maintained anymore. The last update was > 1 year and no issues have been answered this year. It also doesnt' seem to work on iOS JB devices with Chimera. FSecureLABS/needle#273

We should review where we use Needle and if other tools are a better alternative (e.g. objection, passionfruit).

cnheitman
cnheitman commented Nov 27, 2019

There seems to be an issue with update_flags on some ARM instruction (at least for ADC and SBC). More precisely, Capstone reports update_flags as true when it should be false (according to ARM reference manual).

The following code snippet shows the issue:

from capstone import *
from capstone.arm import *

CODE = [
    b"\x03\x00\xa1\xe0", # adcal r0, r1, r3
    b"
JayFoxRox
JayFoxRox commented Sep 10, 2016

COPYING and README claim this is GPL, but it doesn't specify which version exactly? It looks like GPLv2, the question is: "GPLv2 only" or "GPLv2 or later"?
The current uc.c only contains a copyright where it's unclear wether that file also belongs to GPL'd code.
The source files or README should contain [the license text as per COPYING file](https://github.com/unicorn-engine/unicorn/blob/master/CO

reox
reox commented Oct 23, 2019

Does anyone uses the AST feature of thje decompiler, i.e. this one:

from pprint import pprint
from androguard.decompiler.dad.decompile import DvMethod
for method in dx.get_methods():
    if method.is_external():
        continue
    dv = DvMethod(method)
    dv.process(doAST=True)
    pprint(dv.get_ast())

I would really like to see a usecase for this and some code how it is ac

xx55x
xx55x commented Jul 24, 2019

Description

In pwndbg release 2017.02.01 build: 1ab3de0, when registers changed while debugging a program, there would be an asterisk near the changed register which could be customized with context-register-changed-marker and context-register-changed-color.

These config options are still available, however in later releases (both 2018.07.29 and 2019.01.25) there doesn't seem to be a

ghost
ghost commented Jul 9, 2016

Traceback (most recent call last):
...
File "../pyimports/miasm2/ir/ir.py", line 153, in add_instr
self.add_bloc(b, gen_pc_updt)
File "../pyimports/miasm2/ir/ir.py", line 233, in add_bloc
ir_bloc_cur, ir_blocs_extra = self.instr2ir(l)
File "../pyimports/miasm2/ir/ir.py", line 135, in instr2ir
ir_bloc_cur, ir_blocs_extra = self.get_ir(l)
File "../pyimports/miasm2/arch/x86/sem.py

Improve this page

Add a description, image, and links to the reverse-engineering topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the reverse-engineering topic, visit your repo's landing page and select "manage topics."

Learn more

You can’t perform that action at this time.