-
Updated
Feb 14, 2022 - C++
disassembler
Here are 458 public repositories matching this topic...
-
Updated
Feb 16, 2022 - Java
-
Updated
Feb 16, 2022 - C++
-
Updated
Jan 29, 2022 - C
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
-
Updated
Feb 14, 2022 - JavaScript
-
Updated
Aug 31, 2021 - Python
-
Updated
Feb 15, 2022 - Python
It's currently always using mov rAX,[moffs] but if it fits in an i32, it's shorter to use mov rAX,[m] with a modrm byte.
The generated mov() methods would need to be updated. This is what the generated C# code looks like:
if (dst.Value == Register.RAX && Bitness == 64 && src.IsDisplacementOnly) {
code = Code.Mov_RAX_moffs64;An extra check would need to be adde
-
Updated
Feb 16, 2022 - OCaml
-
Updated
Jan 3, 2019 - Rust
-
Updated
Feb 16, 2022 - C#
-
Updated
Feb 13, 2022 - C
-
Updated
Dec 1, 2021 - C++
-
Updated
Dec 25, 2021 - Python
-
Updated
Dec 1, 2021 - C++
-
Updated
Feb 16, 2022 - C++
-
Updated
Sep 16, 2019 - C++
-
Updated
Jan 5, 2022 - C
-
Updated
Oct 22, 2021 - C
-
Updated
Feb 14, 2022 - Python
-
Updated
Apr 4, 2018
-
Updated
Jan 25, 2022 - C
-
Updated
Feb 19, 2021 - Python
pdgsd does not seem to process PUSH EBP very well, the p-code semantics show up as
(unique,0x12f0,4) = COPY EBP
ESP = INT_SUB ESP, 0x4
(unique,0x12f0,4) = STORE ram[ESP]
which doesn't make sense. Last line should be STORE ram[ESP] = (unique,0x12f0,4)
the raw p-code will show you:
STORE (const,0x55fef11636d0,8) (register,ESP,4) (unique,0x1b50,4)
and the
-
Updated
Feb 4, 2022 - C#
We should create a corpus of tests to verify that CFG recovery is accurate and complete, and there are no regressions.
Improve this page
Add a description, image, and links to the disassembler topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the disassembler topic, visit your repo's landing page and select "manage topics."

