Miasm is a reverse engineering framework written in Python, focused on advanced binary analysis and code instrumentation.
You can install Miasm using pip:
pip install miasm
Miasm provides a range of functionalities for binary analysis, including:
-
Disassembly and Lifting:
miasm.arch.disasm.Disassembler
: Disassemble a binary.miasm.ir.translators.Translator
: Lift assembly to an intermediate representation (IR).
-
IR Manipulation:
miasm.ir.ir.IRBlock
: Represent a basic block in the IR.miasm.ir.symbexec.SymbolicExecutionEngine
: Perform symbolic execution on the IR.
-
Emulation and Taint Analysis:
miasm.jitter.jitcore.JitCore
: Emulate the execution of a binary.miasm.expression.expre.ExpressionTree
: Represent and manipulate expressions.miasm.analysis.data_flow.DataFlowGraph
: Perform taint analysis on the IR.
-
Code Instrumentation:
miasm.core.asmblock.AsmBlock
: Represent a basic block of assembly code.miasm.core.bin_stream.BinStream
: Represent a stream of binary data.miasm.core.parse_asm.parse_txt
: Parse assembly code.
-
Miscellaneous:
miasm.analysis.binary
: Load and analyze a binary file.miasm.analysis.machine
: Provide information about the target architecture.
For more detailed information and usage examples, please refer to the Miasm documentation: https://miasm.re/documentation.html