Skip to content

Latest commit

 

History

History
39 lines (27 loc) · 1.47 KB

miasm.md

File metadata and controls

39 lines (27 loc) · 1.47 KB

Miasm: A Reverse Engineering Framework

Miasm is a reverse engineering framework written in Python, focused on advanced binary analysis and code instrumentation.

Installation

You can install Miasm using pip:

pip install miasm

Usage

Miasm provides a range of functionalities for binary analysis, including:

  1. Disassembly and Lifting:

    • miasm.arch.disasm.Disassembler: Disassemble a binary.
    • miasm.ir.translators.Translator: Lift assembly to an intermediate representation (IR).
  2. IR Manipulation:

    • miasm.ir.ir.IRBlock: Represent a basic block in the IR.
    • miasm.ir.symbexec.SymbolicExecutionEngine: Perform symbolic execution on the IR.
  3. Emulation and Taint Analysis:

    • miasm.jitter.jitcore.JitCore: Emulate the execution of a binary.
    • miasm.expression.expre.ExpressionTree: Represent and manipulate expressions.
    • miasm.analysis.data_flow.DataFlowGraph: Perform taint analysis on the IR.
  4. Code Instrumentation:

    • miasm.core.asmblock.AsmBlock: Represent a basic block of assembly code.
    • miasm.core.bin_stream.BinStream: Represent a stream of binary data.
    • miasm.core.parse_asm.parse_txt: Parse assembly code.
  5. Miscellaneous:

    • miasm.analysis.binary: Load and analyze a binary file.
    • miasm.analysis.machine: Provide information about the target architecture.

For more detailed information and usage examples, please refer to the Miasm documentation: https://miasm.re/documentation.html