simuvex
simuvex copied to clipboard
[DEPRECATED] A symbolic execution engine for the VEX IR
``` File "simuvex/plugins/symbolic_memory.py", line 941, in concrete_parts for k,v in self.mem.iteritems(): AttributeError: 'SimPagedMemory' object has no attribute 'iteritems' File "simuvex/plugins/symbolic_memory.py", line 953, in dbg_print for i, addr in enumerate(self.mem.iterkeys()): AttributeError:...
ptrace syscall now handles the PTRACE_TRACEME request
In angr, the calls into libc procedures such as atoi, strcmp, strlen, etc, are abstracted and simulated with expressions consisting of series of "if" and "else". Is this abstraction work...
The `_concretize` function in [concretization_strategies/single.py](https://github.com/angr/simuvex/blob/master/simuvex/concretization_strategies/single.py) checks for exactly 0 solutions instead of exactly 1 solution: Original: ``` def _concretize(self, memory, addr): addrs = self._eval(memory, addr, 2) if len(addrs) == 0:...
Hi! I'm trying to analyze a MIPS R3000 binary with angr. I load the binary with ``` b = angr.Project( filename, load_options={ 'auto_load_libs': True, 'except_missing_libs': True }, use_sim_procedures=False ) ```...
I have a simple program with one call to printf ``` int main(int argc, char *argv[]) { printf("Input: "); return 0; } ``` I then analyze this using a pathgroup...
Hi, analysing a project I encountered the following assembly instruction: ``` 0x901e774: or ah, 0x10 ``` This was translated into: ``` 09 | ------ IMark(0x901e774, 3, 0) ------ 10 |...
Hi I'm trying to install angr on windows but i had the following error ```Warning: not all DLLs were found! This build is not appropriate for a binary distribution```. Any...
I used pathgroup.explorer() to explore paths in Aeon which was reported as vulnerable before in several vulnerability databases(Advisory ID: CVE-2005-1019). I noticed it stuck in a fgets() in the third...
Simuvex fails on this instruction: ``` 64 67 a1 00 00 addr16 mov %fs:0x0,%eax ``` The problem is in `simuvex/engines/vex/ccall.py`, in the `x86g_use_seg_selector` function: ```python # GDT access gdt_value =...