hexag00n
hexag00n copied to clipboard
Hexag00n: A collection of reverse engineering tools for the Qualcomm Digital Signal Proccesor (QDSP6)
Continuing the development of #4, with the CFG and [CG created](https://github.com/programa-stic/hexag00n/commit/3a4dcbf935d7e4d57711a52c6e0e9fd002fb472b) for the `factorial_example.elf`, the next step would be to execute REIL code between two functions (arbitrarily chosen for now),...
The translation for the Hexagon architecture is being developed in the [`reil`](https://github.com/programa-stic/hexag00n/tree/reil/hexagondisasm/reil) branch in order to use BARF's REIL analysis tools. As [first example](https://github.com/programa-stic/hexag00n/blob/reil/hexagondisasm/reil/translate-reil-generic.py) of this use, the [`factorial_example.elf`](https://github.com/programa-stic/hexag00n/blob/master/hexagondisasm/data/factorial_example.elf) binary...
As mentioned in issue #1, the data references feature in the IDA proc. module is causing IDA to misbehave, so it is disabled by default, which causes many data elements...