Rizin
unix-like reverse engineering framework and cli tools
x86odd.py File Reference

Go to the source code of this file.

Namespaces

 x86odd
 

Functions

def x86odd.to_hex (s)
 
def x86odd.test_cs_disasm_quick ()
 

Variables

string x86odd.CODE32 = b"\xc0\xe0\x02"
 
string x86odd.CODE32_MEMREF = b"\x8b\x84\x91\x23\x01\x00\x00"
 
string x86odd.CODE64_MEMREF = b"\xa3\x0b\x00\x00\x0f\xbe\xc0\x48\x83"
 
string x86odd.CODE32_ARITH = b"\x83\xe0\xf7"
 
string x86odd.CODE64_ARITH = b"\x41\x83\xe0\xfa"
 
string x86odd.CODE32_IMM = b"\xc2\xb8\xc0"
 
int x86odd._python3 = 3
 
tuple x86odd.all_tests