diff options
| -rw-r--r-- | README.md | 36 |
1 files changed, 18 insertions, 18 deletions
diff --git a/README.md b/README.md index abbdcf34..8c03635a 100644 --- a/README.md +++ b/README.md @@ -7,9 +7,25 @@ <img src="doc/logo_miasm.png"> </p> -Reverse engineering framework in Python -**Table of Contents** +What is Miasm? +============== + +Miasm is a free and open source (GPLv2) reverse engineering framework. +Miasm aims to analyze / modify / generate binary programs. Here is +a non exhaustive list of features: + +* Opening / modifying / generating PE / ELF 32 / 64 LE / BE +* Assembling / Disassembling X86 / ARM / MIPS / SH4 / MSP430 +* Representing assembly semantic using intermediate language +* Emulating using JIT (dynamic code analysis, unpacking, ...) +* Expression simplification for automatic de-obfuscation +* ... + +See the official [blog](http://miasm.re) for more examples and demos. + +Table of Contents +================= - [What is Miasm?](#user-content-what-is-miasm) - [Basic examples](#user-content-basic-examples) @@ -28,22 +44,6 @@ Reverse engineering framework in Python - [Misc](#user-content-misc) -What is Miasm? -============== - -Miasm is a free and open source (GPLv2) reverse engineering framework. -Miasm aims to analyze / modify / generate binary programs. Here is -a non exhaustive list of features: - -* Opening / modifying / generating PE / ELF 32 / 64 LE / BE -* Assembling / Disassembling X86 / ARM / MIPS / SH4 / MSP430 -* Representing assembly semantic using intermediate language -* Emulating using JIT (dynamic code analysis, unpacking, ...) -* Expression simplification for automatic de-obfuscation -* ... - -See the official [blog](http://miasm.re) for more examples and demos. - Basic examples ============== |