diff options
Diffstat (limited to 'README.md')
| -rw-r--r-- | README.md | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/README.md b/README.md index 3f6c6690..5c518efd 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ [](https://travis-ci.org/cea-sec/miasm) -[](https://ci.appveyor.com/project/serpilliere/miasm-g9v6o/branch/master) +[](https://ci.appveyor.com/project/serpilliere/miasm-6lfba/branch/master) [](https://codeclimate.com/github/cea-sec/miasm) Reverse engineering framework in Python @@ -277,7 +277,7 @@ Symbolic execution Initializing the IR pool: ```pycon ->>> ira = machine.ira() +>>> ira = machine.ira(loc_db) >>> ircfg = ira.new_ircfg_from_asmcfg(asmcfg) ``` @@ -356,7 +356,7 @@ Retry execution with a concrete ECX. Here, the symbolic / concolic execution rea ```pycon >>> from miasm2.expression.expression import ExprInt ->>> sb.symbols[machine.mn.regs.ECX] = ExprInt(-3) +>>> sb.symbols[machine.mn.regs.ECX] = ExprInt(-3, 32) >>> symbolic_pc = sb.run_at(ircfg, 0, step=True) Instr LEA ECX, DWORD PTR [ECX + 0x4] Assignblk: |