qiling
qiling copied to clipboard
A True Instrumentable Binary Emulation Framework
***Describe the bug** When emulate asus-ac5300 firmware, Invalid instruction (UC_ERR_INSN_INVALID) occured, firmware download link: http://ftp.ufanet.ru/pub/firmware/Asus/RT-AC5300/RT-AC5300_3.0.0.4_380_7266-g6439257.trx **Sample Code** ```python PROJECT_ROOT="/opt/firmwares/asus" ql = Qiling([PROJECT_ROOT + "/usr/sbin/httpd"], PROJECT_ROOT, console=True, verbose=QL_VERBOSE.DEBUG) ql.run() ``` **Error**...
i just use upx to compress a elf ,which will call system(ls -alh) after running i can run it on linux normally but i run it with qiling, it will...
**Describe the bug** When saving a qiling state after having unmapped part of an MMIO region, the save fails with a `KeyError`. See the below script. **Sample Code** ```python import...
**Describe the bug** Mapping an MMIO region, then saving the qiling state and then restoring the qiling state causes an exception. See the script below. **Sample Code** ```python import qiling...
… lib_base ## Checklist ### Which kind of PR do you create? - [ x ] This PR only contains minor fixes. - [ ] This PR contains major feature...
This in fact implements timeclock interrupt for Qiling(Unicorn) and thus can be used in mcu and multithreaded. Still work in progress but any review is highly welcome.
I can use the function normally on x64 platform,but It would be wrong on android arm64. ``` Traceback (most recent call last): File "C:/Users/fa1con/EXE/IDA7.5/plugins/qilingida.py", line 818, in activate self.action_handler.ql_handle_menu_action(self.action_type) File...
***Describe the bug** I am trying to use the example provided for Tenda's router with its intented firmware by following the steps commented at the beginning of the script but...
**Describe the bug** When trying to emulate a `tftpd` binary from firmware, it seems that the thread stuck when set `multithread=True`. Here are some outputs. ``` ... // too many...
In pwntools, where a program is waiting for user input (via `fgets` or similar) an exploit might look like: ``` from pwn import * p = process("./vuln") nop_sled = asm(shellcraft.nop()...