Miasm is a reverse engineering framework written in Python, focused on advanced binary analysis and code instrumentation.
You can install Miasm using pip:
pip install miasm
Miasm provides a range of functionalities for binary analysis, including:
-
Disassembly and Lifting:
miasm.arch.disasm.Disassembler: Disassemble a binary.miasm.ir.translators.Translator: Lift assembly to an intermediate representation (IR).
-
IR Manipulation:
miasm.ir.ir.IRBlock: Represent a basic block in the IR.miasm.ir.symbexec.SymbolicExecutionEngine: Perform symbolic execution on the IR.
-
Emulation and Taint Analysis:
miasm.jitter.jitcore.JitCore: Emulate the execution of a binary.miasm.expression.expre.ExpressionTree: Represent and manipulate expressions.miasm.analysis.data_flow.DataFlowGraph: Perform taint analysis on the IR.
-
Code Instrumentation:
miasm.core.asmblock.AsmBlock: Represent a basic block of assembly code.miasm.core.bin_stream.BinStream: Represent a stream of binary data.miasm.core.parse_asm.parse_txt: Parse assembly code.
-
Miscellaneous:
miasm.analysis.binary: Load and analyze a binary file.miasm.analysis.machine: Provide information about the target architecture.
For more detailed information and usage examples, please refer to the Miasm documentation: https://miasm.re/documentation.html