capstone/cstool
david942j b227acc29c New architecture: BPF (#1388)
* Basic changes of new arch - BPF

* Define some constants

* defined some API methods

* Able to print MISC instruction

* Follow Linux coding style

* Ability to show ALU insn names

* decode return

* Add suite/MC/BPF

* decode jump

* decode store

* decode load

* print instruction done

* try to implement BPF_reg_access

* Implements explicit accessed registers and fix some tiny bugs

* Fix unhandled ja case

* Added BPF_REG_OFF do fix wrong display in jump class

* Great I'm able to decode cBPF with eyes

* Fix: misunderstood the 16-byte instruction's imm

* Add ldxdw

* Add extended-all.cs

* Implements cstest/bpf_getdetail.c

* Fix memory leak

* Add BPF to fuzz

* Implemented regs_read and regs_write

* Fix missing write-access on ALU's dst

* Updated cstool/, test_basic.c, test_detail.c, and test_iter.c

* Updated docs

* Fix type of cs_bpf#operands

* Implements python bindings

* Fix some bugs found by self code review

* Remove dummy tests

* remove typeof

* Address comments

* Fix MSVC's warnings and add test_bpf.py to bindings/python/Makefile

* Fix: call is not offset
2019-02-18 17:39:51 +08:00
..
Makefile cstool: move code from getopt.h to getopt.c 2019-02-03 14:34:20 +08:00
README merge next to master 2018-07-20 12:36:50 +08:00
cstool.c New architecture: BPF (#1388) 2019-02-18 17:39:51 +08:00
cstool_arm.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_arm64.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_bpf.c New architecture: BPF (#1388) 2019-02-18 17:39:51 +08:00
cstool_evm.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_m68k.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_m680x.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_mips.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_mos65xx.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_ppc.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_sparc.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_systemz.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_tms320c64x.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_wasm.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_x86.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
cstool_xcore.c wasm: silence some compilation warnings 2019-02-02 00:13:52 +08:00
getopt.c cstool: move code from getopt.h to getopt.c 2019-02-03 14:34:20 +08:00
getopt.h cstool: move code from getopt.h to getopt.c 2019-02-03 14:34:20 +08:00

README

This directory contains cstool of Capstone Engine.

Cstool is a command-line tool to disassemble assembly hex-string.
For example, to decode a hexcode string for Intel 32bit, run:

	$ cstool x32 "90 91"

	0	90	nop
	1	91	xchg	eax, ecx

Cstool disassembles the input and prints out the assembly instructions.
On each line, the first column is the instruction offset, the second
column is opcodes, and the rest is the instruction itself.

Cstool is flexible enough to accept all kind of hexcode format. The following
inputs have the same output with the example above.

	$ cstool x32 "0x90 0x91"
	$ cstool x32 "\x90\x91"
	$ cstool x32 "90,91"
	$ cstool x32 "90;91"
	$ cstool x32 "90+91"
	$ cstool x32 "90:91"

To print out instruction details, run Cstool with -d option, like below.

	$ cstool -d x32 "01 d8"
	0  01d8                              add	eax, ebx
	Prefix:0x00 0x00 0x00 0x00
	Opcode:0x01 0x00 0x00 0x00
	rex: 0x0
	addr_size: 4
	modrm: 0xd8
	disp: 0x0
	sib: 0x0
	op_count: 2
		operands[0].type: REG = eax
		operands[0].size: 4
		operands[0].access: READ | WRITE
		operands[1].type: REG = ebx
		operands[1].size: 4
		operands[1].access: READ
		Registers read: eax ebx
	Registers modified: eflags eax
	EFLAGS: MOD_AF MOD_CF MOD_SF MOD_ZF MOD_PF MOD_OF

To see all the supported options, run ./cstool