亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? elf.py

?? 無線通信的主要編程軟件,是無線通信工作人員的必備工具,關天相關教程我會在后續傳上.
?? PY
字號:
#!/usr/bin/env pythonimport struct# ELF object file reader# (C) 2003 cliechti@gmx.net# Python license#            size  alignment# Elf32_Addr    4  4  Unsigned program address# Elf32_Half    2  2  Unsigned medium integer# Elf32_Off     4  4  Unsigned file offset# Elf32_Sword   4  4  Signed large integer# Elf32_Word    4  4  Unsigned large integer# unsignedchar  1  1  Unsigned small integer#define EI_NIDENT 16#~ typedef struct{    #~ unsigned char e_ident[EI_NIDENT];    #~ Elf32_Half e_type;    #~ Elf32_Half e_machine;    #~ Elf32_Word e_version;    #~ Elf32_Addr e_entry;    #~ Elf32_Off  e_phoff;    #~ Elf32_Off  e_shoff;    #~ Elf32_Word e_flags;    #~ Elf32_Half e_ehsize;    #~ Elf32_Half e_phentsize;    #~ Elf32_Half e_phnum;    #~ Elf32_Half e_shentsize;    #~ Elf32_Half e_shnum;    #~ Elf32_Half e_shstrndx;#~ } Elf32_Ehdr;#Section Header#~ typedef struct {    #~ Elf32_Word sh_name;    #~ Elf32_Word sh_type;    #~ Elf32_Word sh_flags;    #~ Elf32_Addr sh_addr;    #~ Elf32_Off  sh_offset;    #~ Elf32_Word sh_size;    #~ Elf32_Word sh_link;    #~ Elf32_Word sh_info;    #~ Elf32_Word sh_addralign;    #~ Elf32_Word sh_entsize;#~ } Elf32_Shdr; #~ typedef struct {    #~ Elf32_Word p_type;    #~ Elf32_Off  p_offset;    #~ Elf32_Addr p_vaddr;    #~ Elf32_Addr p_paddr;    #~ Elf32_Word p_filesz;    #~ Elf32_Word p_memsz;    #~ Elf32_Word p_flags;    #~ Elf32_Word p_align;#~ } Elf32_Phdr;class ELFException(Exception): passclass ELFSection:    """read and store a section"""    Elf32_Shdr = "<IIIIIIIIII"          #header format        #section types    SHT_NULL        = 0    SHT_PROGBITS    = 1    SHT_SYMTAB      = 2    SHT_STRTAB      = 3    SHT_RELA        = 4    SHT_HASH        = 5    SHT_DYNAMIC     = 6    SHT_NOTE        = 7    SHT_NOBITS      = 8    SHT_REL         = 9    SHT_SHLIB       = 10    SHT_DYNSYM      = 11    SHT_LOPROC      = 0x70000000L    SHT_HIPROC      = 0x7fffffffL    SHT_LOUSER      = 0x80000000L    SHT_HIUSER      = 0xffffffffL    #section attribute flags    SHF_WRITE       = 0x1    SHF_ALLOC       = 0x2    SHF_EXECINSTR   = 0x4    SHF_MASKPROC    = 0xf0000000L    def __init__(self):        """creat a new empty section object"""        (self.sh_name, self.sh_type, self.sh_flags, self.sh_addr,         self.sh_offset, self.sh_size, self.sh_link, self.sh_info,         self.sh_addralign, self.sh_entsize) = [0]*10        self.name = None        self.data = None        self.lma =  None    def fromString(self, s):        """get section header from string"""        (self.sh_name, self.sh_type, self.sh_flags, self.sh_addr,         self.sh_offset, self.sh_size, self.sh_link, self.sh_info,         self.sh_addralign, self.sh_entsize) = struct.unpack(self.Elf32_Shdr, s)             def __str__(self):        """pretty print for debug..."""        return "%s(%s, sh_type=%s, sh_flags=%s, "\               "sh_addr=0x%04x, sh_offset=0x%04x, sh_size=%s, sh_link=%s, "\               "sh_info=%s, sh_addralign=%s, sh_entsize=%s, lma=0x%04x)" % (            self.__class__.__name__,            self.name is not None and "%r" % self.name or "sh_name=%s" % self.sh_name,            self.sh_type, self.sh_flags, self.sh_addr,            self.sh_offset, self.sh_size, self.sh_link, self.sh_info,            self.sh_addralign, self.sh_entsize, self.lma)class ELFProgramHeader:    """Store and parse a program header"""    Elf32_Phdr = "<IIIIIIII"            #header format        #segmet types    PT_NULL         = 0    PT_LOAD         = 1    PT_DYNAMIC      = 2    PT_INTERP       = 3    PT_NOTE         = 4    PT_SHLIB        = 5    PT_PHDR         = 6    PT_LOPROC       = 0x70000000L    PT_HIPROC       = 0x7fffffffL        #segment flags    PF_R            = 0x4       #segment is readable    PF_W            = 0x2       #segment is writable    PF_X            = 0x1       #segment is executable         def __init__(self):        """create a new, empty segment/program header"""        (self.p_type, self.p_offset, self.p_vaddr, self.p_paddr,            self.p_filesz, self.p_memsz, self.p_flags, self.p_align) = [0]*8        self.data = None    def fromString(self, s):        """parse header info from string"""        (self.p_type, self.p_offset, self.p_vaddr, self.p_paddr,            self.p_filesz, self.p_memsz, self.p_flags,            self.p_align) = struct.unpack(self.Elf32_Phdr, s)    def __str__(self):        """pretty print for debug..."""        return "%s(p_type=%s, p_offset=0x%04x, p_vaddr=0x%04x, p_paddr=0x%04x, "\            "p_filesz=%s, p_memsz=%s, p_flags=%s, "\            "p_align=%s)" % (            self.__class__.__name__,            self.p_type, self.p_offset, self.p_vaddr, self.p_paddr,            self.p_filesz, self.p_memsz, self.p_flags,            self.p_align)class ELFObject:    """Object to read and handle an LEF object file"""    #header information    Elf32_Ehdr = "<16sHHIIIIIHHHHHH"        #offsets within e_ident    EI_MAG0         = 0     #File identification    EI_MAG1         = 1     #File identification    EI_MAG2         = 2     #File identification    EI_MAG3         = 3     #File identification    EI_CLASS        = 4     #File class    EI_DATA         = 5     #Data encoding    EI_VERSION      = 6     #File version    EI_PAD          = 7     #Start of padding bytes    EI_NIDENT       = 16    #Size of e_ident[]    #elf file type flags    ET_NONE         = 0     #No file type    ET_REL          = 1     #Relocatable file    ET_EXEC         = 2     #Executable file    ET_DYN          = 3     #Shared object file    ET_CORE         = 4     #Core file    ET_LOPROC       = 0xff00 #Processor-specific    ET_HIPROC       = 0xffff #Processor-specific    #ELF format    ELFCLASSNONE    = 0     #Invalid class    ELFCLASS32      = 1     #32-bit objects    ELFCLASS64      = 2     #64-bit objects    #encoding    ELFDATANONE     = 0     #Invalid data encoding    ELFDATA2LSB     = 1     #See below    ELFDATA2MSB     = 2     #See below    def __init__(self):        """create a new elf object"""        (self.e_ident, self.e_type, self.e_machine, self.e_version,        self.e_entry, self.e_phoff, self.e_shoff,        self.e_flags, self.e_ehsize, self.e_phentsize, self.e_phnum,        self.e_shentsize, self.e_shnum, self.e_shstrndx) = [0]*14    def fromFile(self, fileobj):        """read all relevant data from fileobj.        the file must be seekable"""        #get file header        (self.e_ident, self.e_type, self.e_machine, self.e_version,        self.e_entry, self.e_phoff, self.e_shoff,        self.e_flags, self.e_ehsize, self.e_phentsize, self.e_phnum,        self.e_shentsize, self.e_shnum, self.e_shstrndx) = struct.unpack(            self.Elf32_Ehdr, fileobj.read(struct.calcsize(self.Elf32_Ehdr)))        #verify if its a known format and realy an ELF file        if self.e_ident[0:4]             != '\x7fELF' and\           self.e_ident[self.EI_CLASS]   != self.ELFCLASS32 and\           self.e_ident[self.EI_DATA]    != self.ELFDATA2LSB and\           self.e_ident[self.EI_VERSION] != 1:                raise ELFException("Not a valid ELF file")        #load programm headers        self.programmheaders = []        if self.e_phnum:            #load program headers            fileobj.seek(self.e_phoff)            for sectionnum in range(self.e_phnum):                shdr = (fileobj.read(self.e_phentsize) + '\0'* struct.calcsize(ELFProgramHeader.Elf32_Phdr))[0:struct.calcsize(ELFProgramHeader.Elf32_Phdr)]                psection = ELFProgramHeader()                psection.fromString(shdr)                if psection.p_offset:   #skip if section has invalid offset in file                    self.programmheaders.append(psection)            #~ #get the segment data from the file for each prg header            #~ for phdr in self.programmheaders:                #~ fileobj.seek(phdr.p_offset)                #~ phdr.data = fileobj.read(phdr.p_filesz)                #~ #pad if needed                #~ if phdr.p_filesz < phdr.p_memsz:                    #~ phdr.data = phdr.data + '\0' * (phdr.p_memsz-phdr.p_filesz)        #load sections        self.sections = []        fileobj.seek(self.e_shoff)        for sectionnum in range(self.e_shnum):            shdr = (fileobj.read(self.e_shentsize) + '\0'* struct.calcsize(ELFSection.Elf32_Shdr))[0:struct.calcsize(ELFSection.Elf32_Shdr)]            elfsection = ELFSection()            elfsection.fromString(shdr)            self.sections.append(elfsection)                #load data for all sections        for section in self.sections:            fileobj.seek(section.sh_offset)            data = fileobj.read(section.sh_size)            section.data = data            if section.sh_type == ELFSection.SHT_STRTAB:                section.values = data.split('\0')            section.lma = self.getLMA(section)                #get section names        for section in self.sections:            start = self.sections[self.e_shstrndx].data[section.sh_name:]            section.name = start.split('\0')[0]            def getSection(self, name):        """get section by name"""        for section in self.sections:            if section.name == '.text':                return section        def getProgrammableSections(self):        """get all program headers that are marked as executable and        have suitable attributes to be code"""        res = []        for p in self.programmheaders:            #~ print p            #~ if section.sh_flags & self.SHF_ALLOC and section.name not in ('.data', '.data1', '.bss'):            #~ if p.p_type == ELFProgramHeader.PT_LOAD:# and p.p_paddr == p.p_vaddr and p.p_flags & ELFProgramHeader.PF_X:            if p.p_type == ELFProgramHeader.PT_LOAD:                res.append(p)        return res    def getLMA(self, section):        #magic load memory address calculation ;-)        for p in self.programmheaders:            if (p.p_paddr != 0 and \                p.p_type == ELFProgramHeader.PT_LOAD and \                p.p_vaddr != p.p_paddr and \                p.p_vaddr <= section.sh_addr and \                (p.p_vaddr + p.p_memsz >= section.sh_addr + section.sh_size) \                    and (not (section.sh_flags & ELFSection.SHF_ALLOC and section.sh_type != ELFSection.SHT_NOBITS) \                    or  (p.p_offset <= section.sh_offset \                    and (p.p_offset + p.p_filesz >= section.sh_offset + section.sh_size)))):                return section.sh_addr + p.p_paddr - p.p_vaddr        return section.sh_addr    def getSections(self):        """get sections relevant for the application"""        res = []        for section in self.sections:            if section.sh_flags & ELFSection.SHF_ALLOC and section.sh_type != ELFSection.SHT_NOBITS:                res.append(section)        return res    def __str__(self):        """pretty print for debug..."""        return "%s(self.e_type=%r, self.e_machine=%r, self.e_version=%r, sections=%r)" % (            self.__class__.__name__,             self.e_type, self.e_machine, self.e_version,            [section.name for section in self.sections])if __name__ == '__main__':    print "This is only a module test!"    elf = ELFObject()    elf.fromFile(open("test.elf"))    if elf.e_type != ELFObject.ET_EXEC:        raise Exception("No executable")    print elf    #~ print repr(elf.getSection('.text').data)    #~ print [(s.name, hex(s.sh_addr)) for s in elf.getSections()]    print "-"*20    for p in elf.sections: print p    print "-"*20    for p in elf.getSections(): print p    print "-"*20    for p in elf.getProgrammableSections(): print p

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
国产麻豆精品在线观看| 亚洲一区二区综合| 国产伦精品一区二区三区免费| 337p亚洲精品色噜噜噜| 喷白浆一区二区| 日韩欧美亚洲一区二区| 韩国一区二区视频| 久久久国产午夜精品| 成人avav在线| 亚洲精品国产精品乱码不99| 日本精品免费观看高清观看| 三级亚洲高清视频| 精品美女被调教视频大全网站| 国产精品18久久久久| 国产精品青草久久| 欧美在线不卡视频| 奇米精品一区二区三区四区| 精品国产一区a| 成人一区在线观看| 亚洲六月丁香色婷婷综合久久 | 奇米四色…亚洲| www国产亚洲精品久久麻豆| 国产高清不卡二三区| 一区二区在线观看视频| 日韩欧美中文字幕公布| 成人a区在线观看| 亚洲一区在线播放| 2024国产精品视频| 欧美性猛交xxxx乱大交退制版| 蜜桃一区二区三区在线| 亚洲欧洲日本在线| 91精品国产黑色紧身裤美女| www.欧美日韩国产在线| 天天综合色天天综合色h| 久久精品人人做人人爽97| 色综合久久久久综合99| 日本最新不卡在线| 国产精品灌醉下药二区| 欧美一区二区三区免费观看视频| av动漫一区二区| 九九精品视频在线看| 亚洲欧美一区二区三区极速播放| 91精品国产乱| 91成人免费在线视频| 国产美女在线精品| 日产国产欧美视频一区精品| 亚洲三级电影网站| 久久久国产一区二区三区四区小说 | 91 com成人网| av不卡一区二区三区| 久久国产婷婷国产香蕉| 一区二区三区不卡在线观看| 中文字幕的久久| 日韩欧美中文字幕精品| 欧美久久久久久久久中文字幕| www.日本不卡| 国产不卡一区视频| 久久电影网站中文字幕| 偷拍与自拍一区| 一区二区三区四区激情 | 国产精品国产三级国产有无不卡 | 88在线观看91蜜桃国自产| 91丨九色丨国产丨porny| 国产麻豆日韩欧美久久| 精品亚洲porn| 日韩不卡一二三区| 亚洲成人综合视频| 亚洲卡通欧美制服中文| 中文字幕日韩精品一区| 国产精品久久久久久亚洲伦| 久久久精品中文字幕麻豆发布| 精品奇米国产一区二区三区| 欧美区视频在线观看| 欧美性色综合网| 欧洲激情一区二区| 在线视频国内自拍亚洲视频| 99这里只有精品| 99re这里都是精品| 97久久超碰精品国产| 9色porny自拍视频一区二区| 91视频你懂的| 色欧美日韩亚洲| 在线观看视频91| 欧美日韩国产在线观看| 欧美精品视频www在线观看| 欧美三级电影在线观看| 欧美精品 日韩| 欧美一卡2卡三卡4卡5免费| 欧美一区二区三区在线观看 | 中文字幕在线不卡视频| 亚洲视频你懂的| 一区二区在线观看视频| 性久久久久久久| 日韩av电影免费观看高清完整版| 日本欧美在线观看| 狠狠色综合播放一区二区| 国产老肥熟一区二区三区| 成人午夜av在线| 91影院在线观看| 欧美午夜一区二区| 欧美日韩免费一区二区三区视频| 欧美一区二区精品久久911| 日韩欧美一区电影| 国产丝袜美腿一区二区三区| 综合久久久久综合| 午夜免费久久看| 精品一区二区久久| 99久久精品免费看国产免费软件| 91国偷自产一区二区三区成为亚洲经典 | 美日韩黄色大片| 国产精品一区在线观看乱码| 91色乱码一区二区三区| 欧美日韩国产综合视频在线观看| 日韩免费成人网| 成人欧美一区二区三区在线播放| 亚洲风情在线资源站| 国产精品一区在线| 在线观看www91| 精品入口麻豆88视频| 亚洲六月丁香色婷婷综合久久| 日韩成人免费电影| 91日韩在线专区| 日韩欧美资源站| 亚洲人成小说网站色在线| 日韩高清欧美激情| 99精品欧美一区二区蜜桃免费 | av成人老司机| 日韩欧美国产精品| 一级做a爱片久久| 国产自产v一区二区三区c| 91国产成人在线| 久久久久久97三级| 五月婷婷欧美视频| 成人av手机在线观看| 日韩一区二区在线观看| 日韩美女精品在线| 国产乱码精品1区2区3区| 欧美日韩的一区二区| 国产精品看片你懂得| 美女高潮久久久| 欧美日韩精品一区二区天天拍小说 | 青草av.久久免费一区| 99精品久久久久久| 久久综合久久综合久久| 午夜精品免费在线观看| 99久久久久久| 欧美激情在线看| 国产在线麻豆精品观看| 91精品国产福利在线观看| 亚洲激情自拍视频| 本田岬高潮一区二区三区| 久久久99久久精品欧美| 麻豆精品精品国产自在97香蕉| 在线观看免费视频综合| 亚洲欧美怡红院| 成人免费视频视频在线观看免费| 精品国产免费久久| 美女性感视频久久| 欧美日韩小视频| 亚洲最大成人综合| 99久久精品免费看| 亚洲欧美影音先锋| av成人老司机| 亚洲欧美自拍偷拍色图| 99九九99九九九视频精品| 久久免费视频色| 国产一区二区三区美女| 欧美精品一区二区久久久| 日本伊人色综合网| 欧美一区二区三区精品| 免费人成网站在线观看欧美高清| 欧美日韩mp4| 视频一区二区不卡| 6080国产精品一区二区| 天堂蜜桃91精品| 日韩一区二区视频| 久久国产精品99精品国产| 欧美va亚洲va| 国产·精品毛片| 中文字幕一区二区不卡| www.亚洲精品| 一区二区三区免费观看| 欧美日韩在线不卡| 免费观看在线色综合| 日韩欧美一区中文| 黄色小说综合网站| 国产精品国产三级国产专播品爱网| 91在线高清观看| 亚洲线精品一区二区三区| 91精选在线观看| 国产在线麻豆精品观看| 国产精品超碰97尤物18| 欧美性猛交xxxx黑人交| 日韩影院在线观看| 精品国产免费一区二区三区四区 | 美国十次综合导航| 国产偷国产偷亚洲高清人白洁| 99久久99久久久精品齐齐| 亚洲bt欧美bt精品| 久久精品无码一区二区三区|