cq674350529 / deflat

use angr to deobfuscation
555 stars 109 forks source link

KeyError: 'bw' #11

Open kcufId opened 7 months ago

kcufId commented 7 months ago

First of all thank you very much for this tool. Some errors occurred during my use.

`KeyError:'bw',`

I used arm files, error stackclll: ins_b_jmp_hex_arm(), called: line(243), patch_value = ins_b_jmp_hex_arm(instr.address, children[0], bx_cond)

bx_cond = 'b' + instr.mnemonic[len('mov'):] Then I added a new print below: print('[x] b: {:#x}'.format(instr.address)) Then, the assembly corresponding to the address is: MOVW R2, #0xBA7B, How to deal with this?

cq674350529 commented 5 months ago

@kcufId Sorry for the later response. Can you provide more information? Such as how you run the script, and your binary if possible.