Closed Moneysac90 closed 6 months ago
This probably could be interesting for RTOS systems. If we detect an RTOS, the next step usually is to find the base address for further analysis.
A resource download function exists, there is just no button/interface for it yet. Right now for that purpose we use the Download-Logs funktion instead.
Will look into this. (Might also require some EMBA changes to what gets put and kept in the log-directory)
I think this issue would better fit in the EMBA backend. If needed please re-open it here https://github.com/e-m-b-a/emba/issues
When trying to reverse engineer a firmware image with ghidra or IDA Pro you often have to specify the base address in order to decompile the code correctly.
There are some tools that try to guess the correct base address. For example:
We could add such scripts as additionally checks and provide a separate tab/overview of the possible base addresses. Furthermore, it would be awesome if we could have a download button somewhere in Embark to download the extracted files. This simplifies the process of reverse engineering because you can directly analyze them with your favorite disassembler/decompiler.