Reverse Engineering Asked by Greg Doe on September 30, 2021
I’m trying to extract the callee arguments in my intel x86 binary using IDA Pro 7.3. I tried the following line:
ida_typeinf.get_arg_addrs(call_address) # call address points at `call some_func`
For some reason, the call always returns None
. Is there any other way to do this?
I have found out that if in the disassembler you give the type to the function that is being called, then the ida python function will work as it should.
Answered by Greg Doe on September 30, 2021
Get help from others!
Recent Answers
Recent Questions
© 2024 TransWikia.com. All rights reserved. Sites we Love: PCI Database, UKBizDB, Menu Kuliner, Sharing RPP