Steward
分享是一種喜悅、更是一種幸福
逆向工程 - IDA Pro - IDC - x86 - Mnemonics、Operand
參考資訊:
https://versprite.com/blog/security-research/how-to-use-idapython-to-automate-reverse-engineering/
main.idc
#include <idc.idc>
static main() {
auto addr = 0x1012484;
// ex: mov edi, ds:GetModuleHandleA
Message("Mnem: %s\n", GetMnem(addr));
Message("Opnd-0: %s\n", GetOpnd(addr, 0));
Message("Opnd-1: %s\n", GetOpnd(addr, 1));
}