From e3efd4f5d2c3c9ff1e15193319569b55d225e38a Mon Sep 17 00:00:00 2001 From: Giulio De Pasquale Date: Sat, 8 Jul 2017 23:53:27 +0200 Subject: [PATCH] Commenti sistemati --- README.md | 2 +- vm/vm.cpp | 8 ++++---- 2 files changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 68be964..5c9b23b 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ Pasticciotto is a virtual machine which can be used to obfuscate code. It was de I wanted to experiment with VM obfuscation since it was a topic that caught my attention while reversing challenges for various CTFs. So, I decided to write one **from scratch** in order to understand better how instruction set architectures are implemented! -The design and the implementation behind Pasticciotto are not state-of-the-art but hey, it works! +The design and the implementation behind Pasticciotto are not state-of-the-art but hey, it works! :D # Why "Pasticciotto"? In Italian, "Pasticciotto" has two meanings! diff --git a/vm/vm.cpp b/vm/vm.cpp index 4ef3f11..6334aad 100644 --- a/vm/vm.cpp +++ b/vm/vm.cpp @@ -539,7 +539,7 @@ bool VM::execDIVR(void) { } bool VM::execSHLI(void) { /* - DIVI R0, 0x2 | R0 /= 2 + SHLI R0, 0x2 | R0 << 2 */ uint8_t dst; uint16_t src; @@ -555,7 +555,7 @@ bool VM::execSHLI(void) { } bool VM::execSHLR(void) { /* - SHLR R0, R1 -> R0 /= R1 + SHLR R0, R1 -> R0 << R1 */ uint8_t dst; uint8_t src; @@ -571,7 +571,7 @@ bool VM::execSHLR(void) { } bool VM::execSHRI(void) { /* - SHRI R0, 0x2 | R0 /= 2 + SHRI R0, 0x2 | R0 >> 2 */ uint8_t dst; uint16_t src; @@ -587,7 +587,7 @@ bool VM::execSHRI(void) { } bool VM::execSHRR(void) { /* - SHRR R0, R1 -> R0 /= R1 + SHRR R0, R1 -> R0 >> R1 */ uint8_t dst; uint8_t src;