Security News
Research
Data Theft Repackaged: A Case Study in Malicious Wrapper Packages on npm
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Map file parser library focusing decompilation projects.
This library is available for Python3 and Rust
See this package at https://pypi.org/project/mapfile_parser/.
The recommended way to install is using from the PyPi release, via pip
:
python3 -m pip install -U mapfile_parser
If you use a requirements.txt
file in your repository, then you can add
this library with the following line:
mapfile_parser>=2.7.1,<3.0.0
The unstable development version is located at the develop branch. PRs should be made into that branch instead of the main one.
The recommended way to install a locally cloned repo is by passing the -e
(editable) flag to pip
.
python3 -m pip install -e .
In case you want to mess with the latest development version without wanting to clone the repository, then you could use the following command:
python3 -m pip uninstall mapfile_parser
python3 -m pip install git+https://github.com/Decompollaborate/mapfile_parser.git@develop
NOTE: Installing the development version is not recommended unless you know what you are doing. Proceed at your own risk.
See this crate at https://crates.io/crates/mapfile_parser.
To add this library to your project using Cargo:
cargo add mapfile_parser
Or add the following line manually to your Cargo.toml
file:
mapfile_parser = "2.7.1"
This library follows Semantic Versioning. We try to always keep backwards compatibility, so no breaking changes should happen until a major release (i.e. jumping from 2.X.X to 3.0.0).
To see what changed on each release check either the CHANGELOG.md file or check the releases page on Github. You can also use this link to check the latest release.
Various cli examples are provided in the frontends folder. Most of them are re-implementations of already existing tools using this library to show how to use this library and inspire new ideas.
The list can be checked in runtime with python3 -m mapfile_parser --help
.
Each one of them can be executed with python3 -m mapfile_parser utilityname
,
for example python3 -m mapfile_parser pj64_syms
.
bss_check
: Check that globally visible bss has not been reordered.first_diff
: Find the first difference(s) between the built ROM and the base
ROM.jsonify
: Converts a mapfile into a json format.pj64_syms
: Produce a PJ64 compatible symbol map.progress
: Computes current progress of the matched functions. Relies on a
splat folder structure and each matched
functions no longer having an .s
file (i.e: delete the file after matching it).sym_info
: Display various information about a symbol or address.symbol_sizes_csv
: Produces a csv summarizing the files sizes by parsing a
map file.upload_frogress
: Uploads current progress (calculated by the progress
utility) of the matched functions to frogress.None of the provided cli utilities are meant to be used directly on a command line, because they need a large number of long parameters to them and every repo has their own quirks which would need them to be adapted. Those have been written mostly to facilitate people to write those utilities in a way which accomodates their own repo.
FAQs
Map file parser library focusing decompilation projects
We found that mapfile-parser demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Security News
Research
The Socket Research Team breaks down a malicious wrapper package that uses obfuscation to harvest credentials and exfiltrate sensitive data.
Research
Security News
Attackers used a malicious npm package typosquatting a popular ESLint plugin to steal sensitive data, execute commands, and exploit developer systems.
Security News
The Ultralytics' PyPI Package was compromised four times in one weekend through GitHub Actions cache poisoning and failure to rotate previously compromised API tokens.