#!/usr/bin/env python
"""A tool for looking for indirect jumps and calls in x86 binaries.
Helpful to verify whether or not retpoline mitigations are catching
all of the indirect branches in a binary and telling you which
functions the remaining ones are in (assembly, etc).
Depends on llvm-objdump being in your path and is tied to the
dump format.
"""
# Look for indirect calls/jmps in a binary. re: (call|jmp).*\*
=
=
=
=
=
=
# TODO: Perhaps use cxxfilt to demangle functions?
return
# No options currently other than the binary.
=
=