The depthcharge.executor module provides
implementations responsible for executing code. Currently, this is limited to the use of the
console command by way of the
However, this module is intended of accommodate future additions, such as:
Support for automatically wrapping payloads with image headers and executing them with
boot*family of console commands.
Memory corruption exploitation and shellcode helper functions.
Abstract base class for
Operationimplementations that facilitate arbitrary code execution on the target device.
execute_at(address: int, *args, **kwargs)¶
Instruct the target to execute instructions at the specified address.
Any additional positional and keyword arguments are passed to the underlying
Note: This method does not perform any pre-requisite validation before attempting to begin execution. Use the
Depthcharge.execute_payload()method when executing built-in payloads.