Awesome
An MSP430 emulator for microcorruption
This is intended to run the microcorruption CTF (https://microcorruption.com/)
Tested with levels 18 and 19.
See example.py for example usage. Note that the interrupt function
is coded for level 19. In other levels, the arguments shouldn't be popped from the
stack at the end of the do_int_0x10
function.
The microcorruption-gdbserver crate contains a gdbserver, you need gdb-msp430
to use it.
See install instructions @ https://github.com/cemeyer/msp430-emu-uctf.
Note that unlike msp430-emu-ctf, this gdbserver doesn't currently implement int 0x10 (and
probably some other features, too.)