qiling


Nameqiling JSON
Version 1.4.6 PyPI version JSON
download
home_pagehttp://qiling.io
SummaryQiling is an advanced binary emulation framework that cross-platform-architecture
upload_time2023-08-04 02:51:11
maintainerKaiJern Lau (xwings)
docs_urlNone
author
requires_python
licenseGPLv2
keywords qiling binary emulator framework malware analysis uefi iot
VCS
bugtrack_url
requirements No requirements were recorded.
Travis-CI No Travis.
coveralls test coverage No coveralls.
            [![Documentation Status](https://readthedocs.org/projects/qilingframework/badge/?version=latest)](https://docs.qiling.io)
[![Downloads](https://pepy.tech/badge/qiling)](https://pepy.tech/project/qiling)
[![Chat on Telegram](https://img.shields.io/badge/Chat%20on-Telegram-brightgreen.svg)](https://t.me/qilingframework)

---

<p align="center">
<img width="150" height="150" src="https://raw.githubusercontent.com/qilingframework/qiling/master/docs/qiling2_logo_small.png">
</p>

[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134)

Qiling is an advanced binary emulation framework, with the following features:

- Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine
- Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC
- Support multiple file formats: PE, MachO, ELF, COM, MBR
- Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/)
- Emulates & sandbox code in an isolated environment
- Provides a fully configurable sandbox
- Provides in-depth memory, register, OS level and filesystem level API
- Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc)
- Provides virtual machine level API such as save and restore current execution state
- Supports cross architecture and platform debugging capabilities
- Built-in debugger with reverse debugging capability
- Allows dynamic hotpatch on-the-fly running code, including the loaded library
- True framework in Python, making it easy to build customized security analysis tools on top

Qiling also made its way to various international conferences.

2022:
- [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553)
- [Black Hat, MEA](https://blackhatmea.com/node/724)

2021:
- [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119)
- [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/)
- [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643)

2020:
- [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781)
- [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062)
- [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009)
- [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245)
- [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/)
- [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/)
- [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/)
- [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php)
    
2019:

- [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing)
- [Hitcon](https://hitcon.org/2019/CMT/agenda)
- [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/)


Qiling is backed by [Unicorn engine](http://www.unicorn-engine.org).

Visit our website https://www.qiling.io for more information.

---
#### License

This project is released and distributed under [free software license GPLv2](https://github.com/qilingframework/qiling/blob/master/COPYING) and later version.

---

#### Qiling vs other Emulators

There are many open source emulators, but two projects closest to Qiling are [Unicorn](http://www.unicorn-engine.org) & [Qemu usermode](https://qemu.org). This section explains the main differences of Qiling against them.

##### Qiling vs Unicorn engine

Built on top of Unicorn, but Qiling & Unicorn are two different animals.

- Unicorn is just a CPU emulator, so it focuses on emulating CPU instructions, that can understand emulator memory. Beyond that, Unicorn is not aware of higher level concepts, such as dynamic libraries, system calls, I/O handling or executable formats like PE, MachO or ELF. As a result, Unicorn can only emulate raw machine instructions, without Operating System (OS) context
- Qiling is designed as a higher level framework, that leverages Unicorn to emulate CPU instructions, but can understand OS: it has executable format loaders (for PE, MachO & ELF at the moment), dynamic linkers (so we can load & relocate shared libraries), syscall & IO handlers. For this reason, Qiling can run executable binary without requiring its native OS

##### Qiling vs Qemu usermode

Qemu usermode does similar thing to our emulator, that is to emulate whole executable binaries in cross-architecture way. However, Qiling offers some important differences against Qemu usermode.

- Qiling is a true analysis framework, that allows you to build your own dynamic analysis tools on top (in friendly Python language). Meanwhile, Qemu is just a tool, not a framework
- Qiling can perform dynamic instrumentation, and can even hotpatch code at runtime. Qemu does not do either
- Not only working cross-architecture, Qiling is also cross-platform, so for example you can run Linux ELF file on top of Windows. In contrast, Qemu usermode only run binary of the same OS, such as Linux ELF on Linux, due to the way it forwards syscall from emulated code to native OS
- Qiling supports more platforms, including Windows, MacOS, Linux & BSD. Qemu usermode can only handle Linux & BSD

---

#### Installation
Please see [setup guide](https://docs.qiling.io/en/latest/install/) file for how to install Qiling Framework.

---

#### Examples

- The example below shows how to use Qiling framework in the most striaghtforward way to emulate a Windows executable.

```python
from qiling import Qiling

if __name__ == "__main__":
    # initialize Qiling instance, specifying the executable to emulate and the emulated system root.
    # note that the current working directory is assumed to be Qiling home
    ql = Qiling([r'examples/rootfs/x86_windows/bin/x86_hello.exe'], r'examples/rootfs/x86_windows')

    # start emulation
    ql.run()
```

- The following example shows how a Windows crackme may be patched dynamically to make it always display the "Congratulation" dialog.

```python
from qiling import Qiling

def force_call_dialog_func(ql: Qiling):
    # get DialogFunc address from current stack frame
    lpDialogFunc = ql.stack_read(-8)

    # setup stack memory for DialogFunc
    ql.stack_push(0)
    ql.stack_push(1001)     # IDS_APPNAME
    ql.stack_push(0x111)    # WM_COMMAND
    ql.stack_push(0)

    # push return address
    ql.stack_push(0x0401018)

    # resume emulation from DialogFunc address
    ql.arch.regs.eip = lpDialogFunc


if __name__ == "__main__":
    # initialize Qiling instance
    ql = Qiling([r'rootfs/x86_windows/bin/Easy_CrackMe.exe'], r'rootfs/x86_windows')

    # NOP out some code
    ql.patch(0x004010B5, b'\x90\x90')
    ql.patch(0x004010CD, b'\x90\x90')
    ql.patch(0x0040110B, b'\x90\x90')
    ql.patch(0x00401112, b'\x90\x90')

    # hook at an address with a callback
    ql.hook_address(force_call_dialog_func, 0x00401016)
    ql.run()
```

The below Youtube video shows how the above example works.

#### Emulating ARM router firmware on Ubuntu X64 machine

- Qiling Framework hot-patch and emulates ARM router's /usr/bin/httpd on a X86_64Bit Ubuntu

[![qiling Tutorial: Emulating and Fuzz ARM router firmware](https://github.com/qilingframework/theme.qiling.io/blob/master/source/img/fuzzer.jpg?raw=true)](https://www.youtube.com/watch?v=e3_T3KLh2NU " Demo #3 Emulating and Fuzz ARM router firmware")

#### Qiling's IDAPro Plugin: Instrument and Decrypt Mirai's Secret

- This video demonstrate how Qiling's IDAPro plugin able to make IDApro run with Qiling instrumentation engine

[![](http://img.youtube.com/vi/ZWMWTq2WTXk/0.jpg)](http://www.youtube.com/watch?v=ZWMWTq2WTXk "Qiling's IDAPro Plugin: Instrument and Decrypt Mirai's Secret")

#### GDBserver with IDAPro demo

- Solving a simple CTF challenge with Qiling Framework and IDAPro

[![Solving a simple CTF challenge with Qiling Framework and IDAPro](https://i.ytimg.com/vi/SPjVAt2FkKA/0.jpg)](https://www.youtube.com/watch?v=SPjVAt2FkKA "Video DEMO 2")


#### Emulating MBR

- Qiling Framework emulates MBR

[![qiling DEMO: Emulating MBR](https://github.com/qilingframework/theme.qiling.io/blob/master/source/img/mbr.png?raw=true)](https://github.com/qilingframework/theme.qiling.io/blob/master/source/img/mbr.png?raw=true "Demo #4 Emulating UEFI")



---

#### Qltool

Qiling also provides a friendly tool named `qltool` to quickly emulate shellcode & executable binaries.

With qltool, easy execution can be performed:


With shellcode:

```
$ ./qltool code --os linux --arch arm --format hex -f examples/shellcodes/linarm32_tcp_reverse_shell.hex
```

With binary file:

```
$ ./qltool run -f examples/rootfs/x8664_linux/bin/x8664_hello --rootfs  examples/rootfs/x8664_linux/
```

With binary and GDB debugger enable:

```
$ ./qltool run -f examples/rootfs/x8664_linux/bin/x8664_hello --gdb 127.0.0.1:9999 --rootfs examples/rootfs/x8664_linux
```

With code coverage collection (UEFI only for now):

```
$ ./qltool run -f examples/rootfs/x8664_efi/bin/TcgPlatformSetupPolicy --rootfs examples/rootfs/x8664_efi --coverage-format drcov --coverage-file TcgPlatformSetupPolicy.cov
```

With json output (Windows mainly):

```
$ ./qltool run -f examples/rootfs/x86_windows/bin/x86_hello.exe --rootfs  examples/rootfs/x86_windows/ --console False --json
```
---


#### Contact

Get the latest info from our website https://www.qiling.io

Contact us at email info@qiling.io, or via Twitter [@qiling_io](https://twitter.com/qiling_io) or [Weibo](https://www.weibo.com/sgniwx)

---

#### Core developers, Key Contributors and etc

Please refer to [CREDITS.md](https://github.com/qilingframework/qiling/blob/dev/CREDITS.md)

            

Raw data

            {
    "_id": null,
    "home_page": "http://qiling.io",
    "name": "qiling",
    "maintainer": "KaiJern Lau (xwings)",
    "docs_url": null,
    "requires_python": "",
    "maintainer_email": "info@qiling.io",
    "keywords": "qiling binary emulator framework malware analysis UEFI IoT",
    "author": "",
    "author_email": "",
    "download_url": "https://files.pythonhosted.org/packages/c3/8c/21a31dd90d89bfd183a1cd554ad718d611f9f6aa95c503cdb9b7f915444f/qiling-1.4.6.tar.gz",
    "platform": null,
    "description": "[![Documentation Status](https://readthedocs.org/projects/qilingframework/badge/?version=latest)](https://docs.qiling.io)\n[![Downloads](https://pepy.tech/badge/qiling)](https://pepy.tech/project/qiling)\n[![Chat on Telegram](https://img.shields.io/badge/Chat%20on-Telegram-brightgreen.svg)](https://t.me/qilingframework)\n\n---\n\n<p align=\"center\">\n<img width=\"150\" height=\"150\" src=\"https://raw.githubusercontent.com/qilingframework/qiling/master/docs/qiling2_logo_small.png\">\n</p>\n\n[Qiling's usecase, blog and related work](https://github.com/qilingframework/qiling/issues/134)\n\nQiling is an advanced binary emulation framework, with the following features:\n\n- Emulate multi-platforms: Windows, MacOS, Linux, Android, BSD, UEFI, DOS, MBR, Ethereum Virtual Machine\n- Emulate multi-architectures: 8086, X86, X86_64, ARM, ARM64, MIPS, RISCV, PowerPC\n- Support multiple file formats: PE, MachO, ELF, COM, MBR\n- Support Windows Driver (.sys), Linux Kernel Module (.ko) & MacOS Kernel (.kext) via [Demigod](https://groundx.io/demigod/)\n- Emulates & sandbox code in an isolated environment\n- Provides a fully configurable sandbox\n- Provides in-depth memory, register, OS level and filesystem level API\n- Fine-grain instrumentation: allows hooks at various levels (instruction/basic-block/memory-access/exception/syscall/IO/etc)\n- Provides virtual machine level API such as save and restore current execution state\n- Supports cross architecture and platform debugging capabilities\n- Built-in debugger with reverse debugging capability\n- Allows dynamic hotpatch on-the-fly running code, including the loaded library\n- True framework in Python, making it easy to build customized security analysis tools on top\n\nQiling also made its way to various international conferences.\n\n2022:\n- [Black Hat, EU](https://www.blackhat.com/eu-22/arsenal/schedule/#reversing-mcu-with-firmware-emulation-29553)\n- [Black Hat, MEA](https://blackhatmea.com/node/724)\n\n2021:\n- [Black Hat, USA](https://www.blackhat.com/us-21/arsenal/schedule/index.html#bringing-the-x-complete-re-experience-to-smart-contract-24119)\n- [Hack In The Box, Amsterdam](https://conference.hitb.org/hitbsecconf2021ams/sessions/when-qiling-framework-meets-symbolic-execution/)\n- [Black Hat, Asia](https://www.blackhat.com/asia-21/arsenal/schedule/index.html#qiling-smart-analysis-for-smart-contract-22643)\n\n2020:\n- [Black Hat, Europe](https://www.blackhat.com/eu-20/arsenal/schedule/index.html#qiling-framework-deep-dive-into-obfuscated-binary-analysis-21781)\n- [Black Hat, USA](https://www.blackhat.com/us-20/arsenal/schedule/index.html#qiling-framework-from-dark-to-dawn-----enlightening-the-analysis-of-the-most-mysterious-iot-firmware--21062)\n- [Black Hat, USA (Demigod)](https://www.blackhat.com/us-20/briefings/schedule/#demigod-the-art-of-emulating-kernel-rootkits-20009)\n- [Black Hat, Asia](https://www.blackhat.com/asia-20/arsenal/schedule/index.html#qiling-lightweight-advanced-binary-analyzer-19245)\n- [Hack In The Box, Lockdown 001](https://conference.hitb.org/lockdown-livestream/)\n- [Hack In The Box, Lockdown 002](https://conference.hitb.org/hitb-lockdown002/virtual-labs/virtual-lab-qiling-framework-learn-how-to-build-a-fuzzer-based-on-a-1day-bug/)\n- [Hack In The Box, Cyberweek](https://cyberweek.ae/2020/lab-qiling-framework/)\n- [Nullcon](https://nullcon.net/website/goa-2020/speakers/kaijern-lau.php)\n    \n2019:\n\n- [Defcon, USA](https://www.defcon.org/html/defcon-27/dc-27-demolabs.html#QiLing)\n- [Hitcon](https://hitcon.org/2019/CMT/agenda)\n- [Zeronights](https://zeronights.ru/report-en/qiling-io-advanced-binary-emulation-framework/)\n\n\nQiling is backed by [Unicorn engine](http://www.unicorn-engine.org).\n\nVisit our website https://www.qiling.io for more information.\n\n---\n#### License\n\nThis project is released and distributed under [free software license GPLv2](https://github.com/qilingframework/qiling/blob/master/COPYING) and later version.\n\n---\n\n#### Qiling vs other Emulators\n\nThere are many open source emulators, but two projects closest to Qiling are [Unicorn](http://www.unicorn-engine.org) & [Qemu usermode](https://qemu.org). This section explains the main differences of Qiling against them.\n\n##### Qiling vs Unicorn engine\n\nBuilt on top of Unicorn, but Qiling & Unicorn are two different animals.\n\n- Unicorn is just a CPU emulator, so it focuses on emulating CPU instructions, that can understand emulator memory. Beyond that, Unicorn is not aware of higher level concepts, such as dynamic libraries, system calls, I/O handling or executable formats like PE, MachO or ELF. As a result, Unicorn can only emulate raw machine instructions, without Operating System (OS) context\n- Qiling is designed as a higher level framework, that leverages Unicorn to emulate CPU instructions, but can understand OS: it has executable format loaders (for PE, MachO & ELF at the moment), dynamic linkers (so we can load & relocate shared libraries), syscall & IO handlers. For this reason, Qiling can run executable binary without requiring its native OS\n\n##### Qiling vs Qemu usermode\n\nQemu usermode does similar thing to our emulator, that is to emulate whole executable binaries in cross-architecture way. However, Qiling offers some important differences against Qemu usermode.\n\n- Qiling is a true analysis framework, that allows you to build your own dynamic analysis tools on top (in friendly Python language). Meanwhile, Qemu is just a tool, not a framework\n- Qiling can perform dynamic instrumentation, and can even hotpatch code at runtime. Qemu does not do either\n- Not only working cross-architecture, Qiling is also cross-platform, so for example you can run Linux ELF file on top of Windows. In contrast, Qemu usermode only run binary of the same OS, such as Linux ELF on Linux, due to the way it forwards syscall from emulated code to native OS\n- Qiling supports more platforms, including Windows, MacOS, Linux & BSD. Qemu usermode can only handle Linux & BSD\n\n---\n\n#### Installation\nPlease see [setup guide](https://docs.qiling.io/en/latest/install/) file for how to install Qiling Framework.\n\n---\n\n#### Examples\n\n- The example below shows how to use Qiling framework in the most striaghtforward way to emulate a Windows executable.\n\n```python\nfrom qiling import Qiling\n\nif __name__ == \"__main__\":\n    # initialize Qiling instance, specifying the executable to emulate and the emulated system root.\n    # note that the current working directory is assumed to be Qiling home\n    ql = Qiling([r'examples/rootfs/x86_windows/bin/x86_hello.exe'], r'examples/rootfs/x86_windows')\n\n    # start emulation\n    ql.run()\n```\n\n- The following example shows how a Windows crackme may be patched dynamically to make it always display the \"Congratulation\" dialog.\n\n```python\nfrom qiling import Qiling\n\ndef force_call_dialog_func(ql: Qiling):\n    # get DialogFunc address from current stack frame\n    lpDialogFunc = ql.stack_read(-8)\n\n    # setup stack memory for DialogFunc\n    ql.stack_push(0)\n    ql.stack_push(1001)     # IDS_APPNAME\n    ql.stack_push(0x111)    # WM_COMMAND\n    ql.stack_push(0)\n\n    # push return address\n    ql.stack_push(0x0401018)\n\n    # resume emulation from DialogFunc address\n    ql.arch.regs.eip = lpDialogFunc\n\n\nif __name__ == \"__main__\":\n    # initialize Qiling instance\n    ql = Qiling([r'rootfs/x86_windows/bin/Easy_CrackMe.exe'], r'rootfs/x86_windows')\n\n    # NOP out some code\n    ql.patch(0x004010B5, b'\\x90\\x90')\n    ql.patch(0x004010CD, b'\\x90\\x90')\n    ql.patch(0x0040110B, b'\\x90\\x90')\n    ql.patch(0x00401112, b'\\x90\\x90')\n\n    # hook at an address with a callback\n    ql.hook_address(force_call_dialog_func, 0x00401016)\n    ql.run()\n```\n\nThe below Youtube video shows how the above example works.\n\n#### Emulating ARM router firmware on Ubuntu X64 machine\n\n- Qiling Framework hot-patch and emulates ARM router's /usr/bin/httpd on a X86_64Bit Ubuntu\n\n[![qiling Tutorial: Emulating and Fuzz ARM router firmware](https://github.com/qilingframework/theme.qiling.io/blob/master/source/img/fuzzer.jpg?raw=true)](https://www.youtube.com/watch?v=e3_T3KLh2NU \" Demo #3 Emulating and Fuzz ARM router firmware\")\n\n#### Qiling's IDAPro Plugin: Instrument and Decrypt Mirai's Secret\n\n- This video demonstrate how Qiling's IDAPro plugin able to make IDApro run with Qiling instrumentation engine\n\n[![](http://img.youtube.com/vi/ZWMWTq2WTXk/0.jpg)](http://www.youtube.com/watch?v=ZWMWTq2WTXk \"Qiling's IDAPro Plugin: Instrument and Decrypt Mirai's Secret\")\n\n#### GDBserver with IDAPro demo\n\n- Solving a simple CTF challenge with Qiling Framework and IDAPro\n\n[![Solving a simple CTF challenge with Qiling Framework and IDAPro](https://i.ytimg.com/vi/SPjVAt2FkKA/0.jpg)](https://www.youtube.com/watch?v=SPjVAt2FkKA \"Video DEMO 2\")\n\n\n#### Emulating MBR\n\n- Qiling Framework emulates MBR\n\n[![qiling DEMO: Emulating MBR](https://github.com/qilingframework/theme.qiling.io/blob/master/source/img/mbr.png?raw=true)](https://github.com/qilingframework/theme.qiling.io/blob/master/source/img/mbr.png?raw=true \"Demo #4 Emulating UEFI\")\n\n\n\n---\n\n#### Qltool\n\nQiling also provides a friendly tool named `qltool` to quickly emulate shellcode & executable binaries.\n\nWith qltool, easy execution can be performed:\n\n\nWith shellcode:\n\n```\n$ ./qltool code --os linux --arch arm --format hex -f examples/shellcodes/linarm32_tcp_reverse_shell.hex\n```\n\nWith binary file:\n\n```\n$ ./qltool run -f examples/rootfs/x8664_linux/bin/x8664_hello --rootfs  examples/rootfs/x8664_linux/\n```\n\nWith binary and GDB debugger enable:\n\n```\n$ ./qltool run -f examples/rootfs/x8664_linux/bin/x8664_hello --gdb 127.0.0.1:9999 --rootfs examples/rootfs/x8664_linux\n```\n\nWith code coverage collection (UEFI only for now):\n\n```\n$ ./qltool run -f examples/rootfs/x8664_efi/bin/TcgPlatformSetupPolicy --rootfs examples/rootfs/x8664_efi --coverage-format drcov --coverage-file TcgPlatformSetupPolicy.cov\n```\n\nWith json output (Windows mainly):\n\n```\n$ ./qltool run -f examples/rootfs/x86_windows/bin/x86_hello.exe --rootfs  examples/rootfs/x86_windows/ --console False --json\n```\n---\n\n\n#### Contact\n\nGet the latest info from our website https://www.qiling.io\n\nContact us at email info@qiling.io, or via Twitter [@qiling_io](https://twitter.com/qiling_io) or [Weibo](https://www.weibo.com/sgniwx)\n\n---\n\n#### Core developers, Key Contributors and etc\n\nPlease refer to [CREDITS.md](https://github.com/qilingframework/qiling/blob/dev/CREDITS.md)\n",
    "bugtrack_url": null,
    "license": "GPLv2",
    "summary": "Qiling is an advanced binary emulation framework that cross-platform-architecture",
    "version": "1.4.6",
    "project_urls": {
        "Homepage": "http://qiling.io"
    },
    "split_keywords": [
        "qiling",
        "binary",
        "emulator",
        "framework",
        "malware",
        "analysis",
        "uefi",
        "iot"
    ],
    "urls": [
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "7bac3b72bd96612a2d3af84426533c915de847e481cb6819be824eb967ca6ca9",
                "md5": "daf58379efc022b570cd98d1f0431070",
                "sha256": "9ecb74b86addfce904034cad2de41a06c022b86ef2979b5569a332d0c59f9287"
            },
            "downloads": -1,
            "filename": "qiling-1.4.6-py3-none-any.whl",
            "has_sig": false,
            "md5_digest": "daf58379efc022b570cd98d1f0431070",
            "packagetype": "bdist_wheel",
            "python_version": "py3",
            "requires_python": null,
            "size": 2756580,
            "upload_time": "2023-08-04T02:51:08",
            "upload_time_iso_8601": "2023-08-04T02:51:08.935367Z",
            "url": "https://files.pythonhosted.org/packages/7b/ac/3b72bd96612a2d3af84426533c915de847e481cb6819be824eb967ca6ca9/qiling-1.4.6-py3-none-any.whl",
            "yanked": false,
            "yanked_reason": null
        },
        {
            "comment_text": "",
            "digests": {
                "blake2b_256": "c38c21a31dd90d89bfd183a1cd554ad718d611f9f6aa95c503cdb9b7f915444f",
                "md5": "438d9288608e97b80da7f4ceb83f4bac",
                "sha256": "97759006526273895709ee59d459a8c5aa8e6e513bb80696da01bf9d39fce0a7"
            },
            "downloads": -1,
            "filename": "qiling-1.4.6.tar.gz",
            "has_sig": false,
            "md5_digest": "438d9288608e97b80da7f4ceb83f4bac",
            "packagetype": "sdist",
            "python_version": "source",
            "requires_python": null,
            "size": 2480227,
            "upload_time": "2023-08-04T02:51:11",
            "upload_time_iso_8601": "2023-08-04T02:51:11.104690Z",
            "url": "https://files.pythonhosted.org/packages/c3/8c/21a31dd90d89bfd183a1cd554ad718d611f9f6aa95c503cdb9b7f915444f/qiling-1.4.6.tar.gz",
            "yanked": false,
            "yanked_reason": null
        }
    ],
    "upload_time": "2023-08-04 02:51:11",
    "github": false,
    "gitlab": false,
    "bitbucket": false,
    "codeberg": false,
    "lcname": "qiling"
}
        
Elapsed time: 0.19039s