diff --git a/README.md b/README.md index 0823ece..e9924af 100644 --- a/README.md +++ b/README.md @@ -7,7 +7,7 @@ Virtualizer), in order to help reverse engineers focus on interesting code. ## Screenshot

- +

# Supported Targets diff --git a/src/lib.rs b/src/lib.rs index bac6324..6fb98ec 100644 --- a/src/lib.rs +++ b/src/lib.rs @@ -18,6 +18,7 @@ pub type CodeEntryDestRange = std::ops::Range; const THEMIDA_SPOTTER_PLUGIN_NAME: &str = "themida-spotter-bn"; const THEMIDA_SPOTTER_TAG_NAME: &str = "Themida's obfuscated code entries"; +const THEMIDA_SPOTTER_TAG_ICON: &str = "🛡"; #[derive(Debug)] pub enum CodeEntryDescription { @@ -121,10 +122,7 @@ fn search_for_code_entries_task< let vm_entry_tag_type = view .get_tag_type(THEMIDA_SPOTTER_TAG_NAME) .unwrap_or_else(|| { - // Note(ergrelet): due to a bug in Binja's Rust API, `icon` - // actually sets the name of the tag. - // FIXME: Update the code to set an actual icon when the bug is fixed upstream. - view.create_tag_type(THEMIDA_SPOTTER_TAG_NAME, THEMIDA_SPOTTER_TAG_NAME) + view.create_tag_type(THEMIDA_SPOTTER_TAG_NAME, THEMIDA_SPOTTER_TAG_ICON) }); // Create tags for each obfuscated code entry found (if any) diff --git a/static/tags_screenshot.png b/static/tags_screenshot.png index bb7b682..e4939a3 100644 Binary files a/static/tags_screenshot.png and b/static/tags_screenshot.png differ