when the random address is the address of one of the hooks unicorn doesn't stop the emulation causing it to call a random hook with bad args
|
stop_pos = randint(HOOK_MEMORY_BASE, HOOK_MEMORY_BASE + HOOK_MEMORY_SIZE) | 1 |
my current work around is to add an offset to HOOK_MEMORY_BASE in the random call so that it cant hit any of the hooks but this isn't a proper solution