aboutsummaryrefslogtreecommitdiffstats
path: root/bfd/load.py (unfollow)
Commit message (Expand)AuthorFilesLines
2018-03-01wip-the asm rewriter module plus the assembly jump table lua module implement...bloodstalker1-0/+26
2018-02-24bruiser will now run a lua script before startup so now you can easily use yo...bloodstalker1-24/+37
2018-02-18added some elf stuff plus leb128 encode decode functionsbloodstalker1-5/+234
2018-02-17trying to implement the nested call and global object rewritersbloodstalker1-2/+67
2018-02-112 major bug fixed for bruiser, a lot of little improvements and bug fixed her...bloodstalker1-0/+1
2018-02-01update [ci skip]bloodstalker1-2/+37
2018-01-20updatebloodstalker1-0/+35
2018-01-02load.py now loads all objects and functions along with names to c++. next is ...bloodstalker1-32/+72
2017-12-30bruiser gets the function code and name from bfd now. besides that minor chan...bloodstalker1-4/+43
2017-12-29load.py recognized function entries correctly now. minor fixes and updates.bloodstalker1-18/+112
2017-12-16forgot the test header for obfuscator [ci skip]bloodstalker1-1/+0
2017-12-06obfuscator doesnt mess up var declations with init values, python driver has ...bloodstalker1-116/+216
2017-11-11added obfuscator, some minor changes made to load.py so it would be easier to...bloodstalker1-4/+5
2017-11-05now you can run load.py from bruiser.bloodstalker1-23/+57
2017-10-26updatedsbloodstalker1-5/+57
2017-10-29now i can get the symbol names, next thing is to load the object code up in b...bloodstalker1-8/+105
2017-10-28palying around with executbales and sosbloodstalker1-0/+260