aboutsummaryrefslogtreecommitdiffstats
path: root/bfd/load.py (unfollow)
Commit message (Expand)AuthorFilesLines
2018-04-27relicensed everything excluding safercpp to GPL-3.0. fixes #31. now there is ...bloodstalker1-6/+39
2018-04-21two more options for load.py. also fixed the default lua script for bruiser. ...bloodstalker1-0/+8
2018-04-08added some more cli options to load.py. added a new test file for bruiser to ...bloodstalker1-9/+117
2018-04-05added some more features, a lil bit closer to getting the nested function cal...bloodstalker1-0/+93
2018-03-19some fixesbloodstalker1-69/+105
2018-03-12added a lua module for asmrewriter, will soon add docs. you can try the new m...bloodstalker1-89/+127
2018-03-01wip-the asm rewriter module plus the assembly jump table lua module implement...bloodstalker1-0/+26
2018-02-24bruiser will now run a lua script before startup so now you can easily use yo...bloodstalker1-24/+37
2018-02-18added some elf stuff plus leb128 encode decode functionsbloodstalker1-5/+234
2018-02-17trying to implement the nested call and global object rewritersbloodstalker1-2/+67
2018-02-112 major bug fixed for bruiser, a lot of little improvements and bug fixed her...bloodstalker1-0/+1
2018-02-01update [ci skip]bloodstalker1-2/+37
2018-01-20updatebloodstalker1-0/+35
2018-01-02load.py now loads all objects and functions along with names to c++. next is ...bloodstalker1-32/+72
2017-12-30bruiser gets the function code and name from bfd now. besides that minor chan...bloodstalker1-4/+43
2017-12-29load.py recognized function entries correctly now. minor fixes and updates.bloodstalker1-18/+112
2017-12-16forgot the test header for obfuscator [ci skip]bloodstalker1-1/+0
2017-12-06obfuscator doesnt mess up var declations with init values, python driver has ...bloodstalker1-116/+216
2017-11-11added obfuscator, some minor changes made to load.py so it would be easier to...bloodstalker1-4/+5
2017-11-05now you can run load.py from bruiser.bloodstalker1-23/+57
2017-10-26updatedsbloodstalker1-5/+57
2017-10-29now i can get the symbol names, next thing is to load the object code up in b...bloodstalker1-8/+105
2017-10-28palying around with executbales and sosbloodstalker1-0/+260