Commit message (Collapse) | Author | Files | Lines | ||
---|---|---|---|---|---|
2018-04-27 | relicensed everything excluding safercpp to GPL-3.0. fixes #31. now there is ↵ | bloodstalker | 1 | -6/+39 | |
ramdump. i just need to write a luawrapper. | |||||
2018-04-21 | two more options for load.py. also fixed the default lua script for bruiser. ↵ | bloodstalker | 1 | -0/+8 | |
now it works for everyone if luarocks is in path. | |||||
2018-04-08 | added some more cli options to load.py. added a new test file for bruiser to ↵ | bloodstalker | 1 | -9/+117 | |
see how it fares against bigger files. | |||||
2018-04-05 | added some more features, a lil bit closer to getting the nested function ↵ | bloodstalker | 1 | -0/+93 | |
calls right | |||||
2018-03-19 | some fixes | bloodstalker | 1 | -69/+105 | |
2018-03-12 | added a lua module for asmrewriter, will soon add docs. you can try the new ↵ | bloodstalker | 1 | -89/+127 | |
module by running asmtest.lua or demo2.lua did some cosmetic fixes to load bfd so it doesnt suck as hard when you get dumps | |||||
2018-03-01 | wip-the asm rewriter module plus the assembly jump table lua module ↵ | bloodstalker | 1 | -0/+26 | |
implementation | |||||
2018-02-24 | bruiser will now run a lua script before startup so now you can easily use ↵ | bloodstalker | 1 | -24/+37 | |
your lua rocks from inside bruiser. added a new demo using bruisers xobj module. added a new bruiser option for the default lua script to run prior to bruiser startup. updated the readme for bruiser. | |||||
2018-02-18 | added some elf stuff plus leb128 encode decode functions | bloodstalker | 1 | -5/+234 | |
2018-02-17 | trying to implement the nested call and global object rewriters | bloodstalker | 1 | -2/+67 | |
2018-02-11 | 2 major bug fixed for bruiser, a lot of little improvements and bug fixed ↵ | bloodstalker | 1 | -0/+1 | |
here and there | |||||
2018-02-01 | update [ci skip] | bloodstalker | 1 | -2/+37 | |
2018-01-20 | update | bloodstalker | 1 | -0/+35 | |
2018-01-02 | load.py now loads all objects and functions along with names to c++. next is ↵ | bloodstalker | 1 | -32/+72 | |
getting them to lua. | |||||
2017-12-30 | bruiser gets the function code and name from bfd now. besides that minor ↵ | bloodstalker | 1 | -4/+43 | |
changes here and there. | |||||
2017-12-29 | load.py recognized function entries correctly now. minor fixes and updates. | bloodstalker | 1 | -18/+112 | |
2017-12-16 | forgot the test header for obfuscator [ci skip] | bloodstalker | 1 | -1/+0 | |
2017-12-06 | obfuscator doesnt mess up var declations with init values, python driver has ↵ | bloodstalker | 1 | -116/+216 | |
been updated, not finished yet, bruiser now gets the objects from load.py, executioner will handle running the objects and registering them with lua | |||||
2017-11-11 | added obfuscator, some minor changes made to load.py so it would be easier ↵ | bloodstalker | 1 | -4/+5 | |
to call python scripts from lua, general changes for a new project | |||||
2017-11-05 | now you can run load.py from bruiser. | bloodstalker | 1 | -23/+57 | |
2017-10-26 | updateds | bloodstalker | 1 | -5/+57 | |
2017-10-29 | now i can get the symbol names, next thing is to load the object code up in ↵ | bloodstalker | 1 | -8/+105 | |
bruiser... | |||||
2017-10-28 | palying around with executbales and sos | bloodstalker | 1 | -0/+260 | |