index
:
mutator
master
Unnamed repository; edit this file 'description' to name the repository.
root
about
summary
refs
log
tree
commit
diff
stats
log msg
author
committer
range
path:
root
/
bfd
/
load.py
(
follow
)
Commit message (
Expand
)
Author
Age
Files
Lines
*
two more options for load.py. also fixed the default lua script for bruiser. ...
bloodstalker
2018-04-21
1
-0
/
+8
*
added some more cli options to load.py. added a new test file for bruiser to ...
bloodstalker
2018-04-08
1
-9
/
+117
*
added some more features, a lil bit closer to getting the nested function cal...
bloodstalker
2018-04-05
1
-0
/
+93
*
some fixes
bloodstalker
2018-03-19
1
-69
/
+105
*
added a lua module for asmrewriter, will soon add docs. you can try the new m...
bloodstalker
2018-03-12
1
-89
/
+127
*
wip-the asm rewriter module plus the assembly jump table lua module implement...
bloodstalker
2018-03-01
1
-0
/
+26
*
bruiser will now run a lua script before startup so now you can easily use yo...
bloodstalker
2018-02-24
1
-24
/
+37
*
added some elf stuff plus leb128 encode decode functions
bloodstalker
2018-02-18
1
-5
/
+234
*
trying to implement the nested call and global object rewriters
bloodstalker
2018-02-17
1
-2
/
+67
*
2 major bug fixed for bruiser, a lot of little improvements and bug fixed her...
bloodstalker
2018-02-11
1
-0
/
+1
*
update [ci skip]
bloodstalker
2018-02-01
1
-2
/
+37
*
update
bloodstalker
2018-01-20
1
-0
/
+35
*
load.py now loads all objects and functions along with names to c++. next is ...
bloodstalker
2018-01-02
1
-32
/
+72
*
bruiser gets the function code and name from bfd now. besides that minor chan...
bloodstalker
2017-12-30
1
-4
/
+43
*
load.py recognized function entries correctly now. minor fixes and updates.
bloodstalker
2017-12-29
1
-18
/
+112
*
forgot the test header for obfuscator [ci skip]
bloodstalker
2017-12-16
1
-1
/
+0
*
obfuscator doesnt mess up var declations with init values, python driver has ...
bloodstalker
2017-12-06
1
-116
/
+216
*
added obfuscator, some minor changes made to load.py so it would be easier to...
bloodstalker
2017-11-11
1
-4
/
+5
*
now you can run load.py from bruiser.
bloodstalker
2017-11-05
1
-23
/
+57
*
updateds
bloodstalker
2017-10-26
1
-5
/
+57
*
now i can get the symbol names, next thing is to load the object code up in b...
bloodstalker
2017-10-29
1
-8
/
+105
*
palying around with executbales and sos
bloodstalker
2017-10-28
1
-0
/
+260