aboutsummaryrefslogtreecommitdiffstats
path: root/bfd/load.py (follow)
Commit message (Collapse)AuthorAgeFilesLines
* wip-the asm rewriter module plus the assembly jump table lua module ↵bloodstalker2018-03-011-0/+26
| | | | implementation
* bruiser will now run a lua script before startup so now you can easily use ↵bloodstalker2018-02-241-24/+37
| | | | your lua rocks from inside bruiser. added a new demo using bruisers xobj module. added a new bruiser option for the default lua script to run prior to bruiser startup. updated the readme for bruiser.
* added some elf stuff plus leb128 encode decode functionsbloodstalker2018-02-181-5/+234
|
* trying to implement the nested call and global object rewritersbloodstalker2018-02-171-2/+67
|
* 2 major bug fixed for bruiser, a lot of little improvements and bug fixed ↵bloodstalker2018-02-111-0/+1
| | | | here and there
* update [ci skip]bloodstalker2018-02-011-2/+37
|
* updatebloodstalker2018-01-201-0/+35
|
* load.py now loads all objects and functions along with names to c++. next is ↵bloodstalker2018-01-021-32/+72
| | | | getting them to lua.
* bruiser gets the function code and name from bfd now. besides that minor ↵bloodstalker2017-12-301-4/+43
| | | | changes here and there.
* load.py recognized function entries correctly now. minor fixes and updates.bloodstalker2017-12-291-18/+112
|
* forgot the test header for obfuscator [ci skip]bloodstalker2017-12-161-1/+0
|
* obfuscator doesnt mess up var declations with init values, python driver has ↵bloodstalker2017-12-061-116/+216
| | | | been updated, not finished yet, bruiser now gets the objects from load.py, executioner will handle running the objects and registering them with lua
* added obfuscator, some minor changes made to load.py so it would be easier ↵bloodstalker2017-11-111-4/+5
| | | | to call python scripts from lua, general changes for a new project
* now you can run load.py from bruiser.bloodstalker2017-11-051-23/+57
|
* updatedsbloodstalker2017-10-261-5/+57
|
* now i can get the symbol names, next thing is to load the object code up in ↵bloodstalker2017-10-291-8/+105
| | | | bruiser...
* palying around with executbales and sosbloodstalker2017-10-281-0/+260