aboutsummaryrefslogtreecommitdiffstats
path: root/bfd (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-03-01wip-the asm rewriter module plus the assembly jump table lua module ↵bloodstalker1-0/+26
implementation
2018-02-24bruiser will now run a lua script before startup so now you can easily use ↵bloodstalker1-24/+37
your lua rocks from inside bruiser. added a new demo using bruisers xobj module. added a new bruiser option for the default lua script to run prior to bruiser startup. updated the readme for bruiser.
2018-02-18added some elf stuff plus leb128 encode decode functionsbloodstalker1-5/+234
2018-02-17test script for bfdbloodstalker1-0/+57
2018-02-17trying to implement the nested call and global object rewritersbloodstalker3-4/+71
2018-02-112 major bug fixed for bruiser, a lot of little improvements and bug fixed ↵bloodstalker2-1/+3
here and there
2018-02-01update [ci skip]bloodstalker3-51/+60
2018-01-22some tests for the ffi funcitonality on bruiuserbloodstalker1-0/+3
2018-01-20updatebloodstalker4-4/+120
2018-01-12you can now run objects that are loaded into bruiser from a shared library ↵bloodstalker1-3/+4
from lua. right now very simple examples work. i have to figure out how to handles runtime pointer recasts.
2018-01-02load.py now loads all objects and functions along with names to c++. next is ↵bloodstalker1-32/+72
getting them to lua.
2017-12-31wipbloodstalker2-3/+9
2017-12-30bruiser gets the function code and name from bfd now. besides that minor ↵bloodstalker1-4/+43
changes here and there.
2017-12-29load.py recognized function entries correctly now. minor fixes and updates.bloodstalker1-18/+112
2017-12-16forgot the test header for obfuscator [ci skip]bloodstalker1-1/+0
2017-12-06obfuscator doesnt mess up var declations with init values, python driver has ↵bloodstalker1-116/+216
been updated, not finished yet, bruiser now gets the objects from load.py, executioner will handle running the objects and registering them with lua
2017-11-11added obfuscator, some minor changes made to load.py so it would be easier ↵bloodstalker1-4/+5
to call python scripts from lua, general changes for a new project
2017-11-05now you can run load.py from bruiser.bloodstalker1-23/+57
2017-10-26updatedsbloodstalker2-5/+58
2017-10-29now i can get the symbol names, next thing is to load the object code up in ↵bloodstalker2-8/+117
bruiser...
2017-10-28forgot this onebloodstalker1-0/+30
2017-10-28palying around with executbales and sosbloodstalker3-8/+278
2017-10-26playing around with libbfdbloodstalker3-0/+61