aboutsummaryrefslogtreecommitdiffstats
path: root/bfd (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-01-12you can now run objects that are loaded into bruiser from a shared library ↵bloodstalker1-3/+4
from lua. right now very simple examples work. i have to figure out how to handles runtime pointer recasts.
2018-01-02load.py now loads all objects and functions along with names to c++. next is ↵bloodstalker1-32/+72
getting them to lua.
2017-12-31wipbloodstalker2-3/+9
2017-12-30bruiser gets the function code and name from bfd now. besides that minor ↵bloodstalker1-4/+43
changes here and there.
2017-12-29load.py recognized function entries correctly now. minor fixes and updates.bloodstalker1-18/+112
2017-12-16forgot the test header for obfuscator [ci skip]bloodstalker1-1/+0
2017-12-06obfuscator doesnt mess up var declations with init values, python driver has ↵bloodstalker1-116/+216
been updated, not finished yet, bruiser now gets the objects from load.py, executioner will handle running the objects and registering them with lua
2017-11-11added obfuscator, some minor changes made to load.py so it would be easier ↵bloodstalker1-4/+5
to call python scripts from lua, general changes for a new project
2017-11-05now you can run load.py from bruiser.bloodstalker1-23/+57
2017-10-26updatedsbloodstalker2-5/+58
2017-10-29now i can get the symbol names, next thing is to load the object code up in ↵bloodstalker2-8/+117
bruiser...
2017-10-28forgot this onebloodstalker1-0/+30
2017-10-28palying around with executbales and sosbloodstalker3-8/+278
2017-10-26playing around with libbfdbloodstalker3-0/+61