aboutsummaryrefslogtreecommitdiffstats
path: root/bfd (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-07-29added new options to delfbloodstalker1-0/+122
2018-07-19a fix for the luatablegen json file, added a new option to load.py, minor ↵bloodstalker1-9/+22
cosmetic changes
2018-05-25load.py is now imported bt another python module, should cut down on startup ↵bloodstalker2-1/+31
time. added the WASM linking structures to dwasm. i can start working on the linker as soon as i get some tests.
2018-05-20wip:added a wasm backend. i need to setup an interface with the main c++ ↵bloodstalker1-1/+1
code. added some commands to bruiser for managing xobj memories
2018-05-18fixes #33. fixed #34. python interpreter should clean up after itself ↵bloodstalker3-17/+49
properly so maybe #32 is also sovled but i need more time to know. the stack usage for lua has been reduced so larger number of xobjs are fine now. general cleanup for executioner and bruiser. added a note regarding running obfuscators test. lua no longer needs libreadline to build. bfds test no longer needs libbfd to build.
2018-04-27relicensed everything excluding safercpp to GPL-3.0. fixes #31. now there is ↵bloodstalker1-6/+39
ramdump. i just need to write a luawrapper.
2018-04-21two more options for load.py. also fixed the default lua script for bruiser. ↵bloodstalker1-0/+8
now it works for everyone if luarocks is in path.
2018-04-08added some more cli options to load.py. added a new test file for bruiser to ↵bloodstalker2-11/+120
see how it fares against bigger files.
2018-04-05added some more features, a lil bit closer to getting the nested function ↵bloodstalker1-0/+93
calls right
2018-03-19some fixesbloodstalker1-69/+105
2018-03-12added a lua module for asmrewriter, will soon add docs. you can try the new ↵bloodstalker1-89/+127
module by running asmtest.lua or demo2.lua did some cosmetic fixes to load bfd so it doesnt suck as hard when you get dumps
2018-03-01wip-the asm rewriter module plus the assembly jump table lua module ↵bloodstalker1-0/+26
implementation
2018-02-24bruiser will now run a lua script before startup so now you can easily use ↵bloodstalker1-24/+37
your lua rocks from inside bruiser. added a new demo using bruisers xobj module. added a new bruiser option for the default lua script to run prior to bruiser startup. updated the readme for bruiser.
2018-02-18added some elf stuff plus leb128 encode decode functionsbloodstalker1-5/+234
2018-02-17test script for bfdbloodstalker1-0/+57
2018-02-17trying to implement the nested call and global object rewritersbloodstalker3-4/+71
2018-02-112 major bug fixed for bruiser, a lot of little improvements and bug fixed ↵bloodstalker2-1/+3
here and there
2018-02-01update [ci skip]bloodstalker3-51/+60
2018-01-22some tests for the ffi funcitonality on bruiuserbloodstalker1-0/+3
2018-01-20updatebloodstalker4-4/+120
2018-01-12you can now run objects that are loaded into bruiser from a shared library ↵bloodstalker1-3/+4
from lua. right now very simple examples work. i have to figure out how to handles runtime pointer recasts.
2018-01-02load.py now loads all objects and functions along with names to c++. next is ↵bloodstalker1-32/+72
getting them to lua.
2017-12-31wipbloodstalker2-3/+9
2017-12-30bruiser gets the function code and name from bfd now. besides that minor ↵bloodstalker1-4/+43
changes here and there.
2017-12-29load.py recognized function entries correctly now. minor fixes and updates.bloodstalker1-18/+112
2017-12-16forgot the test header for obfuscator [ci skip]bloodstalker1-1/+0
2017-12-06obfuscator doesnt mess up var declations with init values, python driver has ↵bloodstalker1-116/+216
been updated, not finished yet, bruiser now gets the objects from load.py, executioner will handle running the objects and registering them with lua
2017-11-11added obfuscator, some minor changes made to load.py so it would be easier ↵bloodstalker1-4/+5
to call python scripts from lua, general changes for a new project
2017-11-05now you can run load.py from bruiser.bloodstalker1-23/+57
2017-10-26updatedsbloodstalker2-5/+58
2017-10-29now i can get the symbol names, next thing is to load the object code up in ↵bloodstalker2-8/+117
bruiser...
2017-10-28forgot this onebloodstalker1-0/+30
2017-10-28palying around with executbales and sosbloodstalker3-8/+278
2017-10-26playing around with libbfdbloodstalker3-0/+61