aboutsummaryrefslogtreecommitdiffstats
path: root/bfd (follow)
Commit message (Expand)AuthorAgeFilesLines
* two more options for load.py. also fixed the default lua script for bruiser. ...bloodstalker2018-04-211-0/+8
* added some more cli options to load.py. added a new test file for bruiser to ...bloodstalker2018-04-082-11/+120
* added some more features, a lil bit closer to getting the nested function cal...bloodstalker2018-04-051-0/+93
* some fixesbloodstalker2018-03-191-69/+105
* added a lua module for asmrewriter, will soon add docs. you can try the new m...bloodstalker2018-03-121-89/+127
* wip-the asm rewriter module plus the assembly jump table lua module implement...bloodstalker2018-03-011-0/+26
* bruiser will now run a lua script before startup so now you can easily use yo...bloodstalker2018-02-241-24/+37
* added some elf stuff plus leb128 encode decode functionsbloodstalker2018-02-181-5/+234
* test script for bfdbloodstalker2018-02-171-0/+57
* trying to implement the nested call and global object rewritersbloodstalker2018-02-173-4/+71
* 2 major bug fixed for bruiser, a lot of little improvements and bug fixed her...bloodstalker2018-02-112-1/+3
* update [ci skip]bloodstalker2018-02-013-51/+60
* some tests for the ffi funcitonality on bruiuserbloodstalker2018-01-221-0/+3
* updatebloodstalker2018-01-204-4/+120
* you can now run objects that are loaded into bruiser from a shared library fr...bloodstalker2018-01-121-3/+4
* load.py now loads all objects and functions along with names to c++. next is ...bloodstalker2018-01-021-32/+72
* wipbloodstalker2017-12-312-3/+9
* bruiser gets the function code and name from bfd now. besides that minor chan...bloodstalker2017-12-301-4/+43
* load.py recognized function entries correctly now. minor fixes and updates.bloodstalker2017-12-291-18/+112
* forgot the test header for obfuscator [ci skip]bloodstalker2017-12-161-1/+0
* obfuscator doesnt mess up var declations with init values, python driver has ...bloodstalker2017-12-061-116/+216
* added obfuscator, some minor changes made to load.py so it would be easier to...bloodstalker2017-11-111-4/+5
* now you can run load.py from bruiser.bloodstalker2017-11-051-23/+57
* updatedsbloodstalker2017-10-262-5/+58
* now i can get the symbol names, next thing is to load the object code up in b...bloodstalker2017-10-292-8/+117
* forgot this onebloodstalker2017-10-281-0/+30
* palying around with executbales and sosbloodstalker2017-10-283-8/+278
* playing around with libbfdbloodstalker2017-10-263-0/+61