aboutsummaryrefslogtreecommitdiffstats
path: root/bfd (follow)
Commit message (Collapse)AuthorAgeFilesLines
* added new options to delfbloodstalker2018-07-291-0/+122
|
* a fix for the luatablegen json file, added a new option to load.py, minor ↵bloodstalker2018-07-191-9/+22
| | | | cosmetic changes
* load.py is now imported bt another python module, should cut down on startup ↵bloodstalker2018-05-252-1/+31
| | | | time. added the WASM linking structures to dwasm. i can start working on the linker as soon as i get some tests.
* wip:added a wasm backend. i need to setup an interface with the main c++ ↵bloodstalker2018-05-201-1/+1
| | | | code. added some commands to bruiser for managing xobj memories
* fixes #33. fixed #34. python interpreter should clean up after itself ↵bloodstalker2018-05-183-17/+49
| | | | properly so maybe #32 is also sovled but i need more time to know. the stack usage for lua has been reduced so larger number of xobjs are fine now. general cleanup for executioner and bruiser. added a note regarding running obfuscators test. lua no longer needs libreadline to build. bfds test no longer needs libbfd to build.
* relicensed everything excluding safercpp to GPL-3.0. fixes #31. now there is ↵bloodstalker2018-04-271-6/+39
| | | | ramdump. i just need to write a luawrapper.
* two more options for load.py. also fixed the default lua script for bruiser. ↵bloodstalker2018-04-211-0/+8
| | | | now it works for everyone if luarocks is in path.
* added some more cli options to load.py. added a new test file for bruiser to ↵bloodstalker2018-04-082-11/+120
| | | | see how it fares against bigger files.
* added some more features, a lil bit closer to getting the nested function ↵bloodstalker2018-04-051-0/+93
| | | | calls right
* some fixesbloodstalker2018-03-191-69/+105
|
* added a lua module for asmrewriter, will soon add docs. you can try the new ↵bloodstalker2018-03-121-89/+127
| | | | module by running asmtest.lua or demo2.lua did some cosmetic fixes to load bfd so it doesnt suck as hard when you get dumps
* wip-the asm rewriter module plus the assembly jump table lua module ↵bloodstalker2018-03-011-0/+26
| | | | implementation
* bruiser will now run a lua script before startup so now you can easily use ↵bloodstalker2018-02-241-24/+37
| | | | your lua rocks from inside bruiser. added a new demo using bruisers xobj module. added a new bruiser option for the default lua script to run prior to bruiser startup. updated the readme for bruiser.
* added some elf stuff plus leb128 encode decode functionsbloodstalker2018-02-181-5/+234
|
* test script for bfdbloodstalker2018-02-171-0/+57
|
* trying to implement the nested call and global object rewritersbloodstalker2018-02-173-4/+71
|
* 2 major bug fixed for bruiser, a lot of little improvements and bug fixed ↵bloodstalker2018-02-112-1/+3
| | | | here and there
* update [ci skip]bloodstalker2018-02-013-51/+60
|
* some tests for the ffi funcitonality on bruiuserbloodstalker2018-01-221-0/+3
|
* updatebloodstalker2018-01-204-4/+120
|
* you can now run objects that are loaded into bruiser from a shared library ↵bloodstalker2018-01-121-3/+4
| | | | from lua. right now very simple examples work. i have to figure out how to handles runtime pointer recasts.
* load.py now loads all objects and functions along with names to c++. next is ↵bloodstalker2018-01-021-32/+72
| | | | getting them to lua.
* wipbloodstalker2017-12-312-3/+9
|
* bruiser gets the function code and name from bfd now. besides that minor ↵bloodstalker2017-12-301-4/+43
| | | | changes here and there.
* load.py recognized function entries correctly now. minor fixes and updates.bloodstalker2017-12-291-18/+112
|
* forgot the test header for obfuscator [ci skip]bloodstalker2017-12-161-1/+0
|
* obfuscator doesnt mess up var declations with init values, python driver has ↵bloodstalker2017-12-061-116/+216
| | | | been updated, not finished yet, bruiser now gets the objects from load.py, executioner will handle running the objects and registering them with lua
* added obfuscator, some minor changes made to load.py so it would be easier ↵bloodstalker2017-11-111-4/+5
| | | | to call python scripts from lua, general changes for a new project
* now you can run load.py from bruiser.bloodstalker2017-11-051-23/+57
|
* updatedsbloodstalker2017-10-262-5/+58
|
* now i can get the symbol names, next thing is to load the object code up in ↵bloodstalker2017-10-292-8/+117
| | | | bruiser...
* forgot this onebloodstalker2017-10-281-0/+30
|
* palying around with executbales and sosbloodstalker2017-10-283-8/+278
|
* playing around with libbfdbloodstalker2017-10-263-0/+61