aboutsummaryrefslogtreecommitdiffstats
path: root/bruiser/executioner.h (unfollow)
Commit message (Collapse)AuthorFilesLines
2018-05-20wip:added a wasm backend. i need to setup an interface with the main c++ ↵bloodstalker1-66/+15
code. added some commands to bruiser for managing xobj memories
2018-05-18fixes #33. fixed #34. python interpreter should clean up after itself ↵bloodstalker1-236/+48
properly so maybe #32 is also sovled but i need more time to know. the stack usage for lua has been reduced so larger number of xobjs are fine now. general cleanup for executioner and bruiser. added a note regarding running obfuscators test. lua no longer needs libreadline to build. bfds test no longer needs libbfd to build.
2018-04-27relicensed everything excluding safercpp to GPL-3.0. fixes #31. now there is ↵bloodstalker1-1/+1
ramdump. i just need to write a luawrapper.
2018-02-01updatebloodstalker1-1/+11
2018-01-26fixed string type for xobjs, also xcall can now call functions by name as wellbloodstalker1-0/+7
2018-01-20updatebloodstalker1-0/+50
2018-01-17updatebloodstalker1-2/+65
2018-01-12you can now run objects that are loaded into bruiser from a shared library ↵bloodstalker1-4/+5
from lua. right now very simple examples work. i have to figure out how to handles runtime pointer recasts.
2018-01-09updatebloodstalker1-0/+38
2018-01-02load.py now loads all objects and functions along with names to c++. next is ↵bloodstalker1-3/+8
getting them to lua.
2017-12-31wipbloodstalker1-9/+39
2017-12-30bruiser gets the function code and name from bfd now. besides that minor ↵bloodstalker1-3/+37
changes here and there.
2017-12-08wipbloodstalker1-0/+116