Files
metasploit-gs/external/source/byakugan/sources
T
pusscat 9463f4ca2b Add dirty dirty IDA map file parsing code - soon to be integrated when I can figure out the IDebugSymbols object
git-svn-id: file:///home/svn/framework3/trunk@6016 4d416f70-5f16-0410-b530-b9f4589650da
2008-12-17 21:59:40 +00:00

37 lines
737 B
Plaintext
Executable File

TARGETNAME=byakugan
TARGETTYPE=DYNLINK
TARGETPATH=.
DLLENTRY=_DllMainCRTStartup
!if "$(DBGSDK_INC_PATH)" != ""
INCLUDES = $(DBGSDK_INC_PATH);$(INCLUDES)
!endif
!if "$(DBGSDK_LIB_PATH)" == ""
DBGSDK_LIB_PATH = $(SDK_LIB_PATH)
!else
DBGSDK_LIB_PATH = $(DBGSDK_LIB_PATH)\$(TARGET_DIRECTORY)
!endif
TARGETLIBS=$(SDK_LIB_PATH)\kernel32.lib \
$(SDK_LIB_PATH)\ws2_32.lib \
$(DBGSDK_LIB_PATH)\dbgeng.lib
USE_MSVCRT=1
UMTYPE=windows
MSC_WARNING_LEVEL =
SOURCES= byakugan.cpp \
msfpattern.cpp \
jutsu.cpp \
exts.cpp \
handlerJutsu.cpp \
tenketsu.cpp \
heapModeler.cpp \
byakugan.rc \
mushishi.cpp \
symPort.cpp \
stdwindbg.cpp