User should be able to add OllyDbg scripts actions after loading the image
Binary executable decompiler
Status: Alpha
Brought to you by:
johnkal
Since we already have an OllyDbg interpreter, we should be able to use it to post-process images after loading, to remove fragments of stereotypical code, like the
mov eax, 0xCCCCCCCC
lea edi, [ebp-20]
rep stosd
seen in debug binaries. This could be pattern-matched by an OllyDbg script and overwritten with NOPs
Feature added 2015-06-05