From b64bb5ef8045e6e3b98382857aca89713b07e985 Mon Sep 17 00:00:00 2001 From: Lunar Journal Date: Thu, 5 Dec 2024 16:48:38 +0200 Subject: Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 1cd08de..6dd650b 100644 --- a/README.md +++ b/README.md @@ -12,8 +12,8 @@ It allows for the interception of `x86` and `x86_64` C/C++ functions in memory. [https://journal.lunar.sh/2022/linux-detours.html](https://journal.lunar.sh/2022/linux-detours.html) The library currently supports two types of function hooks: -* JMP patch - patches origin function with a `JMP` to detour. -* INT3 patch - places software breakpoint (`SWBP`) at origin address. Handles control flow to detour. +* `JMP` patch - patches origin function with a `JMP` to detour. +* `INT3` patch - places software breakpoint (`SWBP`) at origin address. Handles control flow to detour. This project makes use of an internal x86 instruction length disassembly engine. -- cgit v1.2.3-70-g09d2