From 06a7c660daef946c69b63e07fe85ea7dbcf7ae31 Mon Sep 17 00:00:00 2001 From: Lunar Journal Date: Mon, 16 Dec 2024 09:57:49 +0200 Subject: Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) (limited to 'README.md') diff --git a/README.md b/README.md index 8d28489..3934143 100644 --- a/README.md +++ b/README.md @@ -16,7 +16,7 @@ It allows for the interception of `x86` and `x86_64` `C/C++` binary functions in The library currently supports two types of function hooks: * `JMP` patch - patches origin function with a `JMP` to detour. * `INT3` patch - places software breakpoint (`SWBP`) at origin address.
-Handles `control flow` to detour. +Handles `control flow` to `detour`. > Note: This project makes use of an internal `x86` instruction length disassembly engine. @@ -47,7 +47,7 @@ int add( ``` Assuming we want to hook this function with `cdl86` the first step -is to define a function pointer typedef and declare our detour function: +is to define a function pointer typedef and declare our `detour` function: ``` typedef int add_t( -- cgit v1.2.3-70-g09d2