diff options
| -rw-r--r-- | _posts/2022-12-31-linux-detours.md | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/_posts/2022-12-31-linux-detours.md b/_posts/2022-12-31-linux-detours.md index da60542..78a00e4 100644 --- a/_posts/2022-12-31-linux-detours.md +++ b/_posts/2022-12-31-linux-detours.md @@ -21,7 +21,7 @@ Note: This article details the linux specific details of the library. Windows support has since been added. See: -[https://github.com/lunar-rf/cdl86](https://github.com/lunar-rf/cdl86) +[https://github.com/lunar-sh/cdl86](https://github.com/lunar-sh/cdl86) [Microsoft Research](https://en.wikipedia.org/wiki/Microsoft_Research) currently maintains a library known as [MS Detours](https://github.com/microsoft/Detours). @@ -276,7 +276,7 @@ The general procedure to place the `JMP` hook is as follows: 6. Assign trampoline address to target function pointer. Let's have a look at all of this in action using `GDB`. I will be using the -[basic_jmp.c](https://github.com/lunar-rf/cdl86/blob/master/tests/basic_jmp.c) +[basic_jmp.c](https://github.com/lunar-sh/cdl86/blob/master/tests/basic_jmp.c) test case in the `cdl86` library. The source code for this test case is shown below: @@ -532,7 +532,7 @@ and serves the same purpose. `cdl86` assumes that you are operating in the address space of the target process. Therefore code injection is often required in practice and requires the use of an -[injector](https://github.com/lunar-rf/robocraft/tree/main/injector). +[injector](https://github.com/lunar-sh/robocraft/tree/main/injector). Once a shared library (`.so`) has been injected you can use the following code to get the base address of the main executable module: @@ -572,7 +572,7 @@ void cdl_swbp_dbg(struct cdl_swbp_patch *swbp_patch); # Source code You can find the `cdl86` source code -[here](https://github.com/lunar-rf/cdl86).<br> +[here](https://github.com/lunar-sh/cdl86).<br> # Signature |
