top | item 46764330 (no title) ckbkr10 | 1 month ago they were prominent in game hacking 2005ish windowsmade hooking into game code much easier than before discuss order hn newest sidewndr46|1 month ago Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory leeter|1 month ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... load replies (1)
sidewndr46|1 month ago Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory leeter|1 month ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... load replies (1)
leeter|1 month ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... load replies (1)
sidewndr46|1 month ago
leeter|1 month ago
[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...
[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10...