← Back to context Comment by athrowaway3z 13 hours ago I'd never heard of detour. That's a pretty cool hack. 4 comments athrowaway3z Reply ckbkr10 11 hours ago they were prominent in game hacking 2005ish windowsmade hooking into game code much easier than before sidewndr46 9 hours ago Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory leeter 3 hours ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... 1 reply →
ckbkr10 11 hours ago they were prominent in game hacking 2005ish windowsmade hooking into game code much easier than before sidewndr46 9 hours ago Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory leeter 3 hours ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... 1 reply →
sidewndr46 9 hours ago Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory leeter 3 hours ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... 1 reply →
leeter 3 hours ago I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10... 1 reply →
they were prominent in game hacking 2005ish windows
made hooking into game code much easier than before
Aren't all DLLs on the Windows platform compiled with an unusual instruction at the start of each function? This makes it possible to somehow hot patch the DLL after it is already in memory
I believe you're thinking of the x86 Hotpatching hook[1], which doesn't exist on x86-64[2] (in the same form, it uses a x86-64 safe one).
[1] https://devblogs.microsoft.com/oldnewthing/20110921-00/?p=95...
[2] https://devblogs.microsoft.com/oldnewthing/20221109-00/?p=10...
1 reply →