You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Aug 31, 2021. It is now read-only.
Out of curiosity and in hope to learn more about binary patching I've attempted to follow the manual patching guide for webui_invincibility (with Cutter 1.12.0).
I can find the correct string and copy its adress (0x003bf809).
But "axt @ 0x003bf809" won't report any references at all.
So with the steps provided it's not possible to find the correct function.
I've tried the addresses of other strings successfully (e.g. "Supplicant interface already enabled and valid, but reconnecting just in case"). So I believe it is not a mistake in how I've entered the command.
It's great that you have your approach documented. A great practical learning resource :) Thanks!
The text was updated successfully, but these errors were encountered:
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Out of curiosity and in hope to learn more about binary patching I've attempted to follow the manual patching guide for webui_invincibility (with Cutter 1.12.0).
I can find the correct string and copy its adress (0x003bf809).
But "axt @ 0x003bf809" won't report any references at all.
So with the steps provided it's not possible to find the correct function.
I've tried the addresses of other strings successfully (e.g. "Supplicant interface already enabled and valid, but reconnecting just in case"). So I believe it is not a mistake in how I've entered the command.
It's great that you have your approach documented. A great practical learning resource :) Thanks!
The text was updated successfully, but these errors were encountered: