We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
I successfully injected the dll, but I don't know how to replace the function with my version based on the address (module offset) and call it.
The table decompiled by others shows relative addresses, but rust calls seem to be based on raw addresses.
In almost all cases, an error (exit code: 0xc0000005, STATUS_ACCESS_VIOLATION) will be reported
(exit code: 0xc0000005, STATUS_ACCESS_VIOLATION)
unsafe { let f: extern "fastcall" fn() -> bool = unsafe { std::mem::transmute(0x4E as *const ()) }; f() // (exit code: 0xc0000005, STATUS_ACCESS_VIOLATION) }
The text was updated successfully, but these errors were encountered:
Take a look at my other repository BurntSushi, where i do just that to block ads in Spotify. The hooks are defined here.
Sorry, something went wrong.
dumpbin /exports <dll> + GetProcAddress + retour is indeed a good method.
dumpbin /exports <dll>
GetProcAddress
retour
But a game I encountered needs to hook functions in exe. In this case, there is no export name, only an offset table compiled by others.
exe
No branches or pull requests
I successfully injected the dll, but I don't know how to replace the function with my version based on the address (module offset) and call it.
The table decompiled by others shows relative addresses, but rust calls seem to be based on raw addresses.
In almost all cases, an error
(exit code: 0xc0000005, STATUS_ACCESS_VIOLATION)
will be reportedThe text was updated successfully, but these errors were encountered: