Since many have read my tutorial on basic memory hacking and got stuck on the creation of code-caves, I've decided to make a short follow-up on some code-cave techniques where I'll explain the WHYs and the HOWs.
Archive also contains "Theories and methods of memory hacking".
Recommended Comments
Create an account or sign in to comment