Code patched in memory
Posted: Fri Nov 01, 2013 12:40 pm
I am using a protector software that checks if the executable is patched in runtime. When used with MadExcept, it always reports an integrity check.
Is MadExcept touching the program asm while running, is that how you hook?
Thanks
Is MadExcept touching the program asm while running, is that how you hook?
Thanks