Skip to content

Commit

Permalink
Update example references (#1112)
Browse files Browse the repository at this point in the history
Signed-off-by: Emmanuel Ferdman <emmanuelferdman@gmail.com>
  • Loading branch information
emmanuel-ferdman authored Sep 28, 2024
1 parent f57b62b commit 9b3e72d
Show file tree
Hide file tree
Showing 2 changed files with 2 additions and 2 deletions.
2 changes: 1 addition & 1 deletion doc/sphinx/tutorials/09_frida_lief.rst
Original file line number Diff line number Diff line change
Expand Up @@ -44,7 +44,7 @@ Frida & LIEF
One less known injection technique but quite old is based on modifying the ELF format. It has been well explained by Mayhem in `Phrack <http://phrack.org/issues/61/8.html>`_ [1]_ and LIEF provides a user-friendly API [2]_ to do it.

To summarize, executable formats include libraries that are linked with executable. We can have list of linked libraries with
``ldd`` or ``readelf`` (Unix) or with `elf_reader.py <https://github.com/lief-project/LIEF/blob/main/examples/python/elf_reader.py>`_ (Linux, Windows, OSX):
``ldd`` or ``readelf`` (Unix) or with `elf_reader.py <https://github.com/lief-project/LIEF/blob/main/api/python/examples/elf_reader.py>`_ (Linux, Windows, OSX):

.. code-block:: console
Expand Down
2 changes: 1 addition & 1 deletion doc/sphinx/tutorials/13_pe_authenticode.rst
Original file line number Diff line number Diff line change
Expand Up @@ -187,7 +187,7 @@ Then, we can use ``openssl`` to process its content:
object: undefined (1.3.6.1.4.1.311.2.1.11)
The `authenticode_reader.py <https://github.com/lief-project/LIEF/blob/main/examples/python/authenticode/authenticode_reader.py>`_
The `authenticode_reader.py <https://github.com/lief-project/LIEF/blob/main/api/python/examples/authenticode/authenticode_reader.py>`_
script located in the `examples/ <https://github.com/lief-project/LIEF/tree/main/examples/python/authenticode>`_ directory
can also be used to inspect the signature:

Expand Down

0 comments on commit 9b3e72d

Please sign in to comment.