This repository was archived by the owner on Aug 31, 2021. It is now read-only.

Description
Out of curiosity and in hope to learn more about binary patching I've attempted to follow the manual patching guide for webui_invincibility (with Cutter 1.12.0).
I can find the correct string and copy its adress (0x003bf809).
But "axt @ 0x003bf809" won't report any references at all.
So with the steps provided it's not possible to find the correct function.
I've tried the addresses of other strings successfully (e.g. "Supplicant interface already enabled and valid, but reconnecting just in case"). So I believe it is not a mistake in how I've entered the command.
It's great that you have your approach documented. A great practical learning resource :) Thanks!