From 4e87677885f459040f6d7fa08b0f22595b89096f Mon Sep 17 00:00:00 2001 From: redstrate Date: Fri, 3 Dec 2021 17:40:21 -0500 Subject: [PATCH] Update README --- README.md | 15 +++++++++++++-- 1 file changed, 13 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 08a9ed6..963a062 100644 --- a/README.md +++ b/README.md @@ -1,5 +1,16 @@ # nativelauncher -Old ACL bypass taken from XIVQuickLauncher - Full credit goes to the XIVQuickLauncher team, this is their old ACL bypass before it was rewritten in C#, but it still works! + +If you plan on using this on Linux or macOS, don't fear as I graciously built an [EXE for you](https://github.com/redstrate/nativelauncher/releases/latest). Right now they are built with VS2020 if that means anything to you. + +## What is this? +This is a workaround used by Dalamud to implement a specific ACL bypass to allow them to freely read/write memory, or something? Currently, this is written in nice-looking C# but this was unusable for [xivlauncher](https://github.com/redstrate/xivlauncher) because I was using C++, but lo and behold they were actually using _this_ before! + +The usage is extremely useful if you want to use this in your own launcher or game projects: + +* The first argument is the executable (usually ffxiv_dx11.exe) +* The rest of the arguments is passed as-is to your chosen executable +* If this is done successfully, it will spit out a PID of the new process for you to use. If it fails, it'll tell you why. + +I've been testing this under latest Wine Staging (as of writing, 6.22) and the process still works out-of-the box.