In the world of Microsoft Detours, there are a wide variety of opinions and approaches that can generate passionate debates. Whether due to its historical relevance, the controversy it generates, its impact on society or its influence in the cultural sphere, Microsoft Detours is a topic that arouses the interest of many people around the world. In this article, we are going to explore different perspectives and aspects related to Microsoft Detours, with the aim of offering a complete and enriching vision on this topic. From its origin to its evolution, through its possible consequences and future projections, Microsoft Detours is a topic that deserves to be analyzed and discussed in an open and reflective manner. Join us on this journey of discovery and reflection about Microsoft Detours!
| Microsoft Detours | |
|---|---|
| Original author | Microsoft Research |
| Developer | Microsoft |
| Initial release | January 16, 2002 |
| Stable release | 4.0.1
/ April 16, 2018 |
| Repository | Detours on GitHub |
| Written in | C++ |
| Operating system | Microsoft Windows |
| Type | Software library |
| License | MIT License |
| Website | Official website |
Microsoft Detours is an open source library for intercepting, monitoring and instrumenting binary functions on Microsoft Windows.[1] It is developed by Microsoft and is most commonly used to intercept Win32 API calls within Windows applications. Detours makes it possible to add debugging instrumentation and to attach arbitrary DLLs to any existing Win32 binary. Detours does not require other software frameworks as a dependency and works on ARM, x86, x64, and IA-64 systems.[2] The interception code is applied dynamically at execution time.
Detours is used by product teams at Microsoft and has also been used by ISVs.[1][3][4]
Prior to 2016, Detours was available in a free version limited for non-commercial and 32 bit only use and a paid version for commercial use.[5] Since 2016, the source code is licensed under MIT License and available on GitHub.[1]