diff --git a/doc/sphinx/tutorials/09_frida_lief.rst b/doc/sphinx/tutorials/09_frida_lief.rst index f535e429c5..6361db869e 100644 --- a/doc/sphinx/tutorials/09_frida_lief.rst +++ b/doc/sphinx/tutorials/09_frida_lief.rst @@ -44,7 +44,7 @@ Frida & LIEF One less known injection technique but quite old is based on modifying the ELF format. It has been well explained by Mayhem in `Phrack `_ [1]_ and LIEF provides a user-friendly API [2]_ to do it. To summarize, executable formats include libraries that are linked with executable. We can have list of linked libraries with -``ldd`` or ``readelf`` (Unix) or with `elf_reader.py `_ (Linux, Windows, OSX): +``ldd`` or ``readelf`` (Unix) or with `elf_reader.py `_ (Linux, Windows, OSX): .. code-block:: console diff --git a/doc/sphinx/tutorials/13_pe_authenticode.rst b/doc/sphinx/tutorials/13_pe_authenticode.rst index 9388816c32..e617aed00c 100644 --- a/doc/sphinx/tutorials/13_pe_authenticode.rst +++ b/doc/sphinx/tutorials/13_pe_authenticode.rst @@ -187,7 +187,7 @@ Then, we can use ``openssl`` to process its content: object: undefined (1.3.6.1.4.1.311.2.1.11) -The `authenticode_reader.py `_ +The `authenticode_reader.py `_ script located in the `examples/ `_ directory can also be used to inspect the signature: