Example of using ELF hacking to inject malicious code into a target binary
-
Updated
Feb 20, 2020 - C
Example of using ELF hacking to inject malicious code into a target binary
Add a description, image, and links to the poisoning-attack topic page so that developers can more easily learn about it.
To associate your repository with the poisoning-attack topic, visit your repo's landing page and select "manage topics."