From 858e09bb5cd80fa209c53ce2d7438744077a0c26 Mon Sep 17 00:00:00 2001 From: Mia von Steinkirch <mia.steinkirch@gmail.com> Date: Tue, 29 Oct 2019 19:08:12 -0700 Subject: [PATCH] =?UTF-8?q?=F0=9F=91=A9=F0=9F=8F=BE=E2=80=8D=F0=9F=A6=B0Cl?= =?UTF-8?q?ean=20up=20readme?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- Vulnerabilities_and_Exploits/README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/Vulnerabilities_and_Exploits/README.md b/Vulnerabilities_and_Exploits/README.md index d66ba5c..da49769 100644 --- a/Vulnerabilities_and_Exploits/README.md +++ b/Vulnerabilities_and_Exploits/README.md @@ -4,6 +4,7 @@ ## Tools ### Keyloggers + * Rin Logger @@ -13,7 +14,7 @@ # Vulnerabilities Glossary -* LD_PRELOAD: hijacking functions to a shared library: you can set this enviroment variable direct to the linker to load a library of your choice. +* `LD_PRELOAD`: hijacking functions to a shared library: you can set this enviroment variable direct to the linker to load a library of your choice. ### Common Vulnerabilities: