From 858e09bb5cd80fa209c53ce2d7438744077a0c26 Mon Sep 17 00:00:00 2001
From: Mia von Steinkirch <mia.steinkirch@gmail.com>
Date: Tue, 29 Oct 2019 19:08:12 -0700
Subject: [PATCH] =?UTF-8?q?=F0=9F=91=A9=F0=9F=8F=BE=E2=80=8D=F0=9F=A6=B0Cl?=
 =?UTF-8?q?ean=20up=20readme?=
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: 8bit

---
 Vulnerabilities_and_Exploits/README.md | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/Vulnerabilities_and_Exploits/README.md b/Vulnerabilities_and_Exploits/README.md
index d66ba5c..da49769 100644
--- a/Vulnerabilities_and_Exploits/README.md
+++ b/Vulnerabilities_and_Exploits/README.md
@@ -4,6 +4,7 @@
 ## Tools
 
 ### Keyloggers
+
 * Rin Logger
 
 
@@ -13,7 +14,7 @@
 
 # Vulnerabilities Glossary
 
-* LD_PRELOAD: hijacking functions to a shared library: you can set this enviroment variable direct to the linker to load a library of your choice.
+* `LD_PRELOAD`: hijacking functions to a shared library: you can set this enviroment variable direct to the linker to load a library of your choice.
 
 ### Common Vulnerabilities: