From 42cca668312d16395bf13f154e553ff5fd37645b Mon Sep 17 00:00:00 2001 From: zyphex <30928491+Flerov@users.noreply.github.com> Date: Sat, 25 Mar 2023 23:09:34 +0100 Subject: [PATCH 1/2] Update README.md --- README.md | 8 +++++++- 1 file changed, 7 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index f69e246..217476b 100644 --- a/README.md +++ b/README.md @@ -1 +1,7 @@ -# CaveCarver \ No newline at end of file +# CaveCarver +``` +Code cave is a technique used to inject additional code or shellcode into an executable +without affecting the original functionality of the program. +Our Project instruments code cave by adding an additional Section to the PE file +where the shellcode resides in. After patching the PEs EntryPoint the control flow gets redirected to the shellcode. +``` From be7f283ba57ae0e1623652794c3d25ad5a3acbca Mon Sep 17 00:00:00 2001 From: zyphex <30928491+Flerov@users.noreply.github.com> Date: Sat, 25 Mar 2023 23:10:54 +0100 Subject: [PATCH 2/2] Update README.md --- README.md | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/README.md b/README.md index 217476b..134dc0e 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ # CaveCarver -``` + Code cave is a technique used to inject additional code or shellcode into an executable without affecting the original functionality of the program. Our Project instruments code cave by adding an additional Section to the PE file where the shellcode resides in. After patching the PEs EntryPoint the control flow gets redirected to the shellcode. -``` +