We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Describe the bug When applying the CContentShiftingEvasion to a binary, if it has been compiled for debug, the manipulation corrupts the file.
CContentShiftingEvasion
To Reproduce Compile an executable on Windows, using Visual Studio C++ in debug mode. Apply the CContentShiftingEvasion to it.
Expected behavior The program should run as expected, but it crashes instead.
Library info secml-malware 0.2.5.1
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Describe the bug
When applying the
CContentShiftingEvasion
to a binary, if it has been compiled for debug, the manipulation corrupts the file.To Reproduce
Compile an executable on Windows, using Visual Studio C++ in debug mode.
Apply the
CContentShiftingEvasion
to it.Expected behavior
The program should run as expected, but it crashes instead.
Library info
secml-malware 0.2.5.1
The text was updated successfully, but these errors were encountered: