Although "hacks" are very target-specific, the idea should be the same.
When a certain "virus" (program) is built in code, not compiled yet, I am