I want to develop code wherein I want to intercept the data being sent to a PHP exploitable function like eval(). However my code should not edit or touch the code wherein the eval exists in any way.
As an example:
I create a PHP file with my interceptor code and use "require" to call it inside a target PHP page with the eval() (or any other PHP exploitable function). How can that be made possible?