From 78a05f201ad66aafd8487cb961a3f43232be5643 Mon Sep 17 00:00:00 2001 From: jason123 <72319307+Answerr@users.noreply.github.com> Date: Wed, 11 Dec 2024 12:01:04 +0800 Subject: [PATCH] Update README.md --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 490bee0..189d66f 100644 --- a/README.md +++ b/README.md @@ -60,16 +60,16 @@ The following bypass techniques are implemented in `bypass1.cpp`: ## Shellcode Loader Bypass Images ### 1. 360 Bypass -![360 Bypass](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/360_bypass1.png"360BypassExample") +![360 Bypass](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/360_bypass1.png) ### 2. Defender Test -![Defender Test](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/Defender_test.png"DefenderTestExample") +![Defender Test](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/Defender_test.png) ### 3. Huorong Bypass -![Huorong Bypass](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/huorong_bypass1.png"HuorongBypassExample") +![Huorong Bypass](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/huorong_bypass1.png) ### 4. Tencent Bypass -![Tencent Bypass](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/tencent_bypass1.png"TencentBypassExample") +![Tencent Bypass](https://github.com/Answerr/shellcode_loader_bypass/blob/main/images/tencent_bypass1.png) ## Summary Both `test.cpp` and `bypass1.cpp` demonstrate a variety of techniques to bypass modern security mechanisms. These techniques focus on: