From 97707b7f5d85231f4f74a89cafcdaf4cac99ceae Mon Sep 17 00:00:00 2001 From: jason123 <72319307+Answerr@users.noreply.github.com> Date: Wed, 11 Dec 2024 12:31:57 +0800 Subject: [PATCH] Update README.md --- README.md | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 6fc7060..b702bce 100644 --- a/README.md +++ b/README.md @@ -58,10 +58,11 @@ The following bypass techniques are implemented in `bypass1.cpp`: **How to Use** -Generate your raw shellcode as a .bin file using your preferred method. -Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin. -Rename output.bin to shellcode.bin and place it in the same directory as the executable. -Execute the payload. +1.Generate your raw shellcode as a .bin file using your preferred method. +2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin. +3.Rename output.bin to shellcode.bin and place it in the same directory as the executable. +4.Execute the payload. + --- ## Shellcode Loader Bypass Images