From b5de0b520237390869be8a9c39d30a095cb2f956 Mon Sep 17 00:00:00 2001 From: jason123 <72319307+Answerr@users.noreply.github.com> Date: Wed, 11 Dec 2024 12:33:19 +0800 Subject: [PATCH] Update README.md --- README.md | 11 +++++++---- 1 file changed, 7 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index ad9b8fc..4f11759 100644 --- a/README.md +++ b/README.md @@ -58,10 +58,13 @@ The following bypass techniques are implemented in `bypass1.cpp`: **How to Use** - 1.Generate your raw shellcode as a .bin file using your preferred method. - 2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin. - 3.Rename output.bin to shellcode.bin and place it in the same directory as the executable. - 4.Execute the payload. + 1.Generate your raw shellcode as a .bin file using your preferred method. + + 2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin. + + 3.Rename output.bin to shellcode.bin and place it in the same directory as the executable. + + 4.Execute the payload. ---