From c4c6c6a80883d0cf4422fd41051d7fb3fbf0dd7f Mon Sep 17 00:00:00 2001 From: jason123 <72319307+Answerr@users.noreply.github.com> Date: Wed, 11 Dec 2024 12:32:21 +0800 Subject: [PATCH] Update README.md --- README.md | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index b702bce..ad9b8fc 100644 --- a/README.md +++ b/README.md @@ -58,10 +58,10 @@ The following bypass techniques are implemented in `bypass1.cpp`: **How to Use** -1.Generate your raw shellcode as a .bin file using your preferred method. -2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin. -3.Rename output.bin to shellcode.bin and place it in the same directory as the executable. -4.Execute the payload. + 1.Generate your raw shellcode as a .bin file using your preferred method. + 2.Rename the file to input.bin and run xor.py. This will generate an encrypted file named output.bin. + 3.Rename output.bin to shellcode.bin and place it in the same directory as the executable. + 4.Execute the payload. ---