From 166be5ee0a58cc2770bab9c86dfcc8445331cb78 Mon Sep 17 00:00:00 2001 From: Sh0ckFR <10033649+Sh0ckFR@users.noreply.github.com> Date: Sun, 6 Nov 2022 21:01:24 +0100 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 8db4a7a..506790e 100644 --- a/README.md +++ b/README.md @@ -14,5 +14,5 @@ A curated list of resources to analyse and study malware techniques. * [Malware Privilege Escalation](https://github.com/m0nad/awesome-privilege-escalation): Collection of privilege escalation techniques. * [Various Malware Techniques](https://www.vx-underground.org/windows.html#evasion_-_anti-debugging): Several malware techniques listed on Vx-Underground. * [Malware Museum](https://archive.org/details/malwaremuseum): A database of old malware samples. -* [KernelMode.Info](https://www.kernelmode.info/forum/): Interesting low level ressources, the forum is no more active since few years. +* [KernelMode.Info](https://www.kernelmode.info/forum/): Interesting low level resources, the forum is no more active since few years. * [UnknownCheats Anti-Cheat Bypass](https://www.unknowncheats.me/forum/anti-cheat-bypass/): UnknownCheats is a cheats developers forum, the Anti-Cheat Bypass section is probably the most interesting part on this forum because the bypasses can be used also for red-teaming or by bad actors.