From b20db624c02076a0c6ac588eb7ebf856f9066ba7 Mon Sep 17 00:00:00 2001 From: b1n <120295547+b1nhack@users.noreply.github.com> Date: Sun, 23 Jun 2024 15:54:37 +0800 Subject: [PATCH] docs: update images --- README.md | 3 +-- 1 file changed, 1 insertion(+), 2 deletions(-) diff --git a/README.md b/README.md index 01b0108..0127d2f 100644 --- a/README.md +++ b/README.md @@ -7,7 +7,7 @@ **PumpBin** is an Implant Generation Platform. To use PumpBin, you need to have a b1n file or create one. A b1n file contains one or more binary implant templates, along with some additional descriptive information. We refer to a b1n file as a Plugin. -![](https://github.com/pumpbin/pumpbin/assets/120295547/549bbfa8-d8a4-44c6-89e1-3f24ef7897d2) +![](https://github.com/pumpbin/pumpbin/assets/120295547/2c94a40f-a370-4cef-a676-3a843e535edb) ## ✨ Features @@ -24,7 +24,6 @@ To use PumpBin, you need to have a b1n file or create one. A b1n file contains o ## ❔ Why - Modern cybersecurity teams are divided into offensive personnel and cybersecurity researchers, with researchers responsible for producing digital weapons. The teams typically deploy post-exploitation tools like Cobalt Strike, BRC4, or similar. To evade security software, researchers usually write shellcode loaders, including evasion code to create the final implant. This process generally follows two methods.