From 1c166e2343b6feb085a592b0622315556e3be265 Mon Sep 17 00:00:00 2001
From: 0iphor13 <79219148+0iphor13@users.noreply.github.com>
Date: Wed, 25 Jan 2023 11:52:58 +0100
Subject: [PATCH] Update README.md
---
payloads/library/remote_access/ReverseBunny/README.md | 10 ++++++----
1 file changed, 6 insertions(+), 4 deletions(-)
diff --git a/payloads/library/remote_access/ReverseBunny/README.md b/payloads/library/remote_access/ReverseBunny/README.md
index 6a1b7f98..d3b39a26 100644
--- a/payloads/library/remote_access/ReverseBunny/README.md
+++ b/payloads/library/remote_access/ReverseBunny/README.md
@@ -5,9 +5,11 @@ OS: Windows
Version: 1.5
-
Getting remote access via obfuscated reverse shell.
+
!Getting remote access via obfuscated reverse shell!
Upload payload.txt and RevBunny.ps1 onto your Bunny
-
-Change the variables in payload.txt to your attacking maschine & start your listener. (for example netcat: nc -lvnp [PORT] )