diff --git a/README.md b/README.md index 88d4b20..180fcca 100644 --- a/README.md +++ b/README.md @@ -69,9 +69,5 @@ On the other side, for tools like x64dbg the shown api names will only depend on * The tool will try to use the code cave for the written shellcode if it's not enough, it will create a new section for it
* It can be used multiple times on the same obfuscated PE
* Tested only on Windows 10 x64
-* For unknown reason, when the PE is built by `gcc` without the optimization flags, tools like `dumpbin` and `objdump` report bad PE file even that it runs normally without issues
- -![pic10](https://github.com/d35ha/CallObfuscator/blob/master/Images/pic10.PNG)
- * Get source with `git clone --recursive https://github.com/d35ha/CallObfuscator`
* Download binaries from the [Release Section](https://github.com/d35ha/CallObfuscator/releases)