From ecec369a87411d712ef6941e6c18323f416a88ac Mon Sep 17 00:00:00 2001 From: xerox Date: Sat, 3 Oct 2020 09:18:45 +0000 Subject: [PATCH] Update README.md --- README.md | 2 -- 1 file changed, 2 deletions(-) diff --git a/README.md b/README.md index bd6c440..862ee33 100644 --- a/README.md +++ b/README.md @@ -20,8 +20,6 @@ and interception can commence. The payload solution contains a small CPUID interception example. I plan on expanding my examples to include EPT hooking and module injection/module shadowing. I also need to locate the self referencing pml4e in hyper-v's pml4 :|.... - - # Voyager 2 - AMD Voyager 2 contains all the code associated with the AMD part of this project. Since AMD has no vmread/vmwrite operation, only vmsave/vmload I had to locate