summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorh0t_max <h0t_max@hotmail.com>2022-07-19 00:27:53 +0200
committerh0t_max <h0t_max@hotmail.com>2022-07-19 00:27:53 +0200
commit5c42300051091c6706ad53c50fd88e15c024bf60 (patch)
tree7515ad96d62ce17353a0a698a0aee8efbf6adba2
parentREADME fixed (diff)
downloadMicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar
MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.gz
MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.bz2
MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.lz
MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.xz
MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.tar.zst
MicrocodeDecryptor-5c42300051091c6706ad53c50fd88e15c024bf60.zip
-rw-r--r--README.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/README.md b/README.md
index 1c85d1e..67deb7f 100644
--- a/README.md
+++ b/README.md
@@ -20,7 +20,7 @@ Using vulnerabilities in Intel TXE we had activated undocumented debugging mode
4. Where can I find more information about it?
-See our talks [Chip Red Pill: How We Achived to Execute Arbitrary Microcode Inside Inttel Atom CPUs](https://www.youtube.com/watch?v=V1nJeV0Uq0M&ab_channel=OffensiveCon) from OffensiveCon22.
+See our talks [Chip Red Pill: How We Achived to Execute Arbitrary Microcode Inside Intel Atom CPUs](https://www.youtube.com/watch?v=V1nJeV0Uq0M&ab_channel=OffensiveCon) from OffensiveCon22.
# Python