Skip to content

Commit 80bbbdc

Browse files
committed
Update README
1 parent b31df47 commit 80bbbdc

File tree

1 file changed

+6
-6
lines changed

1 file changed

+6
-6
lines changed

README.md

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -4,19 +4,19 @@ This project is a Go implementation of well-known techniques trying to detect if
44

55
Why doing this in Go ? Because there are many C programs already doing this, but none written in pure Go.
66

7-
## Installation
7+
## Usage
88

99
First download the package
1010
```
1111
$ go get github.com/ShellCode33/VM-Detection/vmdetect
1212
```
1313

14-
Then see ![main.go](https://github.com/ShellCode33/VM-Detection/blob/master/main.go) to see how to use it.
14+
Then see [main.go](https://github.com/ShellCode33/VM-Detection/blob/master/main.go) to use it in your own project.
1515

1616
## GNU/Linux techniques
1717

18-
- Look for known strings in the DMI table (/dev/mem)
19-
- Look for hints in the kernel ring buffer (/dev/kmsg)
18+
- Look for known strings in the DMI table (`/sys/class/dmi/id/*`)
19+
- Look for hints in the kernel ring buffer (`/dev/kmsg`)
2020
- Look for virtual chassis in systemd configuration
2121

2222
## Windows techniques
@@ -25,6 +25,6 @@ Coming soon...
2525

2626
## Resources
2727

28-
![systemd-detect-virt source code](https://github.com/systemd/systemd/blob/master/src/basic/virt.c)
28+
[systemd-detect-virt source code](https://github.com/systemd/systemd/blob/master/src/basic/virt.c)
2929

30-
![Malware evasion techniques](https://www.deepinstinct.com/2019/10/29/malware-evasion-techniques-part-2-anti-vm-blog/)
30+
[Malware evasion techniques](https://www.deepinstinct.com/2019/10/29/malware-evasion-techniques-part-2-anti-vm-blog/)

0 commit comments

Comments
 (0)