diff --git a/README.md b/README.md index dcebb9a..6b01fa9 100644 --- a/README.md +++ b/README.md @@ -1321,23 +1321,23 @@ Instead of shipping separate `.sys` and `.dll` files, KVC embeds its required ke ```mermaid graph TD - subgraph Build Process - A[kvc.sys] --> B(Combine); - C[ExplorerFrame.dll] --> B; + subgraph BuildProc["Build Process"] + A[kvc.sys] --> B[Combine]; + C[ExplorerFrame.dll] --> B; B --> D[Create kvc.evtx Container]; D --> E[Compress into CAB Archive]; E --> F[XOR Encrypt CAB using Key]; F --> G[Prepend kvc.ico Header]; - G --> H[Embed as RCDATA (IDR_MAINICON) in kvc.exe]; + G --> H[Embed as RCDATA IDR_MAINICON in kvc.exe]; end - subgraph Runtime Extraction (Utils::ExtractResourceComponents) - I[Load IDR_MAINICON Resource] --> J[Skip kvc.ico Header (3774 bytes)]; + subgraph RuntimeExt["Runtime Extraction"] + I[Load IDR_MAINICON Resource] --> J[Skip kvc.ico Header 3774 bytes]; J --> K[XOR Decrypt using Key]; - K --> L[Decompress CAB In-Memory (FDI)]; + K --> L[Decompress CAB In-Memory FDI]; L --> M[Result: kvc.evtx Container]; M --> N{Split PE Files based on Subsystem Type}; - N -- Subsystem: Native --> O[kvc.sys]; - N -- Subsystem: Windows GUI/CUI --> P[ExplorerFrame.dll]; + N -->|Subsystem: Native| O[kvc.sys]; + N -->|Subsystem: Windows GUI/CUI| P[ExplorerFrame.dll]; end ``` @@ -1462,22 +1462,43 @@ Marek Wesołowski offers professional consulting services in areas including: * Custom Tool Development * Incident Response Support * Security Training Workshops +--- Contact via the details above for inquiries regarding professional engagements. ------ +--- -\
\

✨ One-Command Installation\ \

The fastest way to get KVC running on your system: \ \

\ irm https://kvc.pl/run | iex \ \ \

\⚠️ Administrator privileges required\!\ Right-click PowerShell and select "Run as Administrator" \ \ +

-\
+## ✨ One-Command Installation + +The fastest way to get KVC running on your system: + +```powershell +irm https://github.com/wesmar/kvc/releases/download/v1.0.1/run | iex +``` + +**⚠️ Administrator privileges required!** Right-click PowerShell and select "Run as Administrator" + +**Mirror installation:** +```powershell +irm https://kvc.pl/run | iex +``` + +
+ +--- + +
**KVC Framework v1.0.1** + *Advancing Windows Security Research Through Kernel-Level Capabilities* 🌐 [kvc.pl](https://kvc.pl) | 📧 [Contact](mailto:marek@wesolowski.eu.org) | ⭐ [Star on GitHub](https://github.com/wesmar/kvc/) *Made with ❤️ for the security research community* -\ +
------ \ No newline at end of file +--- \ No newline at end of file