From eba2cc74e3e0f1ce01b3a47e490f42cf488e28eb Mon Sep 17 00:00:00 2001 From: "John Jayson B. De Leon" Date: Mon, 3 Oct 2022 19:51:13 +0800 Subject: [PATCH] edit readme --- README.md | 19 +++++++++---------- 1 file changed, 9 insertions(+), 10 deletions(-) diff --git a/README.md b/README.md index 59fc4b8..90e1bac 100644 --- a/README.md +++ b/README.md @@ -1,25 +1,24 @@ # Hidden Code Image Injector
-<<<<<<< HEAD -## tools that help inject,extract,and remove executable code
-## in a image using python
-======= ## tools that help inject,extract,and remove executable code
in a image using python
->>>>>>> 242e8bf1542116297586f9a576a77613b3495bda + ## How to use it
```python3 img-injector [option] ``` -> inject the code in the image +inject the code in the image
``` python3 img-injector -i,--inject ``` -> extract the code in the image +extract the code in the image
``` python3 img-injector -e,--extract ``` -> remove the code in the image +remove the code in the image
``` python3 img-injector -r,--remove ``` -> to know if the code exit in the image +to know if the code exit in the image
``` python3 img-injector -x,--isExist ``` -> break silent input and be verbose +break silent input and be verbose
``` python3 img-injector -v,--verbose ``` + +transfer content of executable to text for better reading
+``` python3 img-injector -t,--transferFile ```