diff --git a/README.md b/README.md
index a1201db..9ee511b 100644
--- a/README.md
+++ b/README.md
@@ -1,27 +1,14 @@
-# π΄ββ οΈβ¨ Pentesting Toolkit
+# π΄ββ οΈπ pentesting toolkit
-### Hello anon ππ»
-### I am bt3gl, and this repository contains the resouces I used when I was a professional CTF player in 2014 and 2015.
+#### ππ» hello anon. i am bt3gl, and this repository contains the resouces I used when I was a professional ctf player in 2014 and 2015.
-
+#### πΎ here is some entertaining: [my DEF CON 23 talk on hacking quantum computing](https://www.youtube.com/watch?v=1Fp6ibfOQ4Y).
-[πΎ here is some entertaining: my DEF CON 23 talk on Hacking Quantum Computing](https://www.youtube.com/watch?v=1Fp6ibfOQ4Y)
+#### [πΎ here is a proof that this repo used to have 1.2k stars and 500 forks before shit happened](https://github.com/MEV-WAIFU-LABS/pentesting_toolkit/blob/master/STARS.png).
-[πΎ here is a proof that this repo used to have 1.2k stars and 500 forks before shit happened](https://github.com/MEV-WAIFU-LABS/pentesting_toolkit/blob/master/STARS.png)
-
----
-
-
-
-## Disclaimer:
-
-**All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages caused. The views expressed on this site are our own and do not necessarily reflect those of our employers.**
-
-**Usage of all tools on this site for attacking targets without prior mutual consent is illegal. It is the end userβs responsibility to obey all applicable local, state and federal laws. We assume no liability and are not responsible for any misuse or damage caused by this site.**
-
-**This work is licensed under a [Creative Commons Attribution-ShareAlike 4.0 International License](http://creativecommons.org/licenses/by-sa/4.0/).**
+#### β οΈ the resources in this repository were from my research. i am not responsible for your free-will.
@@ -29,7 +16,9 @@
-------
-## Sub-directories:
+## directories in this repo
+
+
* [CTFs and Wargames](https://github.com/bt3gl/Pentesting-Toolkit/tree/master/CTFs_and_WarGames)
* [Cloud and K8s Hacking](https://github.com/bt3gl/Pentesting-Toolkit/tree/master/Cloud_and_K8s_Hacking)
@@ -50,24 +39,24 @@
------
-## Resources
+## external resources
-### General Hacking
+### general hacking
+
- [The Art of Intrusion](http://www.amazon.com/The-Art-Intrusion-Intruders-Deceivers/dp/0471782661http://www.amazon.com/The-Art-Intrusion-Intruders-Deceivers/dp/0471782661).
- Krebs Series on how to be in InfoSec: [Thomas Ptacek](http://krebsonsecurity.com/2012/06/how-to-break-into-security-ptacek-edition/#more-15594), [Bruce Schneier](http://krebsonsecurity.com/2012/07/how-to-break-into-security-schneier-edition/#more-15592), [Charlie Miller](http://krebsonsecurity.com/category/how-to-break-into-security/).
- [How to be a InfoSec Geek](http://www.primalsecurity.net/how-to-be-an-infosec-geek/).
- [Continuous security](https://www.infoq.com/news/2019/08/continuous-security/).
- [How to not get hacked](https://kubernetes.io/blog/2018/07/18/11-ways-not-to-get-hacked/).
-
-### Privilege Escalation
-
-* [Awesome Privilege Escalation](https://github.com/m0nad/awesome-privilege-escalation).
+- [Awesome Privilege Escalation](https://github.com/m0nad/awesome-privilege-escalation).
-### Post-Exploitation
+
+
+### post-exploitation
* [Metasploit Post Exploitation Command List](https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMNF2m3nIPEA_kekqqqA2Ywto/edit).
* [Obscure Systems (AIX, Embeded, etc) Post-Exploit Command List](https://docs.google.com/document/d/1CIs6O1kMR-bXAT80U6Jficsqm0yR5dKUfUQgwiIKzgc/edit).
@@ -75,9 +64,9 @@
* [Windows Post-Exploitation Command List](https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_US).
* [Linux/Unix/BSD Post-Exploitation Command List](https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM-1N-EWPRz2770K4/edit?hl=en_US).
+
-
-### Books
+### books
- [Bulletproof SSL and TLS](http://www.amazon.com/gp/product/1907117040?psc=1&redirect=true&ref_=oh_aui_detailpage_o06_s00).
- [Reversing: Secrets of Reverse Engineering](http://www.amazon.com/Reversing-Secrets-Engineering-Eldad-Eilam/dp/0764574817).
@@ -97,4 +86,4 @@
- [Practice Malware Analysis](https://www.nostarch.com/malware).
- [This Machine Kills Secrets](http://www.amazon.com/This-Machine-Kills-Secrets-Whistleblowers/dp/0142180491/ref=sr_1_1?s=books&ie=UTF8&qid=1436039456&sr=1-1&keywords=this+Machine+Kills+Secrets).
----
+