From 3484276c7f80f628a11dee02cf5a1e1b5d32c635 Mon Sep 17 00:00:00 2001 From: Ap3126 <72179924+Ap3126@users.noreply.github.com> Date: Thu, 1 Oct 2020 10:20:27 +0530 Subject: [PATCH] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index bef8dba..45ff6a3 100644 --- a/README.md +++ b/README.md @@ -3,7 +3,7 @@ Do you miss AXFR technique? This tool allows to get the subdomains from a HTTP** How it works? CTFR does not use neither dictionary attack nor brute-force, it just abuses of Certificate Transparency logs. For more information about CT logs, check www.certificate-transparency.org and [crt.sh](https://crt.sh/). -## Getting Started +## Getting Started To CTFR Please, follow the instructions below for installing and run CTFR. ### Pre-requisites