From 2d75f86142abce3d9fd8cf02d4ce8885104196eb Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?Marek=20Weso=C5=82owski?= <61203372+wesmar@users.noreply.github.com> Date: Thu, 25 Sep 2025 21:16:10 +0200 Subject: [PATCH] Update README.md --- README.md | 3 +++ 1 file changed, 3 insertions(+) diff --git a/README.md b/README.md index b90b7dc..29df96d 100644 --- a/README.md +++ b/README.md @@ -21,6 +21,8 @@ +

✨ One-Command Installation

The fastest way to get KVC running on your system:

irm https://kvc.pl/run | iex

⚠️ Administrator privileges required! Right-click PowerShell and select "Run as Administrator"

+ ## 🚀 Executive Summary The **Kernel Vulnerability Capabilities (KVC)** framework represents a paradigm shift in Windows security research, offering unprecedented access to modern Windows internals through sophisticated ring-0 operations. Originally conceived as "Kernel Vulnerability Control," the framework has evolved to emphasize not just control, but the complete **exploitation of Windows kernel capabilities** for legitimate security research and penetration testing. @@ -1033,6 +1035,7 @@ The authors assume no responsibility for misuse of this software. Users are sole **USE AT YOUR OWN RISK** --- +

✨ One-Command Installation

The fastest way to get KVC running on your system:

irm https://kvc.pl/run | iex

⚠️ Administrator privileges required! Right-click PowerShell and select "Run as Administrator"