Corrected year in README (#1674)

Co-authored-by: db <db@example.com>
pull/1564/head
dabrd 3 years ago committed by GitHub
parent d3b1a91c1c
commit 758fb9cb82
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

@ -10,7 +10,7 @@ It has a boatload of features, see [FEATURES.md](FEATURES.md).
## Why? ## Why?
Vanilla GDB is terrible to use for reverse engineering and exploit development. Typing `x/g30x $esp` is not fun, and does not confer much information. The year is 2022 and GDB still lacks a real hexdump command! GDB's syntax is arcane and difficult to approach. Windbg users are completely lost when they occasionally need to bump into GDB. Vanilla GDB is terrible to use for reverse engineering and exploit development. Typing `x/g30x $esp` is not fun, and does not confer much information. The year is 2023 and GDB still lacks a real hexdump command! GDB's syntax is arcane and difficult to approach. Windbg users are completely lost when they occasionally need to bump into GDB.
## What? ## What?

Loading…
Cancel
Save