summaryrefslogtreecommitdiff
path: root/Why-should-I-use-this-over-binary-hacking?.md
diff options
context:
space:
mode:
Diffstat (limited to 'Why-should-I-use-this-over-binary-hacking?.md')
-rw-r--r--Why-should-I-use-this-over-binary-hacking?.md2
1 files changed, 1 insertions, 1 deletions
diff --git a/Why-should-I-use-this-over-binary-hacking?.md b/Why-should-I-use-this-over-binary-hacking?.md
index d2f303b..75ac552 100644
--- a/Why-should-I-use-this-over-binary-hacking?.md
+++ b/Why-should-I-use-this-over-binary-hacking?.md
@@ -9,4 +9,4 @@ Unlike binary hacking, one can easily change the size, locations, even the membe
*This is due to the incompleteness of the decompilations; for example, SaveBlock2 cannot be modified as of yet since there are many functions that reference it that are not decompiled.
-**Before you start hacking, it is recommended that you have some experience in coding in either: C, C#, Java, Go or Rust if you want to use use the decompilation.** \ No newline at end of file
+**Before you start hacking, it is recommended that you have some experience in coding in either: C, C#, Java, or any other C-like programming language, if you want to use use the decompilation.** \ No newline at end of file