diff --git a/Payloads/Flip-ShortcutJacker/README.md b/Payloads/Flip-ShortcutJacker/README.md
index 0592e9e..6f926fc 100644
--- a/Payloads/Flip-ShortcutJacker/README.md
+++ b/Payloads/Flip-ShortcutJacker/README.md
@@ -30,23 +30,23 @@
YouTube Tutorial
-A script used to embed malware in the shortcut on your targets desktop
+A script used to embed malware in the shortcut on your target's desktop.
## Description
-This payload will run a powershell script in the background of any shortcut used on the targets desktop.
+This payload will run a PowerShell script in the background of any shortcut used on the targets desktop.
-This is done by taking advantage of the `Target` field where powershell commands can be stored or run.
+This is done by taking advantage of the `Target` field where PowerShell commands can be stored or run.
This field can store a max of 259 VISIBLE characters in that bar however after some testing I found you can store 924 characters int the `$code` variable and it will still run.
-So if your command exceeds that consider using an IWR function to download and execute a longer script.
+So if your command exceeds that, consider using an IWR function to download and execute a longer script.
I have an Invoke WebRequest tutorial for that [HERE](https://www.youtube.com/watch?v=bPkBzyEnr-w&list=PL3NRVyAumvmppdfMFMUzMug9Cn_MtF6ub&index=13)
-Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the powershell code you want executed is stored.
+Inside the .ps1 file you will find a line at the beginning with a ```$code``` variable. This is where the PowerShell code you want executed is stored.
---------------------------------------------------------------------------------------------------------------------------------------------------------
@@ -60,7 +60,7 @@ Using the `Get-Shortcut` function we will get the following information we can t
## Getting Started
-Once the script is executed all of the shortcuts on your target's desktop will be infected with the powershell code you have stored in the `$code` variable in the .ps1 file
+Once the script is executed, all of the shortcuts on your target's desktop will be infected with the PowerShell code you have stored in the `$code` variable in the .ps1 file
### Dependencies