diff --git a/README.md b/README.md
index 1a965e8..a90342a 100644
--- a/README.md
+++ b/README.md
@@ -14,13 +14,13 @@ Excessive SMB share ACLs are a systemic problem and an attack surface that all o
Bonus Features:
-* Generate directory listing dump for configurable depth
-* Search for file types across discovered shares
+* Stand alone LLM functions: https://github.com/NetSPI/PowerHuntShares/blob/main/Scripts/Invoke-FingerPrintShare.ps1
+* Stand alone password parsers: https://github.com/NetSPI/PowerHuntShares/tree/main/Scripts/ConfigParsers
-I've also put together a few other resources to get you started:
-* Blog: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares/
-* Presentation Video : https://www.youtube.com/watch?v=TtwyQchCz6E
-* Presentation Slides: https://www.slideshare.net/nullbind/into-the-abyss-evaluating-active-directory-smb-shares-on-scale-secure360-251762721
+PowerHuntShares v1 Resources:
+* v1 Blog: https://www.netspi.com/blog/technical/network-penetration-testing/network-share-permissions-powerhuntshares/
+* v1 Presentation Video : https://www.youtube.com/watch?v=TtwyQchCz6E
+* v1 Presentation Slides: https://www.slideshare.net/nullbind/into-the-abyss-evaluating-active-directory-smb-shares-on-scale-secure360-251762721
# Vocabulary
PowerHuntShares will inventory SMB share ACLs configured with "excessive privileges" and highlight "high risk" ACLs. Below is how those are defined in this context.