diff --git a/README.md b/README.md
index 5bc6b94c8f80e93f468190eb36c6788f1c76ede7..4ef3e3a0fac3193633029f2a9fcfb4337ef24e61 100644
--- a/README.md
+++ b/README.md
@@ -1,7 +1,9 @@
-# CTF Tools
+# CTF Binary Rev/Pwn Tools
 
 This is a collection of tools and installation instructions of tools we commonly use in CTFs.
-This is not a complete list and any instructions are only suggestions.
+Any instructions are only suggestions.
+
+Also, this is not even remotely a complete list. Many challenges depend on you finding the right tool for the job and there are far too many tools out there to list them here. But at least when dealing with Linux binaries, these are the tools we spend over 90% of our time with.
 
 Feel free to adapt anything to your needs, if you prefer a different way, and submit feedback.
 Also use this as a starting point to learn about any of the tools that are new to you.
@@ -15,7 +17,7 @@ Also use this as a starting point to learn about any of the tools that are new t
 
 ### Docker
 
-In Docker we can run Containers, which are isolated Linux environments. 
+In Docker we can run Containers, which are isolated Linux environments.
 
 For example, many CTF challenges contain Dockerfiles that allow us to recreate the environment in which the challenge was created, so we can avoid any compatibility issues.
 
@@ -29,6 +31,10 @@ Alternative: [Podman](https://podman.io/).
 
 [Ghidra](https://github.com/NationalSecurityAgency/ghidra/releases) is a powerful disassembling tool made by the NSA (Yes, *that* NSA).
 
+- Make sure you have a recent Java JDK
+- Download the latest release and extract it.
+- Run `ghidraRun.sh (Mac/Linux host)` or `ghidraRun.bat (Windows host)`.
+
 [Binary Ninja](https://binary.ninja/free/) is a more easy-to-use alternative. Does some things better than Ghidra and a few more things worse.
 
 ### Python and virtual environments