README.md in shodanz-1.0.5 vs README.md in shodanz-1.0.6

- old
+ new

@@ -269,10 +269,10 @@ This method behaves identical to the Exploits API `search` method with the difference that it doesn't return any results. ```ruby client.exploits_api.count("python") # Count Snek vulns. client.exploits_api.count(port: 22) # Port number for the affected service if the exploit is remote. -client.exploits_api.search(type: "shellcode") # A category of exploit to search for. +client.exploits_api.count(type: "shellcode") # A category of exploit to search for. client.exploits_api.count(osvdb: "100007") # Open Source Vulnerability Database ID for the exploit. ``` ## License