From f53d6f7ad6fe689cd9e7be396c28d9ca9d33c439 Mon Sep 17 00:00:00 2001
From: Brent Cook <busterb@gmail.com>
Date: Fri, 15 Mar 2019 21:08:19 -0500
Subject: [PATCH] Update java/javapayload/README.md

Co-Authored-By: wvu-r7 <wvu-r7@users.noreply.github.com>
---
 java/javapayload/README.md | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/java/javapayload/README.md b/java/javapayload/README.md
index 352f0044..4aac9a3a 100644
--- a/java/javapayload/README.md
+++ b/java/javapayload/README.md
@@ -38,7 +38,7 @@ Alternatively, the main class can of course be called from other
 classes, like `metasploit.Payload.main(null);`, as the arguments
 parameter is ignored. Note that in a sandboxed environment the caller
 needs to have all permissions, and also the *Payload* class has to be
-loaded with all permissions. In case there is untrusted code on the
+loaded with all permissions. In case there is untrusted code in the
 stack trace (but the direct caller has all permissions), the call has to
 be wrapped in a
 [doPrivileged](http://download.oracle.com/javase/1.4.2/docs/api/java/security/AccessController.html#doPrivileged\(java.security.PrivilegedExceptionAction\))