diff --git a/README.md b/README.md
index f4270728..02e2726d 100644
--- a/README.md
+++ b/README.md
@@ -11,10 +11,6 @@ A high-performance Windows process emulator that operates at the syscall level,
Built in C++ and powered by the Unicorn Engine.
-##
-> [!NOTE]
-> The project is still in a very early, prototypy state. The code still needs a lot of cleanup and many features and syscalls need to be implemented. However, constant progress is being made :)
-
## Key Features
* __Syscall-Level Emulation__: Instead of reimplementing Windows APIs, the emulator operates at the syscall level, allowing it to leverage existing system DLLs
@@ -27,6 +23,20 @@ Built in C++ and powered by the Unicorn Engine.
Perfect for security research, malware analysis, and DRM research where fine-grained control over process execution is required.
+##
+> [!NOTE]
+> The project is still in a very early, prototypy state. The code still needs a lot of cleanup and many features and syscalls need to be implemented. However, constant progress is being made :)
+
+## Preview
+
+
+
+## YouTube Overview
+
+[](https://www.youtube.com/watch?v=wY9Q0DhodOQ)
+
+Click here for the slides.
+
## Building
Make sure to clone the repo including all submodules.
@@ -77,13 +87,3 @@ With Ninja, execute the CTest command in the ninja build folder (e.g. `build/rel
```bash
ctest
```
-
-## Preview
-
-
-
-## YouTube Overview
-
-[](https://www.youtube.com/watch?v=wY9Q0DhodOQ)
-
-Click here for the slides.