From 0dcaa9ba18ab8241333c87735405d37eb292fba0 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Mon, 30 Nov 2020 21:16:50 +0800 Subject: [PATCH] =?UTF-8?q?add=20CS-Loader=EF=BC=9Acobalt=20strike?= =?UTF-8?q?=E5=85=8D=E6=9D=80=E7=94=9F=E6=88=90?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 900ab0b..0ebb113 100644 --- a/README.md +++ b/README.md @@ -255,6 +255,7 @@ - [CVE-2019-1458-Win32k中的特权提升漏洞【shell可用-Windows提取】](https://github.com/unamer/CVE-2019-1458) - [CVE-2019-1253-Windows权限提升漏洞-AppXSvc任意文件安全描述符覆盖EoP的另一种poc](https://github.com/sgabe/CVE-2019-1253)|[CVE-2019-1253](https://github.com/padovah4ck/CVE-2019-1253) - [BypassAV【免杀】Cobalt Strike插件,用于快速生成免杀的可执行文件](https://github.com/hack2fun/BypassAV) +- [CS-Loader-cobalt strike免杀生成](https://github.com/Gality369/CS-Loader) - [CVE-2020-0674:Internet Explorer UAF 漏洞exp【在64位的win7测试了IE 8, 9, 10, and 11】](https://github.com/maxpl0it/CVE-2020-0674-Exploit) - [SMBGhost_AutomateExploitation-SMBGhost (CVE-2020-0796) Automate Exploitation and Detection](https://github.com/Barriuso/SMBGhost_AutomateExploitation) - [MS Windows OLE 远程代码执行漏洞(CVE-2020-1281)](https://github.com/guhe120/Windows-EoP/tree/master/CVE-2020-1281)