From 4dc1f154785bd151e6b116d64aefd7eebcc851c4 Mon Sep 17 00:00:00 2001 From: =?UTF-8?q?=E4=B8=9C=E6=96=B9=E6=9C=89=E9=B1=BC=E5=90=8D=E4=B8=BA?= =?UTF-8?q?=E5=92=B8?= Date: Fri, 4 Oct 2019 15:08:34 +0800 Subject: [PATCH] Update README.md --- README.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index 66cb01a..065c431 100644 --- a/README.md +++ b/README.md @@ -1,7 +1,7 @@ - [Penetration_Testing_POC_With_Python](#PenetrationTestingPOCWithPython) - [IOT Device](#IOT-Device) - [Web APP](#Web-APP) - - [Mobile APP](#Mobile-APP) + - [提权辅助相关](#提权辅助相关) - [PC](#PC) - [tools](#tools-小工具集合) - [说明](#%E8%AF%B4%E6%98%8E) @@ -67,9 +67,10 @@ - [CVE-2019-16759 vBulletin 5.x 0day pre-auth RCE exploit](./CVE-2019-16759%20vBulletin%205.x%200day%20pre-auth%20RCE%20exploit.md) - [zentao-getshell 禅道8.2 - 9.2.1前台Getshell](./zentao-getshell) -## Mobile APP +## 提权辅助相关 -- 1.xxx +- [windows-kernel-exploits Windows平台提权漏洞集合](https://github.com/SecWiki/windows-kernel-exploits) +- [windows 溢出提权小记](https://klionsec.github.io/2017/04/22/win-0day-privilege/)/[本地保存了一份对照](./tools/Local%20ivilege%20alation.md) ## PC @@ -87,6 +88,7 @@ - [PHP 7.1-7.3 disable_functions bypass](./tools/PHP%207.1-7.3%20disable_functions%20bypass.md) - [cmd下查询3389远程桌面端口](./tools/cmd下查询3389远程桌面端口.md) - [伪装成企业微信名片的钓鱼代码](./tools/伪装成企业微信名片的钓鱼代码.txt) +- [vbulletin5-rce利用工具(批量检测/getshell)](https://github.com/theLSA/vbulletin5-rce)/[保存了一份源码:vbulletin5-rce.py](./tools/vbulletin5-rce.py) ## 说明