From 4ee9b9d2cb766184f26178a6fce916da3b472a34 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Mon, 30 Nov 2020 21:25:14 +0800 Subject: [PATCH] =?UTF-8?q?add=20CVE-2019-0708-EXP-Windows-CVE-2019-0708-E?= =?UTF-8?q?XP-Windows=E7=89=88=E5=8D=95=E6=96=87=E4=BB=B6exe=E7=89=88,?= =?UTF-8?q?=E8=BF=90=E8=A1=8C=E5=90=8E=E7=9B=B4=E6=8E=A5=E5=9C=A8=E5=BD=93?= =?UTF-8?q?=E5=89=8D=E6=8E=A7=E5=88=B6=E5=8F=B0=E5=8F=8D=E5=BC=B9System?= =?UTF-8?q?=E6=9D=83=E9=99=90Shell?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 0ebb113..e95458a 100644 --- a/README.md +++ b/README.md @@ -230,7 +230,7 @@ ## PC -- [ 微软RDP远程代码执行漏洞(CVE-2019-0708)](./BlueKeep) +- [ 微软RDP远程代码执行漏洞(CVE-2019-0708)](./BlueKeep)-[CVE-2019-0708-EXP-Windows-CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell](https://github.com/cbwang505/CVE-2019-0708-EXP-Windows) - [CVE-2019-0708-python版](./BlueKeep/bluekeep-CVE-2019-0708-python) - [MS17-010-微软永恒之蓝漏洞](https://github.com/Mr-xn/MS17-010) - [macOS-Kernel-Exploit](./macOS-Kernel-Exploit)