From 525d4c2baa3c2c421e07fd0f37c2decb4c602eb4 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Tue, 16 Mar 2021 23:13:29 +0800 Subject: [PATCH] =?UTF-8?q?add=20vuldebug-JAVA=20=E6=BC=8F=E6=B4=9E?= =?UTF-8?q?=E8=B0=83=E8=AF=95=E9=A1=B9=E7=9B=AE=EF=BC=8C=E4=B8=BB=E8=A6=81?= =?UTF-8?q?=E4=B8=BA=E5=A4=8D=E7=8E=B0=E3=80=81=E8=B0=83=E8=AF=95java?= =?UTF-8?q?=E7=9B=B8=E5=85=B3=E7=9A=84=E6=BC=8F=E6=B4=9E?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 452ef81..d7ec621 100644 --- a/README.md +++ b/README.md @@ -871,6 +871,7 @@ - [Exchange攻击链 CVE-2021-26855&CVE-2021-27065分析](./books/Exchange攻击链%20CVE-2021-26855&CVE-2021-27065分析.pdf)-[原文地址](https://paper.seebug.org/1501/) - [【.Net代码审计】-.Net反序列化文章](https://github.com/Ivan1ee/NET-Deserialize) - [记一次利用mssql上线(关键词:绕过360,远程下载)](./books/记一次利用mssql上线.pdf) +- [vuldebug-JAVA 漏洞调试项目,主要为复现、调试java相关的漏洞](https://github.com/0nise/vuldebug) ## 说明