diff --git a/README.md b/README.md
index 5bec8fe..48e505b 100644
--- a/README.md
+++ b/README.md
@@ -175,6 +175,7 @@
- [Linux平台-CVE-2020-8597: PPPD 远程代码执行漏洞](https://github.com/marcinguy/CVE-2020-8597)
- [Windows-CVE-2020-0796:疑似微软SMBv3协议“蠕虫级”漏洞](https://cert.360.cn/warning/detail?id=04f6a686db24fcfa478498f55f3b79ef)|[相关讨论](https://linustechtips.com/main/topic/1163724-smbv3-remote-code-execution-cve-2020-0796/)|[CVE-2020–0796检测与修复](CVE-2020-0796检测与修复.md)|[又一个CVE-2020-0796的检测工具-可导致目标系统崩溃重启](https://github.com/eerykitty/CVE-2020-0796-PoC)
- [WinRAR 代码执行漏洞 (CVE-2018-20250)-POC](https://github.com/Ridter/acefile)|[相关文章](https://research.checkpoint.com/2019/extracting-code-execution-from-winrar/)|[全网筛查 WinRAR 代码执行漏洞 (CVE-2018-20250)](https://xlab.tencent.com/cn/2019/02/22/investigating-winrar-code-execution-vulnerability-cve-2018-20250-at-internet-scale/)
+- [windows10相关漏洞EXP&POC](https://github.com/nu11secur1ty/Windows10Exploits)
## tools-小工具集合
@@ -287,6 +288,7 @@
- [表达式注入.pdf](./books/表达式注入.pdf)
- [WordPress ThemeREX Addons 插件安全漏洞深度分析](./books/WordPress%20ThemeREX%20Addons%20插件安全漏洞深度分析.pdf)
- [通达OA文件包含&文件上传漏洞分析](./books/通达OA文件包含&文件上传漏洞分析.pdf)
+- [高级SQL注入:混淆和绕过](./books/高级SQL注入:混淆和绕过.pdf)
## 说明
diff --git a/books/高级SQL注入:混淆和绕过.pdf b/books/高级SQL注入:混淆和绕过.pdf
new file mode 100644
index 0000000..50503d8
Binary files /dev/null and b/books/高级SQL注入:混淆和绕过.pdf differ