From 8ae25549df76fa1b57742f2b03b7e50977636ced Mon Sep 17 00:00:00 2001 From: Mrxn Date: Thu, 18 Feb 2021 18:59:17 +0800 Subject: [PATCH] =?UTF-8?q?add=20=E4=BD=BF=E7=94=A8=20ICMP=20=E4=BC=A0?= =?UTF-8?q?=E9=80=92=20shellcode?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index be5fc78..a86e5ed 100644 --- a/README.md +++ b/README.md @@ -783,6 +783,7 @@ - [sign-逆向app的sign等参数的思路和体验, 安卓逆向, 安卓破解, 逆向app,爬虫解密](https://github.com/darbra/sign) - [Report_Public-DVPNET 公开漏洞知识库](https://github.com/DVPNET/Report_Public) - [DolphinPHP 1.4.2(_1.4.5)后台 GetShell](./books/DolphinPHP%201.4.2(_1.4.5)后台%20GetShell.pdf)-[原文地址](https://www.t00ls.net/thread-59636-1-1.html) +- [使用ICMP传递shellcode](./books/使用ICMP传递shellcode.pdf)-[原文地址](https://blog.romanrii.com/using-icmp-to-deliver-shellcode) ## 说明