From 8dcd068e4901309b930ed038ed47176f3e558730 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Sun, 12 Jul 2020 16:57:39 +0800 Subject: [PATCH] =?UTF-8?q?add=20MSSQL=5FBackDoor-=E6=91=86=E8=84=B1MSSMS?= =?UTF-8?q?=E5=92=8C=20Navicat=20=E8=B0=83=E7=94=A8=E6=89=A7=E8=A1=8C=20sp?= =?UTF-8?q?=5FcmdExec?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index ee1e9f2..a288cd4 100644 --- a/README.md +++ b/README.md @@ -414,6 +414,7 @@ - [dede_funcookie.php-DEDECMS伪随机漏洞分析 (三) 碰撞点(爆破,伪造管理员cookie登陆后台getshell](./tools/dede_funcookie.php) - [WAScan-一款功能强大的Web应用程序扫描工具【基于python开发的命令行扫描器】](https://github.com/m4ll0k/WAScan) - [Peinject_dll-CS插件之另类持久化方法-PE感染](https://github.com/m0ngo0se/Peinject_dll) +- [MSSQL_BackDoor-摆脱MSSMS和 Navicat 调用执行 sp_cmdExec](https://github.com/evi1ox/MSSQL_BackDoor) ## 文章/书籍/教程相关