From a4bf60559be2a8f32a05a7fffd42d1c999206481 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Sun, 23 Jan 2022 20:33:21 +0800 Subject: [PATCH] =?UTF-8?q?add=20Pentesting-Active-Directory-CN=EF=BC=9A?= =?UTF-8?q?=E5=9F=9F=E6=B8=97=E9=80=8F=E8=84=91=E5=9B=BE=E4=B8=AD=E6=96=87?= =?UTF-8?q?=E7=BF=BB=E8=AF=91=E7=89=88?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 1fdf326..58de19e 100644 --- a/README.md +++ b/README.md @@ -971,6 +971,7 @@ - [TrustedPath-UACBypass-BOF:Beacon object file implementation for trusted path UAC bypass](https://github.com/netero1010/TrustedPath-UACBypass-BOF) - [Quser-BOF:Cobalt Strike BOF for quser.exe implementation using Windows API](https://github.com/netero1010/Quser-BOF) - [SharpGhosting:C#写的创建幽灵进程的工具](https://github.com/Wra7h/SharpGhosting) +- [Pentesting-Active-Directory-CN:域渗透脑图中文翻译版](https://github.com/NyDubh3/Pentesting-Active-Directory-CN)|[英文原版](https://github.com/Orange-Cyberdefense/arsenal/) ## 文章/书籍/教程相关