From c037a5cf30c4324c3359ea4a5ae4da7c54fcb282 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Sun, 11 Sep 2022 16:01:20 +0800 Subject: [PATCH] =?UTF-8?q?add=20iscsicpl=5FbypassUAC=E6=97=A0=E5=BC=B9?= =?UTF-8?q?=E7=AA=97=E7=89=88&SharpHostInfo=EF=BC=9A=E4=B8=80=E6=AC=BE?= =?UTF-8?q?=E5=BF=AB=E9=80=9F=E6=8E=A2=E6=B5=8B=E5=86=85=E7=BD=91=E4=B8=BB?= =?UTF-8?q?=E6=9C=BA=E4=BF=A1=E6=81=AF=E5=B7=A5=E5=85=B7?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index c8a6356..4373b1e 100644 --- a/README.md +++ b/README.md @@ -1480,7 +1480,7 @@ - [GoBP:golang 编写的 shellcode 免杀生成器](https://github.com/awsaaaq/GoBP) - [MS17-010:纯 golang 实现ms17-010利用工具](https://github.com/For-ACGN/MS17-010) - [Searpy:URL采集、Favicon哈希值查找真实IP、子域名查找](https://github.com/j3ers3/Searpy) -- [iscsicpl_bypassUAC:UAC bypass for x64 Windows 7 - 11](https://github.com/hackerhouse-opensource/iscsicpl_bypassUAC) +- [iscsicpl_bypassUAC:UAC bypass for x64 Windows 7 - 11](https://github.com/hackerhouse-opensource/iscsicpl_bypassUAC)|[iscsicpl_bypassUAC无弹窗版](https://github.com/zha0gongz1/iscsicpl_bypassUAC) - [macos_shell_memory:通过CGO 在Macos内存中执行二进制文件](https://github.com/djhohnstein/macos_shell_memory) - [HVVExploitApply:使用JAVAFX图形化界面检测对HVV中常见的重点CMS系统和OA系统的已公开的漏洞进行验证](https://github.com/ExpLangcn/HVVExploitApply) - [CVE-2020-14882_Exploit_Gui:Weblogic 未授权命令执行漏洞GUI 利用工具](https://github.com/nice0e3/CVE-2020-14882_Exploit_Gui) @@ -1621,6 +1621,7 @@ - [EasyPen:Python + wxPython编写、提供简洁图形界面、支持跨平台的安全扫描工具,可用于企业内外网巡检、应急响应](https://github.com/lijiejie/EasyPen) - [CodeReviewTools:通过正则搜索、批量反编译特定Jar包中的class名称](https://github.com/Ppsoft1991/CodeReviewTools) - [ysoserial:1nhann修改和增加诸多新的反序列化攻击链](https://github.com/1nhann/ysoserial) +- [SharpHostInfo:一款快速探测内网主机信息工具](https://github.com/shmilylty/SharpHostInfo) ## 文章/书籍/教程相关