From c32bc87345fa331cd5f4db47ae914a30c3e401e7 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Tue, 14 Jul 2020 09:39:28 +0800 Subject: [PATCH] =?UTF-8?q?add=20[code6-=E7=A0=81=E5=B0=8F=E5=85=AD?= =?UTF-8?q?=E6=98=AF=E4=B8=80=E6=AC=BE=20GitHub=20=E4=BB=A3=E7=A0=81?= =?UTF-8?q?=E6=B3=84=E9=9C=B2=E7=9B=91=E6=8E=A7=E7=B3=BB=E7=BB=9F=EF=BC=8C?= =?UTF-8?q?=E9=80=9A=E8=BF=87=E5=AE=9A=E6=9C=9F=E6=89=AB=E6=8F=8F=20GitHub?= =?UTF-8?q?=20=E5=8F=91=E7=8E=B0=E4=BB=A3=E7=A0=81=E6=B3=84=E9=9C=B2?= =?UTF-8?q?=E8=A1=8C=E4=B8=BA?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index b516bb5..3dc2472 100644 --- a/README.md +++ b/README.md @@ -416,7 +416,8 @@ - [Peinject_dll-CS插件之另类持久化方法-PE感染](https://github.com/m0ngo0se/Peinject_dll) - [MSSQL_BackDoor-摆脱MSSMS和 Navicat 调用执行 sp_cmdExec](https://github.com/evi1ox/MSSQL_BackDoor) - [xShock-一款针对Shellshock漏洞的利用工具【例如低版本cgi的默认配置页面进行利用】](https://github.com/capture0x/xShock/) -- [tini-tools-针对红蓝对抗各个场景使用的小工具](https://github.com/sunird/tini-tools) +- [tini-tools-针对红蓝对抗各个场景使用的小工具-【主要是Java写的工具】【目前有phpstudy.jar和域名转IP工具.jar】](https://github.com/sunird/tini-tools) +- [code6-码小六是一款 GitHub 代码泄露监控系统,通过定期扫描 GitHub 发现代码泄露行为](https://github.com/4x99/code6) ## 文章/书籍/教程相关