From d0bbd085f871f0047cd6ad4ae3cb684892c262ff Mon Sep 17 00:00:00 2001 From: Mrxn Date: Wed, 11 Mar 2020 14:58:16 +0800 Subject: [PATCH] =?UTF-8?q?add=20=E7=BB=87=E6=A2=A6=E5=85=A8=E7=89=88?= =?UTF-8?q?=E6=9C=AC=E6=BC=8F=E6=B4=9E=E6=89=AB=E6=8F=8F?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 3e609e6..893ed6b 100644 --- a/README.md +++ b/README.md @@ -249,6 +249,7 @@ - [云业CMS(yunyecms)的多处SQL注入审计分析](./books/云业CMS(yunyecms)的多处SQL注入审计分析.pdf)|[原文地址](https://xz.aliyun.com/t/7302)|[官网下载地址](http://www.yunyecms.com/index.php?m=version&c=index&a=index)|[sqlmap_yunyecms_front_sqli_tamp.py](./tools/sqlmap_yunyecms_front_sqli_tamp.py) - [www.flash.cn 的钓鱼页,中文+英文](https://github.com/r00tSe7en/Fake-flash.cn) - [【PHP】bypass disable_functions via LD_PRELOA (no need /usr/sbin/sendmail)](https://github.com/yangyangwithgnu/bypass_disablefunc_via_LD_PRELOAD) +- [织梦全版本漏洞扫描](https://github.com/Mr-xn/dedecmscan) ## 书籍相关