From d9ce3f5ab9aa4947f9206ef2b4febc7e01c150dd Mon Sep 17 00:00:00 2001 From: Mrxn Date: Fri, 5 Nov 2021 20:27:36 +0800 Subject: [PATCH] =?UTF-8?q?add=20linux=5Fdirty=EF=BC=9A=E6=9B=B4=E6=94=B9?= =?UTF-8?q?=E5=90=8E=E7=9A=84=E8=84=8F=E7=89=9B=E6=8F=90=E6=9D=83=E4=BB=A3?= =?UTF-8?q?=E7=A0=81=EF=BC=8C=E5=8F=AF=E4=BB=A5=E5=BE=80=E4=BB=BB=E6=84=8F?= =?UTF-8?q?=E6=96=87=E4=BB=B6=E5=86=99=E5=85=A5=E4=BB=BB=E6=84=8F=E5=86=85?= =?UTF-8?q?=E5=AE=B9=EF=BC=8C=E5=8E=BB=E9=99=A4=E4=BA=A4=E4=BA=92=E8=BF=87?= =?UTF-8?q?=E7=A8=8B?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 9cca2a7..0876434 100644 --- a/README.md +++ b/README.md @@ -234,7 +234,7 @@ - [windows 溢出提权小记](https://klionsec.github.io/2017/04/22/win-0day-privilege/)/[本地保存了一份+Linux&Windows提取脑图](./tools/Local%20Privilege%20Escalation.md) - [Windows常见持久控制脑图](./tools/Windows常见持久控制.png) - [CVE-2019-0803 Win32k漏洞提权工具](./CVE-2019-0803) -- [脏牛Linux提权漏洞](https://github.com/Brucetg/DirtyCow-EXP)-[reverse_dirty-更改的脏牛提权代码,可以往任意文件写入任意内容](https://github.com/Rvn0xsy/reverse_dirty) +- [脏牛Linux提权漏洞](https://github.com/Brucetg/DirtyCow-EXP)-[reverse_dirty-更改的脏牛提权代码,可以往任意文件写入任意内容](https://github.com/Rvn0xsy/reverse_dirty)|[linux_dirty:更改后的脏牛提权代码,可以往任意文件写入任意内容,去除交互过程](https://github.com/Rvn0xsy/linux_dirty) - [远控免杀从入门到实践之白名单(113个)](https://github.com/TideSec/BypassAntiVirus)|[远控免杀从入门到实践之白名单(113个)总结篇.pdf](./books/远控免杀从入门到实践之白名单(113个)总结篇.pdf) - [Linux提权-CVE-2019-13272 A linux kernel Local Root Privilege Escalation vulnerability with PTRACE_TRACEME](https://github.com/jiayy/android_vuln_poc-exp/tree/master/EXP-CVE-2019-13272-aarch64) - [Linux权限提升辅助一键检测工具](https://github.com/mzet-/linux-exploit-suggester)