From fa0b42574be7b7250e5f4dac358c1e4084eb2bc7 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Mon, 13 Jul 2020 09:54:04 +0800 Subject: [PATCH] =?UTF-8?q?add=20seacms=5Fv10.1=E4=BB=A3=E7=A0=81=E5=AE=A1?= =?UTF-8?q?=E8=AE=A1=E5=AE=9E=E6=88=98&xShock-=E4=B8=80=E6=AC=BE=E9=92=88?= =?UTF-8?q?=E5=AF=B9Shellshock=E6=BC=8F=E6=B4=9E=E7=9A=84=E5=88=A9?= =?UTF-8?q?=E7=94=A8=E5=B7=A5=E5=85=B7=E3=80=90=E4=BE=8B=E5=A6=82=E4=BD=8E?= =?UTF-8?q?=E7=89=88=E6=9C=ACcgi=E7=9A=84=E9=BB=98=E8=AE=A4=E9=85=8D?= =?UTF-8?q?=E7=BD=AE=E9=A1=B5=E9=9D=A2=E8=BF=9B=E8=A1=8C=E5=88=A9=E7=94=A8?= =?UTF-8?q?=E3=80=91?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index c5d50e1..649a215 100644 --- a/README.md +++ b/README.md @@ -415,6 +415,7 @@ - [WAScan-一款功能强大的Web应用程序扫描工具【基于python开发的命令行扫描器】](https://github.com/m4ll0k/WAScan) - [Peinject_dll-CS插件之另类持久化方法-PE感染](https://github.com/m0ngo0se/Peinject_dll) - [MSSQL_BackDoor-摆脱MSSMS和 Navicat 调用执行 sp_cmdExec](https://github.com/evi1ox/MSSQL_BackDoor) +- [xShock-一款针对Shellshock漏洞的利用工具【例如低版本cgi的默认配置页面进行利用】](https://github.com/capture0x/xShock/) ## 文章/书籍/教程相关