mirror of
https://github.com/Mr-xn/Penetration_Testing_POC.git
synced 2026-05-10 07:00:52 +08:00
Add Shannon-related security tools to README (#46)
* Initial plan * docs: 添加 FirmWire (Samsung Shannon 基带固件动态分析平台) 到 IOT 部分 Agent-Logs-Url: https://github.com/Mr-xn/Penetration_Testing_POC/sessions/b15a0865-f34e-4dc0-9983-d2a560701369 Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com> * docs: 添加 shannon AI渗透测试工具 (KeygraphHQ/shannon) 到 Web APP 部分 Agent-Logs-Url: https://github.com/Mr-xn/Penetration_Testing_POC/sessions/104eb426-4d68-4f03-a5a0-572d698ed826 Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com> --------- Co-authored-by: copilot-swe-agent[bot] <198982749+Copilot@users.noreply.github.com> Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com>
This commit is contained in:
@@ -83,6 +83,7 @@
|
||||
- [路由器dd手动提取固件---迅捷PoEAC路由一体机FR100P-AC固件提取](./books/路由器dd手动提取固件---迅捷PoEAC路由一体机FR100P-AC固件提取.html)
|
||||
- [NX_Firmware:任天堂Switch各版本固件数据库](https://github.com/THZoria/NX_Firmware)
|
||||
- [vphone-aio:一键运行已越狱并安装完整bootstrap的iOS虚拟手机(vphone)脚本](https://github.com/34306/vphone-aio)
|
||||
- [FirmWire:支持三星 Shannon 和 MediaTek 基带固件的全系统动态分析平台,可用于模糊测试、漏洞根因分析与调试](https://github.com/FirmWire/FirmWire)
|
||||
|
||||
## <span id="head4">Web APP</span>
|
||||
|
||||
@@ -805,6 +806,7 @@
|
||||
- [深科特 LEAN MES系统 ChooseImage.aspx 任意文件上传/删除漏洞](https://mrxn.net/jswz/lean-mes-ChooseImage-fileupload-rce-filedel.html)
|
||||
- [深科特 LEAN MES系统 SetDataSource.aspx SQL注入漏洞](https://mrxn.net/jswz/lean-mes-SetDataSource-sqli.html)
|
||||
- [CLIProxyAPI /v1internal:method 未授权访问漏洞](https://mrxn.net/news/CLIProxyAPI-v1internal-method-unauthorized-access.html)
|
||||
- [shannon:面向 Web 应用与 API 的自主 AI 渗透测试工具,支持代码感知动态漏洞挖掘与自动化 PoC 验证](https://github.com/KeygraphHQ/shannon)
|
||||
|
||||
|
||||
## <span id="head5"> 提权辅助相关</span>
|
||||
|
||||
Reference in New Issue
Block a user