From ffe65b8335a3e5ec5eb635830507d2abc8b8749d Mon Sep 17 00:00:00 2001 From: "copilot-swe-agent[bot]" <198982749+Copilot@users.noreply.github.com> Date: Mon, 6 Apr 2026 00:50:41 +0000 Subject: [PATCH] =?UTF-8?q?docs:=20=E6=B7=BB=E5=8A=A0=20shannon=20AI?= =?UTF-8?q?=E6=B8=97=E9=80=8F=E6=B5=8B=E8=AF=95=E5=B7=A5=E5=85=B7=20(Keygr?= =?UTF-8?q?aphHQ/shannon)=20=E5=88=B0=20Web=20APP=20=E9=83=A8=E5=88=86?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Agent-Logs-Url: https://github.com/Mr-xn/Penetration_Testing_POC/sessions/104eb426-4d68-4f03-a5a0-572d698ed826 Co-authored-by: Mr-xn <18260135+Mr-xn@users.noreply.github.com> --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 35bd8e7..5e46eea 100644 --- a/README.md +++ b/README.md @@ -806,6 +806,7 @@ - [深科特 LEAN MES系统 ChooseImage.aspx 任意文件上传/删除漏洞](https://mrxn.net/jswz/lean-mes-ChooseImage-fileupload-rce-filedel.html) - [深科特 LEAN MES系统 SetDataSource.aspx SQL注入漏洞](https://mrxn.net/jswz/lean-mes-SetDataSource-sqli.html) - [CLIProxyAPI /v1internal:method 未授权访问漏洞](https://mrxn.net/news/CLIProxyAPI-v1internal-method-unauthorized-access.html) +- [shannon:面向 Web 应用与 API 的自主 AI 渗透测试工具,支持代码感知动态漏洞挖掘与自动化 PoC 验证](https://github.com/KeygraphHQ/shannon) ## 提权辅助相关