From 1dbbb2784646ab21dc47e8280a6e0bffe2b2e29e Mon Sep 17 00:00:00 2001 From: xx <0x7fancyxx@gmail.com> Date: Tue, 13 Jul 2021 11:45:47 +0800 Subject: [PATCH] weekly update at 20210713 --- README.md | 21 +++++++++++++++++---- TOOLS_README.md | 6 +++--- 2 files changed, 20 insertions(+), 7 deletions(-) diff --git a/README.md b/README.md index 96387ec..9de0272 100644 --- a/README.md +++ b/README.md @@ -62,13 +62,26 @@ Not only large tools which break security barriers,various small tools that op 这里会更新最近涉及更新的项目 -- 2021.07.04 **HackBrowserData** +- 2021.07.12 **f8x** - [HackBrowserData](https://github.com/moonD4rk/HackBrowserData) 更新 v0.3.6 + [f8x](https://github.com/ffffffff0x/f8x) 更新 v1.5.4 -- 2021.07.05 **Viper** +- 2021.07.12 **Pocassist** + + [Pocassist](https://github.com/jweny/pocassist) 更新 v1.0.2 + +- 2021.07.11 **Viper** + + [Viper](https://github.com/FunnyWolf/Viper) 更新 v1.3.15 + +- 2021.07.11 **Platypus** + + [Platypus](https://github.com/WangYihang/Platypus) 更新 v1.4.3 + +- 2021.07.08 **Kunlun-M** + + [Kunlun-M](https://github.com/LoRexxar/Kunlun-M) 更新 v2.4.0 - [Viper](https://github.com/FunnyWolf/Viper) 更新 v1.3.14 - 2021.7.2 [**星链计划2.0-Galaxy**](https://github.com/knownsec/404StarLink2.0-Galaxy) diff --git a/TOOLS_README.md b/TOOLS_README.md index a0f6dab..b32175e 100644 --- a/TOOLS_README.md +++ b/TOOLS_README.md @@ -109,7 +109,7 @@ https://github.com/C4o/Juggler 该项目利用了渗透测试从业者在渗透测试中的惯性思维反影响攻击者,从而大幅度的影响了攻击者的渗透思路。可惜的是,该项目本身强依赖基础WAF,单靠Juggler很难提升防护本身的能力。 -### [OpenStar](https://github.com/starjun/openstar) +### [OpenStar](https://github.com/starjun/openstar) ![](https://img.shields.io/badge/-New-red) ![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%E2%98%85-green) ![](https://img.shields.io/badge/Language-Lua-blue) ![](https://img.shields.io/badge/Author-starjun-orange) ![GitHub stars](https://img.shields.io/github/stars/starjun/openstar.svg?style=flat&logo=github) ##### 项目链接: https://github.com/starjun/openstar @@ -280,7 +280,7 @@ myscan是参考awvs的poc目录架构,pocsuite3、sqlmap等代码框架,以 被动扫描器+不断更新收集的poc+burp插件是很不错的渗透测试使用场景,不错的代码质量也是作为开源项目的保障。只是每次都需要启动redis对于日常使用来说还是有些不方便。 -### [Pocassist](https://github.com/jweny/pocassist) +### [Pocassist](https://github.com/jweny/pocassist) ![](https://img.shields.io/badge/-New-red) ![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%e2%98%86-green) ![](https://img.shields.io/badge/Language-Golang-blue) ![](https://img.shields.io/badge/Author-jweny-orange) ![GitHub stars](https://img.shields.io/github/stars/jweny/pocassist.svg?style=flat&logo=github) ##### 项目链接: @@ -362,7 +362,7 @@ VIPER是一款图形化内网渗透工具,将内网渗透过程中常用的战 一个好用的工具+靠谱的作者是一个开源项目成熟最关键的特点,在特殊的时期,你一定需要这样一个工具。 -### [MDUT](https://github.com/SafeGroceryStore/MDUT) +### [MDUT](https://github.com/SafeGroceryStore/MDUT) ![](https://img.shields.io/badge/-New-red) ![](https://img.shields.io/badge/Positivity-IN-green) ![](https://img.shields.io/badge/Score-%E2%98%85%E2%98%85%E2%98%85%E2%98%85%e2%98%86-green) ![](https://img.shields.io/badge/Language-Java-blue) ![](https://img.shields.io/badge/Author-Ch1ngg-orange) ![GitHub stars](https://img.shields.io/github/stars/SafeGroceryStore/MDUT.svg?style=flat&logo=github) ##### 项目链接: