From f88764c249afbde024e52192de151bbec32e62c0 Mon Sep 17 00:00:00 2001 From: helloexp <21156949+helloexp@users.noreply.github.com> Date: Tue, 1 Mar 2022 12:51:11 +0800 Subject: [PATCH] update readme --- README-en.md | 29 +++++++++++++++++++++++++++++ README.md | 11 ++++++++++- 2 files changed, 39 insertions(+), 1 deletion(-) create mode 100644 README-en.md diff --git a/README-en.md b/README-en.md new file mode 100644 index 0000000..6d82e3a --- /dev/null +++ b/README-en.md @@ -0,0 +1,29 @@ +# 0day +[![GitHub forks](https://img.shields.io/github/forks/helloexp/0day)](https://github.com/helloexp/0day/network) [![GitHub stars](https://img.shields.io/github/stars/helloexp/0day)](https://github.com/helloexp/0day/stargazers) [![GitHub issues](https://img.shields.io/github/issues/helloexp/0day)](https://github.com/helloexp/0day/issues) +### [中文版本](./README.md) +EXP, POC of various CMS, platforms, systems, software vulnerabilities, the project will be constantly updated +## Excellent project list +1. Fastjson RCE [https://github.com/dbgee/fastjson-rce](https://github.com/dbgee/fastjson-rce) +2. Log4j RCE [https://github.com/dbgee/log4j2_rce](https://github.com/dbgee/log4j2_rce) +3. redis RCE [https://github.com/Ridter/redis-rce](https://github.com/Ridter/redis-rce) +4. Thinkphp RCE [https://github.com/helloexp/0day](https://github.com/helloexp/0day/tree/master/Thinkphp) +5. Windows RCE [https://github.com/smgorelik/Windows-RCE-exploits](https://github.com/smgorelik/Windows-RCE-exploits) +6. shiro deserialization [https://github.com/helloexp/0day/tree/master/shiro](https://github.com/helloexp/0day/tree/master/shiro) +7. VPS2SUSE [https://github.com/U2FsdGVkX1/vps2suse](https://github.com/U2FsdGVkX1/vps2suse) + +## Why start this project? +1. A few months ago, I participated in an AWD offensive and defensive game and found that collecting POC in advance is very good way, and I can learn a lot in the process of collecting these `payloads`. +2. Subsequent HW, CTF, or daily infiltration activities can quickly locate and exploit. +## Feedback on the issues +Any issues about this project you can feedback to me,or open pull request directly. +## POC、EXP contribution +1. Fork [This project](https://github.com/helloexp/0day) your github accout +2. Clone repo to your local PC +3. Modify code at your local pc(Add poc、exp Or fix bug) +4. push code to your account +5. PR (open pull requests) to this project + 1. Contributions, + readme update、readme translate、bug fix、function improvement、new features,etc. + 2. star、fork to support this project is also grateful +## Excellent project inclusion +If you need to show your excellent work in this project,please add prject address here [README.md](https://github.com/helloexp/0day/edit/master/README.md) and open pull request diff --git a/README.md b/README.md index b066685..faa9158 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # 0day [![GitHub forks](https://img.shields.io/github/forks/helloexp/0day)](https://github.com/helloexp/0day/network) [![GitHub stars](https://img.shields.io/github/stars/helloexp/0day)](https://github.com/helloexp/0day/stargazers) [![GitHub issues](https://img.shields.io/github/issues/helloexp/0day)](https://github.com/helloexp/0day/issues) - +### [README in English](./README-en.md) 各种CMS、各种平台、各种系统、各种软件漏洞的EXP、POC ,该项目将不断更新 ## 优秀项目列表 1. Fastjson RCE [https://github.com/dbgee/fastjson-rce](https://github.com/dbgee/fastjson-rce) @@ -16,5 +16,14 @@ 2. 后续的HW、CTF、或日常的渗透等活动可以快速定位、利用漏洞. ## 问题反馈 在使用中有任何问题,欢迎反馈给我,可以直接发起 PR或issue. +## POC、EXP 贡献 +1. Fork [本项目](https://github.com/helloexp/0day) 到自己的github 账号下 +2. Clone 自己的项目代码到本地 +3. 在本地修改代码(新增poc、exp,或修复bug) +4. push 代码到自己的项目下 +5. PR (open pull requests) 到本项目 + 1. 贡献类型可以有很多, + readme 更新、readme 翻译、bug修复、功能优化、功能新增等等等等 + 2. star、fork 支持本项目的人气也非常感谢 ## 优秀项目收录 如果需要在本项目中展示自己的github 项目,请在[README.md](https://github.com/helloexp/0day/edit/master/README.md) 添加项目地址,然后提交PR即可(open pull request)