diff --git a/README.md b/README.md index bcd47fb..972cdb6 100644 --- a/README.md +++ b/README.md @@ -6,11 +6,11 @@ This folder contains a variety of vulnerability exploitations for working with g ## Running an explotation Download goby from [release page](https://github.com/gobysec/Goby/releases), and run. ### Scan ips which may exist the vulnerability -![goby new scan](./imgs/scan.png "goby new scan") +![goby new scan](https://s3.bmp.ovh/imgs/2024/02/29/f7487e819a85c876.png) ### Click "verify" button -![goby verify](./imgs/verify.png "goby verify") +![goby verify](https://s3.bmp.ovh/imgs/2024/02/29/e64a52c2453abecb.jpg) ### Do some action like execute cmd, or get a reverse shell -![goby explotation](./imgs/opensmtpd_rce_CVE-2020-7247.png "goby explotation") +![goby explotation](https://s3.bmp.ovh/imgs/2024/02/29/1499a000e195f95a.jpg) ## Contributing Pull Requests and contributions to this project are encouraged and greatly welcomed! The goby project always needs new vulnerabilities, and needs talented developers (such as yourself!) to submit fixes for the existing demos when they break.