From 83ca7eba438a3bc5e926d656b78ebad0c94aa569 Mon Sep 17 00:00:00 2001 From: Mrxn Date: Thu, 27 Feb 2020 14:00:28 +0800 Subject: [PATCH] =?UTF-8?q?add=20get=5FTeam=5FPass-=E8=8E=B7=E5=8F=96?= =?UTF-8?q?=E7=9B=AE=E6=A0=87=E6=9C=BA=E5=99=A8=E4=B8=8A=E7=9A=84teamviewe?= =?UTF-8?q?rID=E5=92=8C=E5=AF=86=E7=A0=81(=E4=BD=A0=E9=9C=80=E8=A6=81?= =?UTF-8?q?=E5=85=B7=E6=9C=89=E6=9C=89=E6=95=88=E7=9A=84=E7=9B=AE=E6=A0=87?= =?UTF-8?q?=E6=9C=BA=E5=99=A8=E8=B4=A6=E5=8F=B7=E5=AF=86=E7=A0=81=E4=B8=94?= =?UTF-8?q?=E7=9B=AE=E6=A0=87=E6=9C=BA=E5=99=A8445=E7=AB=AF=E5=8F=A3?= =?UTF-8?q?=E5=8F=AF=E4=BB=A5=E8=A2=AB=E8=AE=BF=E9=97=AE(=E5=BC=80?= =?UTF-8?q?=E6=94=BE445=E7=AB=AF=E5=8F=A3)?= MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit --- README.md | 1 + 1 file changed, 1 insertion(+) diff --git a/README.md b/README.md index 3cafc4b..3df207c 100644 --- a/README.md +++ b/README.md @@ -225,6 +225,7 @@ - [内网渗透中常用的c#程序整合成cs脚本,直接内存加载](https://github.com/uknowsec/SharpToolsAggressor) - [又一个各种漏洞poc、Exp的收集或编写](https://github.com/coffeehb/Some-PoC-oR-ExP) - [内网渗透代理转发利器reGeorg](https://github.com/sensepost/reGeorg)|**相关文章:**[配置reGeorg+Proxifier渗透内网](https://www.k0rz3n.com/2018/07/06/如何使用reGeorg+Proxifier渗透内网)|[reGeorg+Proxifier实现内网sock5代理](http://jean.ink/2018/04/26/reGeorg/)|[内网渗透之reGeorg+Proxifier](https://sky666sec.github.io/2017/12/16/内网渗透之reGeorg-Proxifier)|[reGeorg+Proxifier使用](https://xz.aliyun.com/t/228) +- [get_Team_Pass-获取目标机器上的teamviewerID和密码(你需要具有有效的目标机器账号密码且目标机器445端口可以被访问(开放445端口))](https://github.com/kr1shn4murt1/get_Team_Pass/) ## 书籍相关