Skip to content

Commit ed767b8

Browse files
committed
Update README with clearer screenshot labels
Added section headers to distinguish between Windows and Linux version screenshots in the README for improved clarity.
1 parent 6f28e7c commit ed767b8

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

README.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
[![Actively Maintained](https://img.shields.io/badge/Maintenance%20Level-Actively%20Maintained-green.svg)](https://gist.github.com/cheerfulstoic/d107229326a01ff0f333a1d3476e068d) [![Version-2.0.8](https://img.shields.io/badge/Version-2.0.8-green)](https://img.shields.io/badge/Version-2.0.8-green) [![License GNU/GPL2.0](https://img.shields.io/badge/License-GNU/GPL2.0-blue)](https://github.com/kaotickj/The-Not-So-Simple-PHP-Command-Shell/blob/main/LICENSE) [![Language PHP](https://img.shields.io/badge/Language-PHP-red)](https://www.php.net/)
22

33
# The Not-So Simple PHP Command Shell 🕵🔎 ️
4-
![Logo](/img/nsscmdshell.png)
4+
### Windows Version Screenshot
5+
![Windows Version Screenshot](/img/nsscmdshell.png)
6+
### Linux Version Screenshot
57
![Linux Version Screenshot](/img/linux-nsscmdshell.png)
68
## Foreword:
79
> Please note that gaining access to the target is beyond the scope of this writing and your responsibility to establish in a manner consistent with established law. This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload and execute tools such as netcat or msvenom payload for further access to the target. The following websites provide training resources and practice scenarios and are excellent resources for learning such skills:

0 commit comments

Comments
 (0)