From 310617511d9684f9493254b9dbfc6d6f2de81352 Mon Sep 17 00:00:00 2001 From: CX330 Date: Tue, 10 Dec 2024 22:42:50 +0800 Subject: [PATCH] Update README.md --- README.md | 4 ++++ 1 file changed, 4 insertions(+) diff --git a/README.md b/README.md index ebc075b..c0e2f6a 100644 --- a/README.md +++ b/README.md @@ -24,6 +24,10 @@ Use the default settings to scan a URL. letsgo --url ``` +### What it looks like? +![image](https://github.com/user-attachments/assets/5e04950e-8ac3-4f31-b40c-6bddfe379574) + + ## Labs If you want to check what it can does, you can use the labs provided by Port Swigger. There're 6 labs which varies in defferent bypass skill to exploit the path traversal vulnerability, and **letsgo** can deal with ALL of them, quick, and precise. Use the lab to learn more about path traversal, GLHF!