PyBot/JSON/xianzhi.json

1002 lines
35 KiB
JSON
Raw Normal View History

2024-12-25 22:57:42 +08:00
[
{
"title": "JAVA安全之SpEL表达式执行",
"link": "https://xz.aliyun.com/t/16905",
"published": "2024-12-25T14:36:47+08:00",
"id": "https://xz.aliyun.com/t/16905",
"summary": {
"@type": "html",
"#text": "JAVA安全之SpEL表达式执行"
}
},
{
"title": "从源码角度分析hessian特别的原因",
"link": "https://xz.aliyun.com/t/16904",
"published": "2024-12-25T13:46:49+08:00",
"id": "https://xz.aliyun.com/t/16904",
"summary": {
"@type": "html",
"#text": "从源码角度分析hessian特别的原因"
}
},
{
"title": "fastapi 框架中的无回显利用",
"link": "https://xz.aliyun.com/t/16903",
"published": "2024-12-25T13:27:28+08:00",
"id": "https://xz.aliyun.com/t/16903",
"summary": {
"@type": "html",
"#text": "fastapi 框架中的无回显利用"
}
},
{
"title": "Linux渗透实战之Trickster",
"link": "https://xz.aliyun.com/t/16902",
"published": "2024-12-25T11:49:15+08:00",
"id": "https://xz.aliyun.com/t/16902",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之Trickster"
}
},
{
"title": "HELLOCTF反序列化靶场全解",
"link": "https://xz.aliyun.com/t/16901",
"published": "2024-12-25T10:21:49+08:00",
"id": "https://xz.aliyun.com/t/16901",
"summary": {
"@type": "html",
"#text": "HELLOCTF反序列化靶场全解"
}
},
{
"title": "Tomcat CVE-2024-50379 / CVE-2024-56337 条件竞争漏洞分析",
"link": "https://xz.aliyun.com/t/16900",
"published": "2024-12-25T09:41:05+08:00",
"id": "https://xz.aliyun.com/t/16900",
"summary": {
"@type": "html",
"#text": "Tomcat CVE-2024-50379 / CVE-2024-56337 条件竞争漏洞分析"
}
},
{
"title": "AFL源码学习(一)",
"link": "https://xz.aliyun.com/t/16896",
"published": "2024-12-24T21:58:11+08:00",
"id": "https://xz.aliyun.com/t/16896",
"summary": {
"@type": "html",
"#text": "AFL源码学习(一)"
}
},
{
"title": "基于科来的哥斯拉流量分析",
"link": "https://xz.aliyun.com/t/16895",
"published": "2024-12-24T17:04:59+08:00",
"id": "https://xz.aliyun.com/t/16895",
"summary": {
"@type": "html",
"#text": "基于科来的哥斯拉流量分析"
}
},
{
"title": "Java安全之加载shellcode_bypass杀软",
"link": "https://xz.aliyun.com/t/16894",
"published": "2024-12-24T16:57:00+08:00",
"id": "https://xz.aliyun.com/t/16894",
"summary": {
"@type": "html",
"#text": "Java安全之加载shellcode_bypass杀软"
}
},
{
"title": "pwn的堆中如何使用off by one 和off by null的详细解析以及每一步的调试过程",
"link": "https://xz.aliyun.com/t/16893",
"published": "2024-12-24T15:41:09+08:00",
"id": "https://xz.aliyun.com/t/16893",
"summary": {
"@type": "html",
"#text": "pwn的堆中如何使用off by one 和off by null的详细解析以及每一步的调试过程"
}
},
{
"title": "Linux渗透实战之Instant",
"link": "https://xz.aliyun.com/t/16889",
"published": "2024-12-23T20:01:20+08:00",
"id": "https://xz.aliyun.com/t/16889",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之Instant"
}
},
{
"title": "vulnhub靶机billu_b0x精讲",
"link": "https://xz.aliyun.com/t/16888",
"published": "2024-12-23T18:33:18+08:00",
"id": "https://xz.aliyun.com/t/16888",
"summary": {
"@type": "html",
"#text": "vulnhub靶机billu_b0x精讲"
}
},
{
"title": "企业上云的新攻击面分析",
"link": "https://xz.aliyun.com/t/16887",
"published": "2024-12-23T17:43:33+08:00",
"id": "https://xz.aliyun.com/t/16887",
"summary": {
"@type": "html",
"#text": "企业上云的新攻击面分析"
}
},
{
"title": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集",
"link": "https://xz.aliyun.com/t/16886",
"published": "2024-12-23T17:29:43+08:00",
"id": "https://xz.aliyun.com/t/16886",
"summary": {
"@type": "html",
"#text": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集"
}
},
{
"title": "ECH新时代的域前置",
"link": "https://xz.aliyun.com/t/16884",
"published": "2024-12-23T16:17:20+08:00",
"id": "https://xz.aliyun.com/t/16884",
"summary": {
"@type": "html",
"#text": "ECH新时代的域前置"
}
},
{
"title": "CSS Injection 从入门到精通",
"link": "https://xz.aliyun.com/t/16879",
"published": "2024-12-22T22:06:24+08:00",
"id": "https://xz.aliyun.com/t/16879",
"summary": {
"@type": "html",
"#text": "CSS Injection 从入门到精通"
}
},
{
"title": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解",
"link": "https://xz.aliyun.com/t/16878",
"published": "2024-12-22T20:46:30+08:00",
"id": "https://xz.aliyun.com/t/16878",
"summary": {
"@type": "html",
"#text": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解"
}
},
{
"title": "LitCTF2024--Crypto-wp",
"link": "https://xz.aliyun.com/t/16875",
"published": "2024-12-22T16:19:45+08:00",
"id": "https://xz.aliyun.com/t/16875",
"summary": {
"@type": "html",
"#text": "LitCTF2024--Crypto-wp"
}
},
{
"title": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)",
"link": "https://xz.aliyun.com/t/16874",
"published": "2024-12-22T16:15:09+08:00",
"id": "https://xz.aliyun.com/t/16874",
"summary": {
"@type": "html",
"#text": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)"
}
},
{
"title": "Linux渗透实战之HTB-Heal",
"link": "https://xz.aliyun.com/t/16873",
"published": "2024-12-22T15:13:56+08:00",
"id": "https://xz.aliyun.com/t/16873",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之HTB-Heal"
}
},
{
"title": "春秋云境-多维挑战-CloudNet-WP",
"link": "https://xz.aliyun.com/t/16872",
"published": "2024-12-22T03:40:12+08:00",
"id": "https://xz.aliyun.com/t/16872",
"summary": {
"@type": "html",
"#text": "春秋云境-多维挑战-CloudNet-WP"
}
},
{
"title": "另辟蹊径的bypass方式",
"link": "https://xz.aliyun.com/t/16871",
"published": "2024-12-22T00:16:30+08:00",
"id": "https://xz.aliyun.com/t/16871",
"summary": {
"@type": "html",
"#text": "另辟蹊径的bypass方式"
}
},
{
"title": "国城杯线下web出题思路分享",
"link": "https://xz.aliyun.com/t/16870",
"published": "2024-12-21T23:05:12+08:00",
"id": "https://xz.aliyun.com/t/16870",
"summary": {
"@type": "html",
"#text": "国城杯线下web出题思路分享"
}
},
{
"title": "国城杯线下决赛master_ast题解",
"link": "https://xz.aliyun.com/t/16869",
"published": "2024-12-21T21:44:07+08:00",
"id": "https://xz.aliyun.com/t/16869",
"summary": {
"@type": "html",
"#text": "国城杯线下决赛master_ast题解"
}
},
{
"title": "暴力通关PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解",
"link": "https://xz.aliyun.com/t/16867",
"published": "2024-12-21T20:50:08+08:00",
"id": "https://xz.aliyun.com/t/16867",
"summary": {
"@type": "html",
"#text": "暴力通关PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解"
}
},
{
"title": "DASCTF 2024最后一战寒夜破晓冬至终章(部分wp)",
"link": "https://xz.aliyun.com/t/16866",
"published": "2024-12-21T20:16:12+08:00",
"id": "https://xz.aliyun.com/t/16866",
"summary": {
"@type": "html",
"#text": "DASCTF 2024最后一战寒夜破晓冬至终章(部分wp)"
}
},
{
"title": "2024 DASCTF const_python详解",
"link": "https://xz.aliyun.com/t/16864",
"published": "2024-12-21T19:51:16+08:00",
"id": "https://xz.aliyun.com/t/16864",
"summary": {
"@type": "html",
"#text": "2024 DASCTF const_python详解"
}
},
{
"title": "Zeropz-楚慧杯L组WP",
"link": "https://xz.aliyun.com/t/16863",
"published": "2024-12-21T19:44:53+08:00",
"id": "https://xz.aliyun.com/t/16863",
"summary": {
"@type": "html",
"#text": "Zeropz-楚慧杯L组WP"
}
},
{
"title": "Dirty Pagetable 学习 & 例题",
"link": "https://xz.aliyun.com/t/16862",
"published": "2024-12-21T19:23:38+08:00",
"id": "https://xz.aliyun.com/t/16862",
"summary": {
"@type": "html",
"#text": "Dirty Pagetable 学习 & 例题"
}
},
{
"title": "针对单一系统渗透测试",
"link": "https://xz.aliyun.com/t/16861",
"published": "2024-12-21T19:21:15+08:00",
"id": "https://xz.aliyun.com/t/16861",
"summary": {
"@type": "html",
"#text": "针对单一系统渗透测试"
}
},
{
"title": "Cross cache Attack技术细节分析",
"link": "https://xz.aliyun.com/t/16860",
"published": "2024-12-21T19:19:11+08:00",
"id": "https://xz.aliyun.com/t/16860",
"summary": {
"@type": "html",
"#text": "Cross cache Attack技术细节分析"
}
},
{
"title": "某某语音auth值生成分析",
"link": "https://xz.aliyun.com/t/16859",
"published": "2024-12-21T17:59:50+08:00",
"id": "https://xz.aliyun.com/t/16859",
"summary": {
"@type": "html",
"#text": "某某语音auth值生成分析"
}
},
{
"title": "蓝队—反钓鱼的策略提供",
"link": "https://xz.aliyun.com/t/16858",
"published": "2024-12-21T17:12:06+08:00",
"id": "https://xz.aliyun.com/t/16858",
"summary": {
"@type": "html",
"#text": "蓝队—反钓鱼的策略提供"
}
},
{
"title": "windows内核进程遍历常见方式",
"link": "https://xz.aliyun.com/t/16857",
"published": "2024-12-21T16:38:04+08:00",
"id": "https://xz.aliyun.com/t/16857",
"summary": {
"@type": "html",
"#text": "windows内核进程遍历常见方式"
}
},
{
"title": "ez_zhuawa出题记录",
"link": "https://xz.aliyun.com/t/16856",
"published": "2024-12-21T15:44:09+08:00",
"id": "https://xz.aliyun.com/t/16856",
"summary": {
"@type": "html",
"#text": "ez_zhuawa出题记录"
}
},
{
"title": "Windows内核回调",
"link": "https://xz.aliyun.com/t/16855",
"published": "2024-12-21T15:17:48+08:00",
"id": "https://xz.aliyun.com/t/16855",
"summary": {
"@type": "html",
"#text": "Windows内核回调"
}
},
{
"title": "Linux渗透实战之不一样的XSS",
"link": "https://xz.aliyun.com/t/16853",
"published": "2024-12-21T10:53:08+08:00",
"id": "https://xz.aliyun.com/t/16853",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之不一样的XSS"
}
},
{
"title": "基于优化的大模型越狱技术分析与实战",
"link": "https://xz.aliyun.com/t/16852",
"published": "2024-12-20T21:17:55+08:00",
"id": "https://xz.aliyun.com/t/16852",
"summary": {
"@type": "html",
"#text": "基于优化的大模型越狱技术分析与实战"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE",
"link": "https://xz.aliyun.com/t/16850",
"published": "2024-12-20T18:55:42+08:00",
"id": "https://xz.aliyun.com/t/16850",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解",
"link": "https://xz.aliyun.com/t/16849",
"published": "2024-12-20T17:24:00+08:00",
"id": "https://xz.aliyun.com/t/16849",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解"
}
},
{
"title": "代码审计-某物联网系统RCE",
"link": "https://xz.aliyun.com/t/16848",
"published": "2024-12-20T17:19:40+08:00",
"id": "https://xz.aliyun.com/t/16848",
"summary": {
"@type": "html",
"#text": "代码审计-某物联网系统RCE"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP",
"link": "https://xz.aliyun.com/t/16847",
"published": "2024-12-20T17:10:07+08:00",
"id": "https://xz.aliyun.com/t/16847",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP"
}
},
{
"title": "某系统审计权限绕过-CVE-2024-9554",
"link": "https://xz.aliyun.com/t/16845",
"published": "2024-12-20T16:53:05+08:00",
"id": "https://xz.aliyun.com/t/16845",
"summary": {
"@type": "html",
"#text": "某系统审计权限绕过-CVE-2024-9554"
}
},
{
"title": "某系统代码审计到getshell",
"link": "https://xz.aliyun.com/t/16841",
"published": "2024-12-20T16:08:09+08:00",
"id": "https://xz.aliyun.com/t/16841",
"summary": {
"@type": "html",
"#text": "某系统代码审计到getshell"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto",
"link": "https://xz.aliyun.com/t/16846",
"published": "2024-12-20T14:30:16+08:00",
"id": "https://xz.aliyun.com/t/16846",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto"
}
},
{
"title": "银狐黑产组织最新免杀样本详细分析",
"link": "https://xz.aliyun.com/t/16837",
"published": "2024-12-20T08:17:20+08:00",
"id": "https://xz.aliyun.com/t/16837",
"summary": {
"@type": "html",
"#text": "银狐黑产组织最新免杀样本详细分析"
}
},
{
"title": "初识AFL工具安装与基本用法",
"link": "https://xz.aliyun.com/t/16836",
"published": "2024-12-20T03:07:30+08:00",
"id": "https://xz.aliyun.com/t/16836",
"summary": {
"@type": "html",
"#text": "初识AFL工具安装与基本用法"
}
},
{
"title": "某渗透中代码审计到内网遨游",
"link": "https://xz.aliyun.com/t/16835",
"published": "2024-12-19T21:53:53+08:00",
"id": "https://xz.aliyun.com/t/16835",
"summary": {
"@type": "html",
"#text": "某渗透中代码审计到内网遨游"
}
},
{
"title": "Pointer Overflow CTF - 2024 Web全write up",
"link": "https://xz.aliyun.com/t/16834",
"published": "2024-12-19T20:58:58+08:00",
"id": "https://xz.aliyun.com/t/16834",
"summary": {
"@type": "html",
"#text": "Pointer Overflow CTF - 2024 Web全write up"
}
},
{
"title": "浅析实战攻防中的信息收集",
"link": "https://xz.aliyun.com/t/16832",
"published": "2024-12-19T16:32:00+08:00",
"id": "https://xz.aliyun.com/t/16832",
"summary": {
"@type": "html",
"#text": "浅析实战攻防中的信息收集"
}
},
{
"title": "Spring FatJar写文件到RCE分析",
"link": "https://xz.aliyun.com/t/16831",
"published": "2024-12-19T16:04:00+08:00",
"id": "https://xz.aliyun.com/t/16831",
"summary": {
"@type": "html",
"#text": "Spring FatJar写文件到RCE分析"
}
},
{
"title": "应急响应记录之水坑挂马事件分析与恢复",
"link": "https://xz.aliyun.com/t/16829",
"published": "2024-12-19T14:27:41+08:00",
"id": "https://xz.aliyun.com/t/16829",
"summary": {
"@type": "html",
"#text": "应急响应记录之水坑挂马事件分析与恢复"
}
},
{
"title": "万字长文窥探信息收集真正的艺术",
"link": "https://xz.aliyun.com/t/16828",
"published": "2024-12-19T13:57:53+08:00",
"id": "https://xz.aliyun.com/t/16828",
"summary": {
"@type": "html",
"#text": "万字长文窥探信息收集真正的艺术"
}
},
{
"title": "记一次5000万资产的渗透测试",
"link": "https://xz.aliyun.com/t/16827",
"published": "2024-12-19T12:34:52+08:00",
"id": "https://xz.aliyun.com/t/16827",
"summary": {
"@type": "html",
"#text": "记一次5000万资产的渗透测试"
}
},
{
"title": "一次 house of force 练习HTB pwn - Fancy names",
"link": "https://xz.aliyun.com/t/16825",
"published": "2024-12-19T11:41:53+08:00",
"id": "https://xz.aliyun.com/t/16825",
"summary": {
"@type": "html",
"#text": "一次 house of force 练习HTB pwn - Fancy names"
}
},
{
"title": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞",
"link": "https://xz.aliyun.com/t/16824",
"published": "2024-12-19T11:13:41+08:00",
"id": "https://xz.aliyun.com/t/16824",
"summary": {
"@type": "html",
"#text": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞"
}
},
{
"title": "面向GPTs的提示词注入攻击分析",
"link": "https://xz.aliyun.com/t/16816",
"published": "2024-12-18T23:23:30+08:00",
"id": "https://xz.aliyun.com/t/16816",
"summary": {
"@type": "html",
"#text": "面向GPTs的提示词注入攻击分析"
}
},
{
"title": "PE文件代码注入",
"link": "https://xz.aliyun.com/t/16815",
"published": "2024-12-18T23:11:47+08:00",
"id": "https://xz.aliyun.com/t/16815",
"summary": {
"@type": "html",
"#text": "PE文件代码注入"
}
},
{
"title": "域渗透实战之HTB-Certified",
"link": "https://xz.aliyun.com/t/16813",
"published": "2024-12-18T20:59:47+08:00",
"id": "https://xz.aliyun.com/t/16813",
"summary": {
"@type": "html",
"#text": "域渗透实战之HTB-Certified"
}
},
{
"title": "2025 ciscn novel1详细解析",
"link": "https://xz.aliyun.com/t/16811",
"published": "2024-12-18T19:16:12+08:00",
"id": "https://xz.aliyun.com/t/16811",
"summary": {
"@type": "html",
"#text": "2025 ciscn novel1详细解析"
}
},
{
"title": "先知安全沙龙(上海站) - 后渗透阶段主机关键信息自动化狩猎的实现与应用",
"link": "https://xz.aliyun.com/t/16823",
"published": "2024-12-18T16:39:00+08:00",
"id": "https://xz.aliyun.com/t/16823",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - 后渗透阶段主机关键信息自动化狩猎的实现与应用"
}
},
{
"title": "先知安全沙龙(上海站) - 红队武器开发之基于合法服务的隐蔽C2",
"link": "https://xz.aliyun.com/t/16821",
"published": "2024-12-18T16:38:00+08:00",
"id": "https://xz.aliyun.com/t/16821",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - 红队武器开发之基于合法服务的隐蔽C2"
}
},
{
"title": "先知安全沙龙(上海站) - Linux沙箱技术(权限机制、资源隔离与安全防御)",
"link": "https://xz.aliyun.com/t/16820",
"published": "2024-12-18T16:37:00+08:00",
"id": "https://xz.aliyun.com/t/16820",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - Linux沙箱技术(权限机制、资源隔离与安全防御)"
}
},
{
"title": "先知安全沙龙(上海站) - 终端安全对抗及防护",
"link": "https://xz.aliyun.com/t/16819",
"published": "2024-12-18T16:36:00+08:00",
"id": "https://xz.aliyun.com/t/16819",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - 终端安全对抗及防护"
}
},
{
"title": "先知安全沙龙(上海站) - 大模型基础设施安全攻防",
"link": "https://xz.aliyun.com/t/16818",
"published": "2024-12-18T16:35:00+08:00",
"id": "https://xz.aliyun.com/t/16818",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - 大模型基础设施安全攻防"
}
},
{
"title": "Sharp4RemoveLog一款通过调用wevtutil进程实现痕迹清理的工具",
"link": "https://xz.aliyun.com/t/16809",
"published": "2024-12-18T16:07:07+08:00",
"id": "https://xz.aliyun.com/t/16809",
"summary": {
"@type": "html",
"#text": "Sharp4RemoveLog一款通过调用wevtutil进程实现痕迹清理的工具"
}
},
{
"title": "Guns后台任意文件上传漏洞分析",
"link": "https://xz.aliyun.com/t/16808",
"published": "2024-12-18T15:37:32+08:00",
"id": "https://xz.aliyun.com/t/16808",
"summary": {
"@type": "html",
"#text": "Guns后台任意文件上传漏洞分析"
}
},
{
"title": "红队权限维持策略——实用版r3-r0",
"link": "https://xz.aliyun.com/t/16806",
"published": "2024-12-17T23:25:10+08:00",
"id": "https://xz.aliyun.com/t/16806",
"summary": {
"@type": "html",
"#text": "红队权限维持策略——实用版r3-r0"
}
},
{
"title": "最近做的一些有意思的ctf赛题详细分析",
"link": "https://xz.aliyun.com/t/16805",
"published": "2024-12-17T21:53:01+08:00",
"id": "https://xz.aliyun.com/t/16805",
"summary": {
"@type": "html",
"#text": "最近做的一些有意思的ctf赛题详细分析"
}
},
{
"title": "CTF一些有意思考点+例题详细分析系列",
"link": "https://xz.aliyun.com/t/16804",
"published": "2024-12-17T21:09:18+08:00",
"id": "https://xz.aliyun.com/t/16804",
"summary": {
"@type": "html",
"#text": "CTF一些有意思考点+例题详细分析系列"
}
},
{
"title": "从hello-web入手反混淆和disable_function绕过",
"link": "https://xz.aliyun.com/t/16802",
"published": "2024-12-17T20:35:00+08:00",
"id": "https://xz.aliyun.com/t/16802",
"summary": {
"@type": "html",
"#text": "从hello-web入手反混淆和disable_function绕过"
}
},
{
"title": "2024国城杯线上signal出题文档",
"link": "https://xz.aliyun.com/t/16801",
"published": "2024-12-17T19:55:08+08:00",
"id": "https://xz.aliyun.com/t/16801",
"summary": {
"@type": "html",
"#text": "2024国城杯线上signal出题文档"
}
},
{
"title": "深入Pyd逆向",
"link": "https://xz.aliyun.com/t/16800",
"published": "2024-12-17T15:47:44+08:00",
"id": "https://xz.aliyun.com/t/16800",
"summary": {
"@type": "html",
"#text": "深入Pyd逆向"
}
},
{
"title": "CVE-2022-0874漏洞复现——Linux内核splice系统调用未正确初始化管道缓存漏洞分析文末附EXP代码",
"link": "https://xz.aliyun.com/t/16798",
"published": "2024-12-17T13:59:06+08:00",
"id": "https://xz.aliyun.com/t/16798",
"summary": {
"@type": "html",
"#text": "CVE-2022-0874漏洞复现——Linux内核splice系统调用未正确初始化管道缓存漏洞分析文末附EXP代码"
}
},
{
"title": "DocSys代码审计",
"link": "https://xz.aliyun.com/t/16797",
"published": "2024-12-17T13:57:15+08:00",
"id": "https://xz.aliyun.com/t/16797",
"summary": {
"@type": "html",
"#text": "DocSys代码审计"
}
},
{
"title": "oppo a53 5g unlocktool 强解bl锁magisk工具root [小白避坑篇]",
"link": "https://xz.aliyun.com/t/16796",
"published": "2024-12-17T13:55:52+08:00",
"id": "https://xz.aliyun.com/t/16796",
"summary": {
"@type": "html",
"#text": "oppo a53 5g unlocktool 强解bl锁magisk工具root [小白避坑篇]"
}
},
{
"title": "LitCTF2024--Misc全wp",
"link": "https://xz.aliyun.com/t/16795",
"published": "2024-12-17T12:36:41+08:00",
"id": "https://xz.aliyun.com/t/16795",
"summary": {
"@type": "html",
"#text": "LitCTF2024--Misc全wp"
}
},
{
"title": "HTB-University CTF 2024 Binary Badlands 的 Forensics 部分WP",
"link": "https://xz.aliyun.com/t/16794",
"published": "2024-12-17T09:55:02+08:00",
"id": "https://xz.aliyun.com/t/16794",
"summary": {
"@type": "html",
"#text": "HTB-University CTF 2024 Binary Badlands 的 Forensics 部分WP"
}
},
{
"title": "浅析Ruby类污染及其在Sinatra框架下的利用",
"link": "https://xz.aliyun.com/t/16792",
"published": "2024-12-16T23:26:40+08:00",
"id": "https://xz.aliyun.com/t/16792",
"summary": {
"@type": "html",
"#text": "浅析Ruby类污染及其在Sinatra框架下的利用"
}
},
{
"title": "Pipe管道利用研究分享",
"link": "https://xz.aliyun.com/t/16790",
"published": "2024-12-16T20:30:00+08:00",
"id": "https://xz.aliyun.com/t/16790",
"summary": {
"@type": "html",
"#text": "Pipe管道利用研究分享"
}
},
{
"title": "对ssti无回显的新版内存马学习",
"link": "https://xz.aliyun.com/t/16787",
"published": "2024-12-16T15:37:55+08:00",
"id": "https://xz.aliyun.com/t/16787",
"summary": {
"@type": "html",
"#text": "对ssti无回显的新版内存马学习"
}
},
{
"title": "域渗透实战之HTB-Vintage",
"link": "https://xz.aliyun.com/t/16785",
"published": "2024-12-16T13:39:10+08:00",
"id": "https://xz.aliyun.com/t/16785",
"summary": {
"@type": "html",
"#text": "域渗透实战之HTB-Vintage"
}
},
{
"title": "实战演示 BurpSuite 插件 SignMe 安装和使用,有签名的接口也可以爆破了",
"link": "https://xz.aliyun.com/t/16780",
"published": "2024-12-16T12:08:51+08:00",
"id": "https://xz.aliyun.com/t/16780",
"summary": {
"@type": "html",
"#text": "实战演示 BurpSuite 插件 SignMe 安装和使用,有签名的接口也可以爆破了"
}
},
{
"title": "Apache Common Jelly Remote Code Execution",
"link": "https://xz.aliyun.com/t/16779",
"published": "2024-12-16T10:15:19+08:00",
"id": "https://xz.aliyun.com/t/16779",
"summary": {
"@type": "html",
"#text": "Apache Common Jelly Remote Code Execution"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 0解PWN题--server解法",
"link": "https://xz.aliyun.com/t/16778",
"published": "2024-12-16T10:01:00+08:00",
"id": "https://xz.aliyun.com/t/16778",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 0解PWN题--server解法"
}
},
{
"title": "免杀基础-ppid伪造",
"link": "https://xz.aliyun.com/t/16777",
"published": "2024-12-16T10:00:14+08:00",
"id": "https://xz.aliyun.com/t/16777",
"summary": {
"@type": "html",
"#text": "免杀基础-ppid伪造"
}
},
{
"title": "高效IO攻击利用学习之House of apple2超详解",
"link": "https://xz.aliyun.com/t/16775",
"published": "2024-12-16T00:37:35+08:00",
"id": "https://xz.aliyun.com/t/16775",
"summary": {
"@type": "html",
"#text": "高效IO攻击利用学习之House of apple2超详解"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - Crypto详解",
"link": "https://xz.aliyun.com/t/16773",
"published": "2024-12-15T22:42:00+08:00",
"id": "https://xz.aliyun.com/t/16773",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - Crypto详解"
}
},
{
"title": "m0leCon Beginner CTF2024部分wp",
"link": "https://xz.aliyun.com/t/16772",
"published": "2024-12-15T21:31:48+08:00",
"id": "https://xz.aliyun.com/t/16772",
"summary": {
"@type": "html",
"#text": "m0leCon Beginner CTF2024部分wp"
}
},
{
"title": "Ucum-java XXE漏洞分析(CVE-2024-55887)",
"link": "https://xz.aliyun.com/t/16771",
"published": "2024-12-15T21:04:00+08:00",
"id": "https://xz.aliyun.com/t/16771",
"summary": {
"@type": "html",
"#text": "Ucum-java XXE漏洞分析(CVE-2024-55887)"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - re",
"link": "https://xz.aliyun.com/t/16766",
"published": "2024-12-15T18:21:26+08:00",
"id": "https://xz.aliyun.com/t/16766",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - re"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - zeroshell1~5WinFT_1~2sc05_1",
"link": "https://xz.aliyun.com/t/16759",
"published": "2024-12-15T17:26:01+08:00",
"id": "https://xz.aliyun.com/t/16759",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - zeroshell1~5WinFT_1~2sc05_1"
}
},
{
"title": "第二届“长城杯”铁人三项赛 (防护赛)初赛WriteUP",
"link": "https://xz.aliyun.com/t/16789",
"published": "2024-12-15T17:26:01+08:00",
"id": "https://xz.aliyun.com/t/16789",
"summary": {
"@type": "html",
"#text": "第二届“长城杯”铁人三项赛 (防护赛)初赛WriteUP"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - web&re wp",
"link": "https://xz.aliyun.com/t/16755",
"published": "2024-12-15T17:14:30+08:00",
"id": "https://xz.aliyun.com/t/16755",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - web&re wp"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - pwn",
"link": "https://xz.aliyun.com/t/16751",
"published": "2024-12-15T17:05:55+08:00",
"id": "https://xz.aliyun.com/t/16751",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - pwn"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - WEB WP",
"link": "https://xz.aliyun.com/t/16750",
"published": "2024-12-15T17:02:06+08:00",
"id": "https://xz.aliyun.com/t/16750",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - WEB WP"
}
},
{
"title": "HITCTF pipe_snake详解",
"link": "https://xz.aliyun.com/t/16748",
"published": "2024-12-15T09:25:49+08:00",
"id": "https://xz.aliyun.com/t/16748",
"summary": {
"@type": "html",
"#text": "HITCTF pipe_snake详解"
}
},
{
"title": "记一次客户系统的测试--多种经典类型漏洞",
"link": "https://xz.aliyun.com/t/16747",
"published": "2024-12-14T23:33:38+08:00",
"id": "https://xz.aliyun.com/t/16747",
"summary": {
"@type": "html",
"#text": "记一次客户系统的测试--多种经典类型漏洞"
}
},
{
"title": "记一次渗透到审计",
"link": "https://xz.aliyun.com/t/16746",
"published": "2024-12-14T21:23:00+08:00",
"id": "https://xz.aliyun.com/t/16746",
"summary": {
"@type": "html",
"#text": "记一次渗透到审计"
}
},
{
"title": "某次大学的渗透测试经历",
"link": "https://xz.aliyun.com/t/16745",
"published": "2024-12-14T16:51:12+08:00",
"id": "https://xz.aliyun.com/t/16745",
"summary": {
"@type": "html",
"#text": "某次大学的渗透测试经历"
}
}
]