update logfile to loguru
This commit is contained in:
parent
1e4e423e68
commit
24cfa7a998
25
Core.py
25
Core.py
@ -21,23 +21,16 @@ from GotoSend.xianzhi import Src_xianzhi
|
||||
from GotoSend.freebuf import Src_freebuf
|
||||
from GotoSend.qianxin import Src_qianxin
|
||||
from GotoSend.seebug import Src_seebug
|
||||
import logging
|
||||
|
||||
# 设置日志记录
|
||||
logger = logging.getLogger()
|
||||
logger.setLevel(logging.INFO)
|
||||
logger.handlers.clear() # 清除已有的处理器
|
||||
|
||||
file_handler = logging.FileHandler('./log/spider.log', mode='a', encoding='utf-8')
|
||||
file_handler.setFormatter(logging.Formatter('%(asctime)s - %(levelname)s - %(message)s'))
|
||||
|
||||
console_handler = logging.StreamHandler()
|
||||
console_handler.setFormatter(logging.Formatter('%(asctime)s - %(levelname)s - %(message)s'))
|
||||
|
||||
logger.addHandler(file_handler)
|
||||
logger.addHandler(console_handler)
|
||||
logger.propagate = False # 禁用日志传递
|
||||
from loguru import logger
|
||||
|
||||
logger.add("./log/spider.log",
|
||||
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
|
||||
rotation="10 MB",
|
||||
compression="zip",
|
||||
encoding="utf-8")
|
||||
# shell终端打印日志
|
||||
# logger.add(lambda msg: print(msg),
|
||||
# format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}")
|
||||
|
||||
# 加载参数
|
||||
with open('./config.yaml', 'r', encoding="utf-8") as file:
|
||||
|
@ -4,7 +4,6 @@ import json
|
||||
import sqlite3
|
||||
import os
|
||||
from datetime import datetime, timedelta
|
||||
from SendBot import SendToFeishu
|
||||
|
||||
def create_database():
|
||||
conn = sqlite3.connect('./db/4hou.db')
|
||||
|
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
Binary file not shown.
BIN
GotoSend/__pycache__/seebug.cpython-312.pyc
Normal file
BIN
GotoSend/__pycache__/seebug.cpython-312.pyc
Normal file
Binary file not shown.
Binary file not shown.
@ -4,7 +4,7 @@ import json
|
||||
import sqlite3
|
||||
import os
|
||||
from datetime import datetime, timedelta
|
||||
from SendBot import SendToFeishu
|
||||
|
||||
|
||||
def create_database():
|
||||
conn = sqlite3.connect('./db/anquanke.db')
|
||||
|
@ -4,7 +4,7 @@ import json
|
||||
import sqlite3
|
||||
import os
|
||||
from datetime import datetime, timedelta
|
||||
from SendBot import SendToFeishu
|
||||
|
||||
|
||||
def create_database():
|
||||
conn = sqlite3.connect('./db/doonsec.db')
|
||||
|
@ -4,7 +4,6 @@ import json
|
||||
import sqlite3
|
||||
import os
|
||||
from datetime import datetime, timedelta
|
||||
from SendBot import SendToFeishu
|
||||
|
||||
def create_database():
|
||||
conn = sqlite3.connect('./db/freebuf.db')
|
||||
|
@ -4,7 +4,6 @@ import json
|
||||
import sqlite3
|
||||
import os
|
||||
from datetime import datetime, timedelta
|
||||
from SendBot import SendToFeishu
|
||||
|
||||
def create_database():
|
||||
conn = sqlite3.connect('./db/qianxin.db')
|
||||
|
@ -4,7 +4,6 @@ import json
|
||||
import sqlite3
|
||||
import os
|
||||
from datetime import datetime, timedelta
|
||||
from SendBot import SendToFeishu
|
||||
|
||||
def create_database():
|
||||
conn = sqlite3.connect('./db/xianzhi.db')
|
||||
|
File diff suppressed because one or more lines are too long
@ -1,4 +1,84 @@
|
||||
[
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302547",
|
||||
"title": "年关将至,这些单位用360安全大模型交上安全运营高分成绩单",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "微信",
|
||||
"pubDate": "2024-12-09 15:00:35"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302544",
|
||||
"title": "需要采取紧急行动:ABB ASPECT 漏洞使建筑物面临网络攻击",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-09 14:47:06"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302541",
|
||||
"title": "CVE-2024-55563: 交易中继干扰漏洞对比特币闪电网络构成威胁",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-09 14:29:27"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302538",
|
||||
"title": "罗马尼亚选举系统在总统投票前遭受 8.5 万次攻击",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityaffairs",
|
||||
"pubDate": "2024-12-09 14:18:58"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302535",
|
||||
"title": "CVE-2024-12209 (CVSS 9.8): WP Umbrella 插件漏洞导致 30,000 个网站遭入侵",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-09 11:26:20"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302532",
|
||||
"title": "卡达诺基金会 X 账户遭黑客攻击,发布诈骗链接后又被删除",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "Cointelegraph.com News",
|
||||
"pubDate": "2024-12-09 11:14:36"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302529",
|
||||
"title": "艺术家损失 13.5 万美元后,布鲁克林检察官关闭了 40 个 NFT 诈骗网站",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "Cointelegraph.com News",
|
||||
"pubDate": "2024-12-09 11:07:23"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302526",
|
||||
"title": "DDoSecrets 推出大型 “泄密资料库 ”搜索引擎,收录数百万份泄密文件",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-09 10:52:57"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302523",
|
||||
"title": "Ultralytics 人工智能库遭受供应链攻击: 6000 万次下载遭到破坏",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-09 10:44:46"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302520",
|
||||
"title": "谷歌在 2024 年 12 月的 Pixel 安全更新中修复了严重的 RCE 漏洞",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-09 10:38:22"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302508",
|
||||
"title": "开放银行中的 API 安全:平衡创新与风险管理",
|
||||
@ -78,85 +158,5 @@
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-05 16:06:53"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302485",
|
||||
"title": "最高级!360获评NVDB通用网络产品安全漏洞专业库“三星级技术支撑单位”称号",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "微信",
|
||||
"pubDate": "2024-12-05 15:51:37"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302482",
|
||||
"title": "Crypto.com 与 HackerOne 一起推出 200 万美元的漏洞赏金计划",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-05 15:44:08"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302479",
|
||||
"title": "FSB 黑客攻破巴基斯坦的 APT 风暴-0156",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "darkreading",
|
||||
"pubDate": "2024-12-05 15:31:48"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302476",
|
||||
"title": "Veeam 解决了关键的服务提供商控制台 (VSPC) 错误",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityaffairs",
|
||||
"pubDate": "2024-12-05 15:20:49"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302473",
|
||||
"title": "软件供应链攻击导致 Solana 的 web3.js 库在 npm 注册表上出现恶意版本",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "helpnetsecurity",
|
||||
"pubDate": "2024-12-05 15:11:15"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302468",
|
||||
"title": "CVE-2024-51378 (CVSS 10):CISA 警告称,严重 Cyber Panel 缺陷受到主动攻击",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-05 15:03:45"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302462",
|
||||
"title": "CVE-2024-10905 (CVSS 10): SailPoint IdentityIQ 中的严重漏洞会暴露敏感数据",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-05 14:37:48"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302456",
|
||||
"title": "当心 Celestial Stealer:新的 MaaS 针对浏览器和加密钱包",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-05 11:24:53"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302453",
|
||||
"title": "Akira v2 出现: 基于 Rust 的勒索软件提高了风险",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-05 11:12:32"
|
||||
},
|
||||
{
|
||||
"guid": "https://www.anquanke.com/post/id/302450",
|
||||
"title": "新的 Andromeda/Gamarue 命令和控制集群以亚太地区为目标",
|
||||
"author": " 安全客",
|
||||
"description": null,
|
||||
"source": "securityonline",
|
||||
"pubDate": "2024-12-05 11:02:51"
|
||||
}
|
||||
]
|
1136
JSON/doonsec.json
1136
JSON/doonsec.json
File diff suppressed because it is too large
Load Diff
@ -1,4 +1,68 @@
|
||||
[
|
||||
{
|
||||
"title": "腾讯云首届金融安全峰会圆满举办,让安全价值看得见",
|
||||
"link": "https://www.freebuf.com/articles/417280.html",
|
||||
"description": "12月6日,2024首届腾讯云金融安全峰会在上海成功举办。",
|
||||
"body": "<p>作为数字经济的重要组成部分之一,金融行业的发展与稳定一直备受关注。国家高度重视金融行业的数字化转型与安全建设,金融企业加速信息技术融合创新改造升级。中国人民银行等7部门联合印发的《推动数字金融高质量发展行动方案》提出,以数据要素和数字技术为关键驱动,加快推进金融机构数字化转型,夯实数字金融发展基础。</p><p>随着金融科技进入4.0时代,以人工智能(AI)、大数据、云计算和区块链等新兴技术",
|
||||
"category": "活动",
|
||||
"pubDate": "Mon, 09 Dec 2024 19:24:40 +0800"
|
||||
},
|
||||
{
|
||||
"title": "通过二维码实现命令与控制操作的新方法",
|
||||
"link": "https://www.freebuf.com/news/417227.html",
|
||||
"description": "Mandiant技术公司发现了一种绕过浏览器隔离技术并通过二维码实现命令与控制操作的新方法。",
|
||||
"body": "<p>Mandiant技术公司发现了一种绕过浏览器隔离技术并通过二维码实现命令与控制操作的新方法。</p><p>浏览器隔离是一种越来越受欢迎的安全技术,它通过将所有本地Web浏览器请求路由至托管在云环境或虚拟机中的远程Web浏览器,来执行。</p><p>访问的网页上的任何脚本或内容都是在远程浏览器上执行,而不是在本地的浏览器上。然后,页面的渲染像素流被发送回原始请求的本地浏览器,只显示页面的外观,",
|
||||
"category": "资讯",
|
||||
"pubDate": "Mon, 09 Dec 2024 14:34:59 +0800"
|
||||
},
|
||||
{
|
||||
"title": "2024半年度国内外网安龙头公司业绩对比",
|
||||
"link": "https://www.freebuf.com/news/417217.html",
|
||||
"description": "探讨2024上半年国内外顶尖网安公司(国内外各20家市值排名靠前、专注网安行业的上市公司)整体业绩。",
|
||||
"body": "<blockquote><p>本期,我们将探讨2024上半年国内外顶尖网安公司(国内外各20家市值排名靠前、专注网安行业的上市公司)整体业绩,并对比2023年同期数据评估发展状况,研究此期间国内外网安公司差距发生了怎样的变化。注:三季报分析即将完成,将在近期发布,敬请期待。</p></blockquote><h2 id=\"h2-1\"><strong>一、营业收入</strong></h2><p><",
|
||||
"category": "资讯",
|
||||
"pubDate": "Mon, 09 Dec 2024 14:15:37 +0800"
|
||||
},
|
||||
{
|
||||
"title": "Gartner 发布首份《身份验证魔力象限报告》",
|
||||
"link": "https://www.freebuf.com/articles/neopoints/417194.html",
|
||||
"description": "Gartner 在报告中将 Entrust 、Incode 、Jumio 、Socure 和Sumsub 评为身份验证领导者。",
|
||||
"body": "<p>身份验证在历史上主要是用于银行、赌博和加密货币等受监管的入职过程,但 COVID-19 引入了新的政府和劳动力相关的用例,包括防止欺诈。咨询公司 Gartner 的副总裁分析师 Akif Khan 表示,身份验证技术如今在像 Airbnb 这样的市场,上建立信任和防范勒索软件攻击方面发挥着重要作用。<img src=\"https://image.3001.net/images/2024120",
|
||||
"category": "观点",
|
||||
"pubDate": "Mon, 09 Dec 2024 11:02:11 +0800"
|
||||
},
|
||||
{
|
||||
"title": "以虚假视频会议为诱饵,攻击者瞄准了Web3公司员工",
|
||||
"link": "https://www.freebuf.com/news/417193.html",
|
||||
"description": "利用虚假的商务视频会议应用程序来针对 Web3 技术公司的工作人员,并传播一种名为Realst 的信息窃取程序。",
|
||||
"body": "<p>据The Hacker News消息,网络安全研究人员近日发现一种新的诈骗活动,利用虚假的商务视频会议应用程序来针对 Web3 技术公司的工作人员,并传播一种名为Realst 的信息窃取程序。</p><p><img src=\"https://image.3001.net/images/20241209/1733714146_675660e29a8a79bc69850.png!small\" a",
|
||||
"category": "资讯",
|
||||
"pubDate": "Mon, 09 Dec 2024 10:49:40 +0800"
|
||||
},
|
||||
{
|
||||
"title": "罗马尼亚实锤“俄利用TikTok干扰大选”?",
|
||||
"link": "https://www.freebuf.com/news/417184.html",
|
||||
"description": "罗马尼亚宪法法院作出了一项具有历史性的裁决,取消了总统选举第一轮投票的结果,原因是涉嫌俄罗斯的干预。",
|
||||
"body": "<p>罗马尼亚宪法法院作出了一项具有历史性的裁决,取消了总统选举第一轮投票的结果,原因是涉嫌俄罗斯的干预。因此,原定于 2024 年12 月8 日举行的第二轮投票将不再进行。第一轮获胜者卡林·乔尔杰斯库(Călin Georgescu)将这一裁决称为“正式政变”和对民主的攻击。<img src=\"https://image.3001.net/images/20241209/1733711506_6",
|
||||
"category": "资讯",
|
||||
"pubDate": "Mon, 09 Dec 2024 10:28:23 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FreeBuf早报 | 最强大的Android间谍软件曝光;电信巨头BT集团遭勒索攻击",
|
||||
"link": "https://www.freebuf.com/news/417120.html",
|
||||
"description": "该恶意软件似乎是Monokle的新版本, Monokle最初由Lookout在2019年发现,由总部位于圣彼得堡的特种技术中心有限公司开发。",
|
||||
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. I-O Data路由器0Day漏洞被利用,无修复补丁</h3><p>日本计算机紧急响应小组(CERT)警告称 ,黑客正在利用I-O Data路由器设备中的零日漏洞来修改设备设置、执行命令,甚至关闭防火墙。【外刊-<a href=\"https://www.bleepingcomputer.com/news/securit",
|
||||
"category": "资讯",
|
||||
"pubDate": "Fri, 06 Dec 2024 20:48:47 +0800"
|
||||
},
|
||||
{
|
||||
"title": "我们回归能力型厂商的意义和价值",
|
||||
"link": "https://www.freebuf.com/articles/417119.html",
|
||||
"description": "几天来,业内同仁非常关注我的内部公开信。我有必要做出公开的答复,进一步明确安天的发展目标和路径。",
|
||||
"body": "<p>几天来,业内同仁非常关注我的内部公开信。我有必要做出公开的答复,进一步明确安天的发展目标和路径。</p><p><strong>企业创始人、实控人对企业发展运营承担完整的责任与使命</strong>,这是我坚持的原则。在此原则之上,才能做好目标拆解、责任分工与总结。</p><p>既然回归指挥位,我就要高效明确地向内部传递工作导向,这已经在内部公开信中讲的很清楚,而且就重大工作安排,发布内部公开",
|
||||
"category": "观点",
|
||||
"pubDate": "Fri, 06 Dec 2024 20:44:22 +0800"
|
||||
},
|
||||
{
|
||||
"title": "关键的联发科芯片组漏洞影响15亿手机用户",
|
||||
"link": "https://www.freebuf.com/news/417104.html",
|
||||
@ -7,6 +71,14 @@
|
||||
"category": "资讯",
|
||||
"pubDate": "Fri, 06 Dec 2024 19:01:01 +0800"
|
||||
},
|
||||
{
|
||||
"title": "一周网安优质PDF资源推荐丨FreeBuf知识大陆",
|
||||
"link": "https://www.freebuf.com/news/417087.html",
|
||||
"description": "我们精选了本周知识大陆公开发布的10条优质资源,让我们一起看看吧。",
|
||||
"body": "<p>各位读者周末好,以下是本周「FreeBuf知识大陆一周优质资源推荐」,我们精选了本周知识大陆公开发布的10条优质资源,让我们一起看看吧。</p><p><img src=\"https://image.3001.net/images/20241206/1733471735_6752adf728e00ac0f4813.png!small\" width=\"690\" height=\"1200\" alt",
|
||||
"category": "资讯",
|
||||
"pubDate": "Fri, 06 Dec 2024 16:28:51 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FreeBuf周报 | AWS密钥泄露即可被利用;新型钓鱼工具包能让“菜鸟”轻松发动攻击",
|
||||
"link": "https://www.freebuf.com/news/417080.html",
|
||||
@ -71,6 +143,14 @@
|
||||
"category": "资讯",
|
||||
"pubDate": "Fri, 06 Dec 2024 10:48:56 +0800"
|
||||
},
|
||||
{
|
||||
"title": "0day免杀 | rar远程代码执行漏洞(CVE-2023-38831)免杀与复现",
|
||||
"link": "https://www.freebuf.com/vuls/416973.html",
|
||||
"description": "授人以鱼不如授人以渔。在绕过杀软的同时利用漏洞,就是我接下来给大家讲的技术手段。",
|
||||
"body": "<p>众所周知,一个漏洞在出现之后,会很快被各大杀软发现,紧接着就会更新病毒库,针对该漏洞进行检测。像rar之类并不会自动更新的软件,这些漏洞却因为杀软而无法使用。</p><p>授人以鱼不如授人以渔。在绕过杀软的同时利用漏洞,就是我接下来给大家讲的技术手段。</p><h2 id=\"h2-1\">一 测试环境。</h2><h3 id=\"h3-1\">漏洞:CVE-2023-38831</h3><p><s",
|
||||
"category": "漏洞",
|
||||
"pubDate": "Thu, 05 Dec 2024 17:59:46 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FreeBuf早报 | 数万台卫星接收器预装DDoS攻击工具;美国检方起诉 19 岁少年黑客",
|
||||
"link": "https://www.freebuf.com/news/416954.html",
|
||||
@ -78,85 +158,5 @@
|
||||
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 上海全面开展个人信息保护,对“刷脸支付”等过度索取个人信息行为说“不”</h3><p>12月4日,上海市网信办在“亮剑浦江·2024”消费领域个人信息权益保护专项执法行动总结交流会议上发布成效评估报告并透露,今年全市范围3704家公共停车场全面落实停车缴费“纯净码”,24家重点咖啡企业开展自查整改。 【<a href=",
|
||||
"category": "资讯",
|
||||
"pubDate": "Thu, 05 Dec 2024 16:53:55 +0800"
|
||||
},
|
||||
{
|
||||
"title": "知名伏特加品牌因勒索攻击而倒闭",
|
||||
"link": "https://www.freebuf.com/news/416924.html",
|
||||
"description": "Stoli集团在美国的子公司因8月份遭受的勒索软件攻击,以及俄罗斯当局没收其在俄剩余酿酒厂而不得不申请破产保护。",
|
||||
"body": "<p>Stoli集团在美国的子公司因8月份遭受的勒索软件攻击,以及俄罗斯当局没收其在俄剩余酿酒厂而不得不申请破产保护。<img src=\"https://image.3001.net/images/20241205/1733378175_6751407f6ee8aa40b6bdc.png!small\" alt=\"\" /></p><p>Stoli美国公司及其子公司肯塔基猫头鹰公司的总裁兼全球首席执行",
|
||||
"category": "资讯",
|
||||
"pubDate": "Thu, 05 Dec 2024 13:56:42 +0800"
|
||||
},
|
||||
{
|
||||
"title": "谷歌浏览器类型混淆漏洞让攻击者能够执行远程代码",
|
||||
"link": "https://www.freebuf.com/news/416908.html",
|
||||
"description": "攻击者可能利用此漏洞在受影响的系统上执行远程代码,从而导致系统受损和数据盗窃。",
|
||||
"body": "<p>据Cyber Security News消息,最近,独立研究人员在谷歌Chrome 的 V8 JavaScript 引擎中发现了一个严重性较高的类型混淆漏洞。</p><p><img src=\"https://image.3001.net/images/20241205/1733369423_67511e4f50258033a7e83.png!small\" width=\"690\" height",
|
||||
"category": "资讯",
|
||||
"pubDate": "Thu, 05 Dec 2024 11:29:27 +0800"
|
||||
},
|
||||
{
|
||||
"title": "利用断开的域管理员RDP会话提权",
|
||||
"link": "https://www.freebuf.com/vuls/416904.html",
|
||||
"description": "当域内管理员登录过攻击者可控的域内普通机器运维或者排查结束后,退出3389时没有退出账号而是直接关掉了远程桌面,那么会产生哪些风险呢?",
|
||||
"body": "<h2 id=\"h2-1\">前言</h2><p>当域内管理员登录过攻击者可控的域内普通机器运维或者排查结束后,退出3389时没有退出账号而是直接关掉了远程桌面,那么会产生哪些风险呢?有些读者第一个想到的肯定就是抓密码,但是如果抓不到明文密码又或者无法pth呢?</p><h2 id=\"h2-2\">通过计划任务完成域内提权</h2><p>首先模拟域管登录了攻击者可控的普通域内机器并且关掉了3389远程",
|
||||
"category": "漏洞",
|
||||
"pubDate": "Thu, 05 Dec 2024 11:10:43 +0800"
|
||||
},
|
||||
{
|
||||
"title": "警惕这类黑产,近百万老年机被远程控制,每月莫名扣费……",
|
||||
"link": "https://www.freebuf.com/news/416899.html",
|
||||
"description": "初步统计显示,全国竟有98万部手机遭遇莫名扣费情况,金额高达500多万元。不法分子如何盯上老人机?",
|
||||
"body": "<div>在大多数人的观念里,“老人机”功能简单,不能上网购物、玩游戏,只能打电话、收短信,使用起来也相对安全。果真如此吗?</div><div>近期,江苏常州检察机关披露一起案件:当地不少老人机没有开通任何手机增值业务,却被自动订购增值服务,每月秘密扣取资费。警方接到报案后调查发现,这些老人机均被不法分子通过一款代码远程控制了。</div><div>初步统计显示,全国竟有98万部手机遭遇莫名扣费",
|
||||
"category": "资讯",
|
||||
"pubDate": "Thu, 05 Dec 2024 10:46:34 +0800"
|
||||
},
|
||||
{
|
||||
"title": "安全研究年终总结-分享2024年RCE类的CVE漏洞高危EXP集合!",
|
||||
"link": "https://www.freebuf.com/articles/web/416887.html",
|
||||
"description": "网络安全漏洞不断变化且威胁日益严重,及时了解和修复这些漏洞至关重要。本文介绍的多个CVE漏洞,涉及常见的企业级软件和硬件,黑客可以利用这些漏洞远程控制系统、窃取敏感数据甚至完全破坏服务。",
|
||||
"body": "<h2 id=\"h2-1\">缘起</h2><ul><li><p>网络安全漏洞不断变化且威胁日益严重,及时了解和修复这些漏洞至关重要。本文介绍的多个CVE漏洞,涉及常见的企业级软件和硬件,黑客可以利用这些漏洞远程控制系统、窃取敏感数据甚至完全破坏服务。</p></li><li><p>对于企业和开发者来说,了解这些漏洞不仅能帮助保护自己的系统,还能减少数据泄露、经济损失和品牌信誉的风险。因此,深入研究",
|
||||
"category": "Web安全",
|
||||
"pubDate": "Thu, 05 Dec 2024 09:42:13 +0800"
|
||||
},
|
||||
{
|
||||
"title": "信息安全管 | 企业端点与主机安全",
|
||||
"link": "https://www.freebuf.com/articles/endpoint/400836.html",
|
||||
"description": "本文主要探讨企业在管理和强化端点与主机安全方面所面临的挑战,并介绍一些最佳实践和策略,帮助企业构建一个坚固的安全防线。",
|
||||
"body": "<h2 id=\"h2-1\">前言:</h2><p>随着网络威胁的日益复杂化和攻击手段的不断进化,企业端点与主机安全的重要性愈发凸显。端点安全不仅涉及保护企业内部员工的工作站、笔记本电脑、移动设备等,还包括确保服务器、虚拟化环境以及企业数据中心的安全。这些端点作为企业网络的入口和出口,若管理不善,将可能成为网络攻击者的温床和突破口。本文主要探讨企业在管理和强化端点与主机安全方面所面临的挑战,并介绍一",
|
||||
"category": "终端安全",
|
||||
"pubDate": "Thu, 05 Dec 2024 08:46:32 +0800"
|
||||
},
|
||||
{
|
||||
"title": "企业从0到1如何配置 | 工控操作系统标准基线",
|
||||
"link": "https://www.freebuf.com/articles/ics-articles/402959.html",
|
||||
"description": "合理的安全配置基线可以有效降低工控系统受到恶意攻击的风险,提升系统的稳定性和可靠性。",
|
||||
"body": "<h2 id=\"h2-1\"><strong>前言</strong></h2><p>开局先废话;前几天领导说要我把企业所有基线标准梳理一下然后我马上就把活甩给小弟做了;同时紧急把我的文件库存拿出来看了一下;顺便分享一下给兄弟们;在制造业随着自动化工控系统的普及和发展,Windows操作系统在工控领域的应用也越来越广泛。然而,由于工控系统的特殊性,对Windows操作系统的安全配置提出了更高的要求。为",
|
||||
"category": "工控安全",
|
||||
"pubDate": "Thu, 05 Dec 2024 08:43:15 +0800"
|
||||
},
|
||||
{
|
||||
"title": "钓鱼网页散播银狐木马,远控后门威胁终端安全",
|
||||
"link": "https://www.freebuf.com/news/416880.html",
|
||||
"description": "在当今网络环境下,许多人都有通过搜索引擎下载应用程序的习惯,虽然这种方式简单又迅速,但这也可能被不法分子所利用,通过设置钓鱼网站来欺骗用户。这些钓鱼网站可能会通过各种方式吸引用户点击,从而进行病毒的传",
|
||||
"body": "<p style=\"text-align:left;\">在当今网络环境下,许多人都有通过搜索引擎下载应用程序的习惯,虽然这种方式简单又迅速,但这也可能被不法分子所利用,通过设置钓鱼网站来欺骗用户。这些钓鱼网站可能会通过各种方式吸引用户点击,从而进行病毒的传播,危害个人或企业的信息安全。</p><p style=\"text-align:left;\">我们期望本篇文章有助于帮助您提高网络安全防范意识,",
|
||||
"category": "资讯",
|
||||
"pubDate": "Wed, 04 Dec 2024 21:28:45 +0800"
|
||||
},
|
||||
{
|
||||
"title": "FreeBuf早报 | 今年黑客已窃取 14.9 亿美元加密货币;Cloudflare开发人员域正被滥用",
|
||||
"link": "https://www.freebuf.com/news/416863.html",
|
||||
"description": "Web3 漏洞赏金平台 Immunefi 的一份新报告显示,2024 年迄今已记录了近 14.9 亿美元的加密货币损失,主要是由于黑客事件。",
|
||||
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 中国多个协会声明:美国芯片不再安全、不再可靠,慎用</h3><p>中国互联网协会、中国半导体行业协会、中汽协、中国通信企业协会齐发声,谨慎采购美国芯片。 【<a href=\"https://www.secrss.com/articles/73037\"><u>阅读原文</u></a>】</p><h3 id=\"h3-2\">",
|
||||
"category": "资讯",
|
||||
"pubDate": "Wed, 04 Dec 2024 17:35:23 +0800"
|
||||
},
|
||||
{
|
||||
"title": "JNDI绕过高版本注入限制那些事",
|
||||
"link": "https://www.freebuf.com/vuls/416862.html",
|
||||
"description": "JNDI高版本注入可以说是java安全大集合了。涉及了许多框架漏洞的组合使用,当分析完JNDI高版本时,我认为也算是正式入门JAVA安全了",
|
||||
"body": "<p style=\"white-space:pre-wrap;letter-spacing:normal;text-indent:0px;text-transform:none;word-spacing:0px;\">JNDI高版本注入可以说是java安全大集合了。涉及了许多框架漏洞的组合使用,当分析完JNDI高版本时,我认为也算是正式入门JAVA安全了</p><p style=\"white-spa",
|
||||
"category": "漏洞",
|
||||
"pubDate": "Wed, 04 Dec 2024 17:25:46 +0800"
|
||||
}
|
||||
]
|
@ -1,4 +1,18 @@
|
||||
[
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3936",
|
||||
"title": "解读 2024 年高通 GPU 漏洞细节及利用技术",
|
||||
"description": "本文主要分析 2024 年高通 GPU 上的一些漏洞细节\nCVE-2024-23380\n与 Mali 类似高通的 GPU 驱动使用 kgsl_mem_entry 和 kgsl_memdesc 结构体来管理物理页\n\nkgsl_mem_entry 对象分配的逻辑位于 kg...",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-09 10:00:02"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3919",
|
||||
"title": "glibc堆all-in-one",
|
||||
"description": "本篇文章篇幅很长,记录了笔者学习glibc堆的全部心得,从入门的堆分配的学习,一些经典打法的总结,以及个人的技巧,保护机制的变动。再到io basic knowledge,glibc的IO-FILE攻击部分,常见的house系列总结,最后到magic_gadgets,以及打libc got,stdout,stderr这些比较边角的内容,希望对入门学堆的你有所帮助,也希望帮助更多学习glibc堆的师傅建立知识体系,也欢迎更多大佬进行补充指点",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-12-09 09:00:00"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3924",
|
||||
"title": "GPU 驱动漏洞:窥探驱动漏洞利用的技术奥秘",
|
||||
@ -54,19 +68,5 @@
|
||||
"description": "演讲议题:蓝牙漏洞敞开大门:无需密码的致命安全隐患",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-11-28 18:21:29"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3963",
|
||||
"title": "【2024补天白帽城市沙龙-广州站】大模型Cos 与越狱框架探索",
|
||||
"description": "演讲议题:大模型Cos 与越狱框架探索",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-11-28 18:19:30"
|
||||
},
|
||||
{
|
||||
"guid": "https://forum.butian.net/share/3910",
|
||||
"title": "XCTF分站赛SCTF2024Pwn方向题解",
|
||||
"description": "本文详细记录了笔者做SCTF2024Pwn方向题目的过程,希望对打Pwn的你有所启发",
|
||||
"source": "subject",
|
||||
"pubDate": "2024-11-28 09:33:40"
|
||||
}
|
||||
]
|
@ -1,4 +1,12 @@
|
||||
[
|
||||
{
|
||||
"title": "Unveiling Dark Internet Service Providers: Bulletproof Hosting\n",
|
||||
"link": "https://paper.seebug.org/3249/",
|
||||
"description": "Author: Knownsec 404 team\nDate: Dec 9, 2024\n1. Abstract\nBulletproof hosting services provide the infrastructure for cybercriminal activities, enabling criminals to evade legal constraints and are o...\n",
|
||||
"pubDate": "Mon, 09 Dec 2024 04:14:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3249/",
|
||||
"category": "404 English Paper"
|
||||
},
|
||||
{
|
||||
"title": "基于 InternLM 和 LangChain 搭建私人知识库\n",
|
||||
"link": "https://paper.seebug.org/3247/",
|
||||
@ -110,13 +118,5 @@
|
||||
"pubDate": "Wed, 13 Nov 2024 04:23:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3234/",
|
||||
"category": "404专栏"
|
||||
},
|
||||
{
|
||||
"title": "CodeQL 入门和基本使用\n",
|
||||
"link": "https://paper.seebug.org/3233/",
|
||||
"description": "作者:0x7F@知道创宇404实验室\n日期:2024年11月12日\n1.前言\nCodeQL 是 GitHub 推出的一种静态代码分析工具,用于查找和修复代码中的漏洞和安全问题。该工具最早由 Semmle 团队开发并命名为 Semmle QL,应用于自家的源代码分析平台 LGTM(Looks Good To Me) 上;2020年,Github 收购了 Semmle 团队并成立了 Securi...\n",
|
||||
"pubDate": "Tue, 12 Nov 2024 06:07:00 +0000",
|
||||
"guid": "https://paper.seebug.org/3233/",
|
||||
"category": "404专栏"
|
||||
}
|
||||
]
|
@ -1,4 +1,134 @@
|
||||
[
|
||||
{
|
||||
"title": "强网杯S8决赛RW赛道",
|
||||
"link": "https://xz.aliyun.com/t/16607",
|
||||
"published": "2024-12-07T16:39:52+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16607",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "强网杯S8决赛RW赛道"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "2024国城杯pwn详细全解",
|
||||
"link": "https://xz.aliyun.com/t/16606",
|
||||
"published": "2024-12-07T16:27:51+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16606",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "2024国城杯pwn详细全解"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "2024国城杯线上Crypto-WP",
|
||||
"link": "https://xz.aliyun.com/t/16605",
|
||||
"published": "2024-12-07T16:10:19+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16605",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "2024国城杯线上Crypto-WP"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "强网S8决赛JsonPcikle Safe模式下的RCE与绕过分析研究",
|
||||
"link": "https://xz.aliyun.com/t/16604",
|
||||
"published": "2024-12-07T16:07:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16604",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "强网S8决赛JsonPcikle Safe模式下的RCE与绕过分析研究"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "Pyramid 框架SSTI分析RCE",
|
||||
"link": "https://xz.aliyun.com/t/16600",
|
||||
"published": "2024-12-07T13:37:25+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16600",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "Pyramid 框架SSTI分析RCE"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "apk修改实践:绕过强制更新弹窗",
|
||||
"link": "https://xz.aliyun.com/t/16599",
|
||||
"published": "2024-12-07T11:02:35+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16599",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "apk修改实践:绕过强制更新弹窗"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "浅析异常线程检测逻辑(unbacked)",
|
||||
"link": "https://xz.aliyun.com/t/16598",
|
||||
"published": "2024-12-07T10:30:27+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16598",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "浅析异常线程检测逻辑(unbacked)"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "boofuzz 中的 Request 和 Path 源码分析",
|
||||
"link": "https://xz.aliyun.com/t/16594",
|
||||
"published": "2024-12-07T02:06:10+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16594",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "boofuzz 中的 Request 和 Path 源码分析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "云函数实现代理绕过IP封锁",
|
||||
"link": "https://xz.aliyun.com/t/16589",
|
||||
"published": "2024-12-06T22:46:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16589",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "云函数实现代理绕过IP封锁"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "CVE-2024-4181 run-llama/llama_index-SSE Command Injection分析",
|
||||
"link": "https://xz.aliyun.com/t/16588",
|
||||
"published": "2024-12-06T22:34:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16588",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "CVE-2024-4181 run-llama/llama_index-SSE Command Injection分析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "若依一把梭哈工具源码分析",
|
||||
"link": "https://xz.aliyun.com/t/16586",
|
||||
"published": "2024-12-06T22:31:35+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16586",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "若依一把梭哈工具源码分析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "CVE-2024-3408 D-tale bypassRCE分析",
|
||||
"link": "https://xz.aliyun.com/t/16587",
|
||||
"published": "2024-12-06T22:31:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16587",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "CVE-2024-3408 D-tale bypassRCE分析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "S8强网杯 ez_login详解",
|
||||
"link": "https://xz.aliyun.com/t/16582",
|
||||
"published": "2024-12-06T20:08:01+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16582",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "S8强网杯 ez_login详解"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "S8强网杯Final-thinkshopplus",
|
||||
"link": "https://xz.aliyun.com/t/16581",
|
||||
@ -9,6 +139,166 @@
|
||||
"#text": "S8强网杯Final-thinkshopplus"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "gRPC&Go: XCTF联赛DubheCTF2024 - ggbond 详细题解",
|
||||
"link": "https://xz.aliyun.com/t/16580",
|
||||
"published": "2024-12-06T17:51:46+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16580",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "gRPC&Go: XCTF联赛DubheCTF2024 - ggbond 详细题解"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "免杀基础-shellcode开发",
|
||||
"link": "https://xz.aliyun.com/t/16579",
|
||||
"published": "2024-12-06T15:19:56+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16579",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "免杀基础-shellcode开发"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(二)",
|
||||
"link": "https://xz.aliyun.com/t/16577",
|
||||
"published": "2024-12-06T14:10:30+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16577",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(二)"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "JFinal CMS 5.1.0 命令执行漏洞分析(CVE-2024-53477)",
|
||||
"link": "https://xz.aliyun.com/t/16575",
|
||||
"published": "2024-12-06T13:27:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16575",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "JFinal CMS 5.1.0 命令执行漏洞分析(CVE-2024-53477)"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "Sharp4Killdefender:通过修改注册表关闭Windows Defender",
|
||||
"link": "https://xz.aliyun.com/t/16574",
|
||||
"published": "2024-12-06T13:00:24+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16574",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "Sharp4Killdefender:通过修改注册表关闭Windows Defender"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "从一道java题体验 scxml漏洞",
|
||||
"link": "https://xz.aliyun.com/t/16572",
|
||||
"published": "2024-12-06T12:13:03+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16572",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "从一道java题体验 scxml漏洞"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "一次Telegram窃取程序的深入解析:从技术细节到定位攻击者账户的完整流程",
|
||||
"link": "https://xz.aliyun.com/t/16570",
|
||||
"published": "2024-12-06T12:01:42+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16570",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "一次Telegram窃取程序的深入解析:从技术细节到定位攻击者账户的完整流程"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "CVE-2018-1270 spring-messaging RCE 深入分析",
|
||||
"link": "https://xz.aliyun.com/t/16569",
|
||||
"published": "2024-12-06T11:44:58+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16569",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "CVE-2018-1270 spring-messaging RCE 深入分析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "DTStack Taier 1.4.0 listNames sql注入分析(CVE-2024-41579)",
|
||||
"link": "https://xz.aliyun.com/t/16568",
|
||||
"published": "2024-12-06T11:08:37+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16568",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "DTStack Taier 1.4.0 listNames sql注入分析(CVE-2024-41579)"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "基于environ变量的堆题攻击栈空间",
|
||||
"link": "https://xz.aliyun.com/t/16566",
|
||||
"published": "2024-12-05T22:29:29+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16566",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "基于environ变量的堆题攻击栈空间"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "burpsuite数据包自动加解密插件,autoDecoder详细安装+使用",
|
||||
"link": "https://xz.aliyun.com/t/16564",
|
||||
"published": "2024-12-05T16:57:14+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16564",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "burpsuite数据包自动加解密插件,autoDecoder详细安装+使用"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "一次红队恶意程序分析溯源",
|
||||
"link": "https://xz.aliyun.com/t/16563",
|
||||
"published": "2024-12-05T15:39:11+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16563",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "一次红队恶意程序分析溯源"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "深入异构 PWN:PowerPC&ARM&MIPS",
|
||||
"link": "https://xz.aliyun.com/t/16562",
|
||||
"published": "2024-12-05T14:23:42+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16562",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "深入异构 PWN:PowerPC&ARM&MIPS"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "llvm pass 初探",
|
||||
"link": "https://xz.aliyun.com/t/16558",
|
||||
"published": "2024-12-05T12:04:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16558",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "llvm pass 初探"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "从源码的角度学习 boofuzz 函数的使用",
|
||||
"link": "https://xz.aliyun.com/t/16554",
|
||||
"published": "2024-12-05T01:05:47+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16554",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "从源码的角度学习 boofuzz 函数的使用"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "分享最近攻防演练HVV漏洞复盘",
|
||||
"link": "https://xz.aliyun.com/t/16553",
|
||||
"published": "2024-12-04T21:11:09+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16553",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "分享最近攻防演练HVV漏洞复盘"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "伪装成ToDesk安装程序加载后门盗取数字货币",
|
||||
"link": "https://xz.aliyun.com/t/16552",
|
||||
@ -708,295 +998,5 @@
|
||||
"@type": "html",
|
||||
"#text": "windows注入 r3级强制结束进程"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "2024网鼎杯 crypto(青龙朱雀白虎) wp",
|
||||
"link": "https://xz.aliyun.com/t/16426",
|
||||
"published": "2024-11-27T21:27:21+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16426",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "2024网鼎杯 crypto(青龙朱雀白虎) wp"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "基于realloc函数的堆攻击",
|
||||
"link": "https://xz.aliyun.com/t/16424",
|
||||
"published": "2024-11-27T21:02:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16424",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "基于realloc函数的堆攻击"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "Java反序列化攻击链:深入剖析与实战",
|
||||
"link": "https://xz.aliyun.com/t/16423",
|
||||
"published": "2024-11-27T20:14:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16423",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "Java反序列化攻击链:深入剖析与实战"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "从DAS暑期挑战赛的一道题来理解largebinattack的攻击流程",
|
||||
"link": "https://xz.aliyun.com/t/16422",
|
||||
"published": "2024-11-27T18:27:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16422",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "从DAS暑期挑战赛的一道题来理解largebinattack的攻击流程"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "验证码攻防问题总结分享",
|
||||
"link": "https://xz.aliyun.com/t/16421",
|
||||
"published": "2024-11-27T17:17:43+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16421",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "验证码攻防问题总结分享"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "Newstar Week5 WEB详细解析全",
|
||||
"link": "https://xz.aliyun.com/t/16419",
|
||||
"published": "2024-11-27T15:11:46+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16419",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "Newstar Week5 WEB详细解析全"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "ecology checkPassword 代码执行",
|
||||
"link": "https://xz.aliyun.com/t/16418",
|
||||
"published": "2024-11-27T14:37:03+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16418",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "ecology checkPassword 代码执行"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "JAVA安全之JMX攻防研究分析",
|
||||
"link": "https://xz.aliyun.com/t/16417",
|
||||
"published": "2024-11-27T14:21:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16417",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "JAVA安全之JMX攻防研究分析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "2024 强网杯qroute详细解析",
|
||||
"link": "https://xz.aliyun.com/t/16416",
|
||||
"published": "2024-11-27T12:38:51+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16416",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "2024 强网杯qroute详细解析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "第八届强网杯青少年专项赛线上选拔赛ctf题解",
|
||||
"link": "https://xz.aliyun.com/t/16414",
|
||||
"published": "2024-11-27T11:36:27+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16414",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "第八届强网杯青少年专项赛线上选拔赛ctf题解"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "调用网页JS解决前端加密",
|
||||
"link": "https://xz.aliyun.com/t/16413",
|
||||
"published": "2024-11-27T10:22:44+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16413",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "调用网页JS解决前端加密"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "go的栈溢出详细解析",
|
||||
"link": "https://xz.aliyun.com/t/16411",
|
||||
"published": "2024-11-27T00:26:47+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16411",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "go的栈溢出详细解析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "pwn堆利用之unlink",
|
||||
"link": "https://xz.aliyun.com/t/16409",
|
||||
"published": "2024-11-26T22:41:40+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16409",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "pwn堆利用之unlink"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "第二届龙信杯服务器取证复现",
|
||||
"link": "https://xz.aliyun.com/t/16408",
|
||||
"published": "2024-11-26T20:38:10+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16408",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "第二届龙信杯服务器取证复现"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "条件竞争glibc堆的详细讲解",
|
||||
"link": "https://xz.aliyun.com/t/16498",
|
||||
"published": "2024-11-26T18:24:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16498",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "条件竞争glibc堆的详细讲解"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "2024网鼎杯半决card_master详细分析",
|
||||
"link": "https://xz.aliyun.com/t/16406",
|
||||
"published": "2024-11-26T18:04:17+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16406",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "2024网鼎杯半决card_master详细分析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "Apache HertzBeat 漏洞复现三则",
|
||||
"link": "https://xz.aliyun.com/t/16404",
|
||||
"published": "2024-11-26T16:22:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16404",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "Apache HertzBeat 漏洞复现三则"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "Sharp4CompilerLoader:通过动态编译混淆代码执行Shellcode",
|
||||
"link": "https://xz.aliyun.com/t/16401",
|
||||
"published": "2024-11-26T14:39:11+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16401",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "Sharp4CompilerLoader:通过动态编译混淆代码执行Shellcode"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "2024网鼎杯半决赛RE全题解",
|
||||
"link": "https://xz.aliyun.com/t/16400",
|
||||
"published": "2024-11-26T13:53:43+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16400",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "2024网鼎杯半决赛RE全题解"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "IOT安全的入门经典——DIR-815漏洞复现",
|
||||
"link": "https://xz.aliyun.com/t/16399",
|
||||
"published": "2024-11-26T10:04:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16399",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "IOT安全的入门经典——DIR-815漏洞复现"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "强网青少年二进制和杂项wp",
|
||||
"link": "https://xz.aliyun.com/t/16398",
|
||||
"published": "2024-11-26T02:29:47+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16398",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "强网青少年二进制和杂项wp"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "强网拟态2024白盒资格赛turn详解",
|
||||
"link": "https://xz.aliyun.com/t/16397",
|
||||
"published": "2024-11-26T00:47:06+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16397",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "强网拟态2024白盒资格赛turn详解"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "对MSC文件再利用实现过父过流量免杀",
|
||||
"link": "https://xz.aliyun.com/t/16394",
|
||||
"published": "2024-11-25T23:12:52+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16394",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "对MSC文件再利用实现过父过流量免杀"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "Patchwork(白象)APT组织Protego远控木马攻击场景复现",
|
||||
"link": "https://xz.aliyun.com/t/16392",
|
||||
"published": "2024-11-25T22:38:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16392",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "Patchwork(白象)APT组织Protego远控木马攻击场景复现"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "游戏漏洞挖掘思路分享",
|
||||
"link": "https://xz.aliyun.com/t/16391",
|
||||
"published": "2024-11-25T22:37:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16391",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "游戏漏洞挖掘思路分享"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "glibc内存管理分析",
|
||||
"link": "https://xz.aliyun.com/t/16390",
|
||||
"published": "2024-11-25T22:15:06+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16390",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "glibc内存管理分析"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "某系统代码审计RCE",
|
||||
"link": "https://xz.aliyun.com/t/16389",
|
||||
"published": "2024-11-25T21:02:20+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16389",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "某系统代码审计RCE"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "2024网鼎杯半决赛-pwn",
|
||||
"link": "https://xz.aliyun.com/t/16386",
|
||||
"published": "2024-11-25T19:56:34+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16386",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "2024网鼎杯半决赛-pwn"
|
||||
}
|
||||
},
|
||||
{
|
||||
"title": "第四届网鼎杯半决赛-安全运营挑战赛加固修复Part学习&分析",
|
||||
"link": "https://xz.aliyun.com/t/16385",
|
||||
"published": "2024-11-25T18:06:00+08:00",
|
||||
"id": "https://xz.aliyun.com/t/16385",
|
||||
"summary": {
|
||||
"@type": "html",
|
||||
"#text": "第四届网鼎杯半决赛-安全运营挑战赛加固修复Part学习&分析"
|
||||
}
|
||||
}
|
||||
]
|
@ -6,10 +6,11 @@ config.yaml可指定大部分可能需要的参数 <br>
|
||||
### 下一步计划 <br>
|
||||
- 添加更多RSS订阅源 <br>
|
||||
- 将所有打印信息转为logging info并存档(已完成)<br>
|
||||
- 将logging info转为异步的loguru <br>
|
||||
- 将logging info转为异步的loguru(已完成) <br>
|
||||
- 探查异常中断原因(暂未清楚发生原因,猜测和4hou获取rss后的代码逻辑有关) <br>
|
||||
- 存档所有推送文章方便以后查看 <br>
|
||||
- 添加更多推送方式,如邮件、微信等 <br>
|
||||
- 创建Web网页以展示最新推送 <br>
|
||||
|
||||
### 日志相关
|
||||
请查看./log文件夹下内容 <br>
|
||||
|
Binary file not shown.
Binary file not shown.
BIN
db/4hou.db
BIN
db/4hou.db
Binary file not shown.
BIN
db/anquanke.db
BIN
db/anquanke.db
Binary file not shown.
BIN
db/doonsec.db
BIN
db/doonsec.db
Binary file not shown.
BIN
db/freebuf.db
BIN
db/freebuf.db
Binary file not shown.
BIN
db/qianxin.db
BIN
db/qianxin.db
Binary file not shown.
BIN
db/seebug.db
BIN
db/seebug.db
Binary file not shown.
BIN
db/xianzhi.db
BIN
db/xianzhi.db
Binary file not shown.
@ -4,22 +4,16 @@ import requests
|
||||
import xml.etree.ElementTree as ET
|
||||
import json
|
||||
from requests.exceptions import RequestException
|
||||
import logging
|
||||
from loguru import logger
|
||||
|
||||
# 设置日志记录
|
||||
logger = logging.getLogger()
|
||||
logger.setLevel(logging.INFO)
|
||||
logger.handlers.clear() # 清除已有的处理器
|
||||
|
||||
file_handler = logging.FileHandler('./log/spider.log', mode='a', encoding='utf-8')
|
||||
file_handler.setFormatter(logging.Formatter('%(asctime)s - %(levelname)s - %(message)s'))
|
||||
|
||||
console_handler = logging.StreamHandler()
|
||||
console_handler.setFormatter(logging.Formatter('%(asctime)s - %(levelname)s - %(message)s'))
|
||||
|
||||
logger.addHandler(file_handler)
|
||||
logger.addHandler(console_handler)
|
||||
logger.propagate = False # 禁用日志传递
|
||||
logger.add("./log/spider.log",
|
||||
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
|
||||
rotation="10 MB",
|
||||
compression="zip",
|
||||
encoding="utf-8")
|
||||
# shell终端打印日志
|
||||
# logger.add(lambda msg: print(msg),
|
||||
# format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}")
|
||||
|
||||
# 测试用爬虫请求头
|
||||
headers = {
|
||||
|
@ -4,22 +4,16 @@ import requests
|
||||
import xml.etree.ElementTree as ET
|
||||
import json
|
||||
from requests.exceptions import RequestException
|
||||
import logging
|
||||
from loguru import logger
|
||||
|
||||
# 设置日志记录
|
||||
logger = logging.getLogger()
|
||||
logger.setLevel(logging.INFO)
|
||||
logger.handlers.clear() # 清除已有的处理器
|
||||
|
||||
file_handler = logging.FileHandler('./log/spider.log', mode='a', encoding='utf-8')
|
||||
file_handler.setFormatter(logging.Formatter('%(asctime)s - %(levelname)s - %(message)s'))
|
||||
|
||||
console_handler = logging.StreamHandler()
|
||||
console_handler.setFormatter(logging.Formatter('%(asctime)s - %(levelname)s - %(message)s'))
|
||||
|
||||
logger.addHandler(file_handler)
|
||||
logger.addHandler(console_handler)
|
||||
logger.propagate = False # 禁用日志传递
|
||||
logger.add("./log/spider.log",
|
||||
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
|
||||
rotation="10 MB",
|
||||
compression="zip",
|
||||
encoding="utf-8")
|
||||
# shell终端打印日志
|
||||
# logger.add(lambda msg: print(msg),
|
||||
# format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}")
|
||||
|
||||
# 测试用爬虫请求头
|
||||
headers = {
|
||||
|
@ -3,22 +3,16 @@ import os
|
||||
import requests
|
||||
import xmltodict
|
||||
import json
|
||||
import logging
|
||||
from loguru import logger
|
||||
|
||||
# 设置日志记录
|
||||
logger = logging.getLogger()
|
||||
logger.setLevel(logging.INFO)
|
||||
logger.handlers.clear() # 清除已有的处理器
|
||||
|
||||
file_handler = logging.FileHandler('./log/spider.log', mode='a', encoding='utf-8')
|
||||
file_handler.setFormatter(logging.Formatter('%(asctime)s - %(levelname)s - %(message)s'))
|
||||
|
||||
console_handler = logging.StreamHandler()
|
||||
console_handler.setFormatter(logging.Formatter('%(asctime)s - %(levelname)s - %(message)s'))
|
||||
|
||||
logger.addHandler(file_handler)
|
||||
logger.addHandler(console_handler)
|
||||
logger.propagate = False # 禁用日志传递
|
||||
logger.add("./log/spider.log",
|
||||
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
|
||||
rotation="10 MB",
|
||||
compression="zip",
|
||||
encoding="utf-8")
|
||||
# shell终端打印日志
|
||||
# logger.add(lambda msg: print(msg),
|
||||
# format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}")
|
||||
|
||||
# 测试用爬虫请求头
|
||||
headers = {
|
||||
|
@ -1,3 +1,4 @@
|
||||
pyyaml
|
||||
xmltodict
|
||||
schedule
|
||||
schedule
|
||||
loguru
|
||||
|
Loading…
Reference in New Issue
Block a user