更新优化

This commit is contained in:
MasonLiu 2025-03-14 11:50:28 +08:00
parent 42ad72c0ca
commit 2f6ae2b404
47 changed files with 3472 additions and 2323 deletions

20
Core.py
View File

@ -20,6 +20,7 @@ from spider.xianzhi import xianzhi_main
from spider.sougou_wx import sougou_wx_main from spider.sougou_wx import sougou_wx_main
from spider.github import github_main, load_github_config from spider.github import github_main, load_github_config
from spider.baidu import baidu_main from spider.baidu import baidu_main
from spider.uni import uni_spider
from GotoSend.M_4hou import Src_4hou from GotoSend.M_4hou import Src_4hou
from GotoSend.anquanke import Src_anquanke from GotoSend.anquanke import Src_anquanke
from GotoSend.doonsec import Src_doonsec from GotoSend.doonsec import Src_doonsec
@ -30,6 +31,7 @@ from GotoSend.seebug import Src_seebug
from GotoSend.sougou_wx import Src_sougou_wx from GotoSend.sougou_wx import Src_sougou_wx
from GotoSend.github import Src_github from GotoSend.github import Src_github
from GotoSend.baidu import Src_baidu from GotoSend.baidu import Src_baidu
from GotoSend.uni_rss import Src_uni_rss
from config.check_config import get_core_config, get_debug_config, get_keywords_config from config.check_config import get_core_config, get_debug_config, get_keywords_config
from loguru import logger from loguru import logger
@ -87,6 +89,7 @@ def check_avaliable(info_long, info_short, title):
def send_job_RSS(time_1): def send_job_RSS(time_1):
Doonsec_switch, Doonsec = get_keywords_config('Doonsec') Doonsec_switch, Doonsec = get_keywords_config('Doonsec')
uni_switch, Unity = get_keywords_config('Unity')
# Seebug数据获取分发 # Seebug数据获取分发
seebug_main() seebug_main()
@ -154,6 +157,15 @@ def send_job_RSS(time_1):
else: else:
logger.info("洞见微信安全数据为空,跳过执行。") logger.info("洞见微信安全数据为空,跳过执行。")
# 聚合RSS数据获取分发
uni_spider()
rss_results = Src_uni_rss(uni_switch, Unity)
if rss_results != False:
result_rss_long, result_rss_short = rss_results
check_avaliable(result_rss_long, result_rss_short, "聚合RSS资讯")
else:
logger.info("聚合RSS数据为空跳过执行。")
def send_job_SX(): def send_job_SX():
Sogou_WX = get_keywords_config('Sogou-WX') Sogou_WX = get_keywords_config('Sogou-WX')
sougou_wx_main(Sogou_WX) sougou_wx_main(Sogou_WX)
@ -161,6 +173,8 @@ def send_job_SX():
if results != False: if results != False:
result_sx_long, result_sx_short = results result_sx_long, result_sx_short = results
check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容") check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容")
else:
logger.info("微信公众号数据为空,跳过执行。")
def send_job_github(time_1): def send_job_github(time_1):
keyword_list, tool_list, user_list, black_words = load_github_config() keyword_list, tool_list, user_list, black_words = load_github_config()
@ -182,8 +196,12 @@ def send_job_github(time_1):
def send_job_baidu(): def send_job_baidu():
Baidu = get_keywords_config('Baidu') Baidu = get_keywords_config('Baidu')
baidu_main(Baidu) baidu_main(Baidu)
result_baidu_long, result_baidu_short = Src_baidu() results = Src_baidu()
if results != False:
result_baidu_long, result_baidu_short = results
check_avaliable(result_baidu_long, result_baidu_short, "百度搜索关键词相关内容") check_avaliable(result_baidu_long, result_baidu_short, "百度搜索关键词相关内容")
else:
logger.info("百度搜索数据为空,跳过执行。")
# 探测rss源状态 # 探测rss源状态
def check_rss_status(url): def check_rss_status(url):

View File

@ -50,7 +50,7 @@ def get_4hou_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):

Binary file not shown.

View File

@ -45,7 +45,7 @@ def get_anquanke_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):

View File

@ -57,7 +57,7 @@ def get_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) data = json.loads(content)
# 假设data是一个包含多个关键词的字典 # 假设data是一个包含多个关键词的字典
total_data = [] total_data = []

View File

@ -57,7 +57,8 @@ def get_doonsec_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) # print(content)
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):

View File

@ -50,7 +50,7 @@ def get_freebuf_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):

View File

@ -66,7 +66,7 @@ def insert_data():
if not content: if not content:
pass pass
else: else:
data_keyword = json.load(file) data_keyword = json.loads(content)
if not isinstance(data_keyword, list): if not isinstance(data_keyword, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
@ -77,7 +77,7 @@ def insert_data():
if not content: if not content:
pass pass
else: else:
data_repo = json.load(file) data_repo = json.loads(content)
if not isinstance(data_repo, list): if not isinstance(data_repo, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
@ -88,7 +88,7 @@ def insert_data():
if not content: if not content:
pass pass
else: else:
data_release = json.load(file) data_release = json.loads(content)
if not isinstance(data_release, list): if not isinstance(data_release, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
@ -99,7 +99,7 @@ def insert_data():
if not content: if not content:
pass pass
else: else:
data_user = json.load(file) data_user = json.loads(content)
if not isinstance(data_user, list): if not isinstance(data_user, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")

View File

@ -41,7 +41,7 @@ def get_qianxin_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):

View File

@ -48,7 +48,7 @@ def get_seebug_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):

View File

@ -56,7 +56,7 @@ def get_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) data = json.loads(content)
# 假设data是一个包含多个关键词的字典 # 假设data是一个包含多个关键词的字典
total_data = [] total_data = []

233
GotoSend/uni_rss.py Normal file
View File

@ -0,0 +1,233 @@
# -*- coding: utf-8 -*-
import json
import sqlite3
import os
from datetime import datetime, timedelta
def create_database():
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
cursor.execute('''CREATE TABLE IF NOT EXISTS articles (
id INTEGER PRIMARY KEY AUTOINCREMENT,
title TEXT,
link TEXT,
author TEXT,
description TEXT,
pubDate DATETIME,
source TEXT,
is_sended BOOLEAN
)''')
conn.commit()
conn.close()
def insert_data(data):
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
for entry in data:
cursor.execute('''
SELECT 1 FROM articles WHERE title = ? AND author = ?
''', (entry['title'], entry['author']))
if cursor.fetchone() is None:
cursor.execute('''
INSERT INTO articles (title, link, author, description, pubDate, source)
VALUES (?, ?, ?, ?, ?, ?)
''', (entry['title'], entry['link'], entry['author'], entry['description'], entry['published'], entry['source']))
conn.commit()
conn.close()
def get_uni_rss_json():
# 检查文件是否存在
if not os.path.exists('./resources/JSON/uni_rss.json'):
raise FileNotFoundError(f"uni_rss.json文件不存在请检查程序是否运行正常")
# 打开并读取JSON文件
with open('./resources/JSON/uni_rss.json', 'r', encoding='utf-8') as file:
content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list):
raise ValueError("JSON文件格式错误请检查common.py是否异常")
# 提取所需字段并编号
total_data = []
for index, item in enumerate(data, start=1):
entry = {
"id": index,
"title": item.get("title", ""),
"link": item.get("link", ""),
"author": item.get("author", ""),
"description": item.get("description", ""),
"published": item.get("published", ""),
"source": item.get("source", ""),
}
total_data.append(entry)
return total_data
def select_articles(uni_rss_switch, Unity):
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
# 获取当前日期和时间
now = datetime.now()
two_days_ago = now - timedelta(days=2)
if uni_rss_switch == False:
# 查询指定时间段内的数据
cursor.execute('''
SELECT * FROM articles
WHERE is_sended IS NULL AND pubDate BETWEEN ? AND ?
ORDER BY pubDate DESC
''', (two_days_ago.strftime('%Y-%m-%d %H:%M:%S'), now.strftime('%Y-%m-%d %H:%M:%S')))
elif uni_rss_switch == True:
# 查询指定时间段内且title包含特定关键词的数据
like_conditions = ' OR '.join([f"title LIKE ?"] * len(Unity))
# 完整的查询语句
query = f'''
SELECT * FROM articles
WHERE is_sended IS NULL AND pubDate BETWEEN ? AND ?
AND ({like_conditions})
ORDER BY pubDate DESC
'''
# 构建参数列表
params = [
two_days_ago.strftime('%Y-%m-%d %H:%M:%S'),
now.strftime('%Y-%m-%d %H:%M:%S')
] + [f'%{keyword}%' for keyword in Unity]
# 执行查询
cursor.execute(query, params)
results = cursor.fetchall()
if results:
for row in results:
user_id = row[0]
cursor.execute('''
UPDATE articles
SET is_sended = True
WHERE id = ?
''', (user_id,))
conn.commit() # 提交事务
conn.close()
return results
def clear_table():
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
cursor.execute('DELETE FROM articles')
conn.commit()
conn.close()
def record_md(result, filename="./resources/history/uni_passage.md"):
# 读取现有内容
if os.path.exists(filename):
with open(filename, 'r', encoding='utf-8') as file:
existing_content = file.read()
else:
existing_content = ""
# 将新内容插入到现有内容的开头
new_content = result + existing_content
# 写回文件
with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content)
def get_filtered_articles(entries):
result_long = ""
result_short = ""
record = ""
short_results = []
for entry in entries:
# 构建长文本结果
result_long += f"文章:[{entry[1]}]({entry[2]})\n"
result_long += f"作者:{entry[3]}\n"
result_long += f"描述:{entry[4]}\n"
result_long += f"上传时间:{entry[5]}\n"
result_long += f"来源:{entry[6]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 构建短文本结果并进行分块处理
current_entry = (
f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[3]}\n"
record += f"**描述**{entry[4]}\n"
record += f"**上传时间**{entry[5]}\n"
record += f"**来源**{entry[6]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record)
return result_long, short_results
def Src_uni_rss(uni_rss_switch, Unity):
if not os.path.exists('./resources/db/uni_rss.db'):
# 创建数据库和表
create_database()
# 清空表
# clear_table()
# 获取 JSON 数据
uni_rss_data = get_uni_rss_json()
# 插入数据到数据库
insert_data(uni_rss_data)
# 查询指定时间段内的数据
filtered_articles = select_articles(uni_rss_switch, Unity)
# print(filtered_articles)
if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles)
return result_long, short_results
else:
return False
if __name__ == "__main__":
results = Src_uni_rss(False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"])
if results:
result_long, short_results = results
# 写入长文本结果
with open("./1.txt", "a", encoding="utf-8") as f:
f.write(result_long)
f.write("\n" + "-" * 40 + "\n")
# 写入分块的短文本结果
for short_result in short_results:
with open("./2.txt", "a", encoding="utf-8") as f:
f.write(short_result)
f.write("\n" + "-" * 40 + "\n")
else:
# 如果为空,则跳过执行
print("-" * 40)
print("聚合RSS数据为空跳过执行。")

View File

@ -49,7 +49,7 @@ def get_xianzhi_json():
if not content: if not content:
pass pass
else: else:
data = json.load(file) data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):

0
SendCore/DocGeneBot.py Normal file
View File

View File

@ -9,7 +9,6 @@
`为系统添加性能限制模块` `为系统添加性能限制模块`
### 下一步计划(待完成) ### 下一步计划(待完成)
- 添加更多RSS订阅源持续进行中
- 添加更多推送方式,如邮件、微信等 - 添加更多推送方式,如邮件、微信等
- 添加谷歌搜索等更多相关检测源,后续将支持谷歌语法 - 添加谷歌搜索等更多相关检测源,后续将支持谷歌语法
@ -50,3 +49,5 @@
- 2025年01月15日早优化并精简了web程序的代码 - 2025年01月15日早优化并精简了web程序的代码
- 2025年01月22日完善短文本推送机制现已可完美支持推送至企业微信、钉钉、蓝信、微信等等待后续开发 - 2025年01月22日完善短文本推送机制现已可完美支持推送至企业微信、钉钉、蓝信、微信等等待后续开发
- 2025年01月24日早修复了json文件为空时程序中断的问题并优化了报错逻辑 - 2025年01月24日早修复了json文件为空时程序中断的问题并优化了报错逻辑
- 2025年03月10日早为程序添加了通用rss接口可支持更多rss源
- 2025年03月14日晚为程序添加了通用rss发送程序同时修复了一个神奇的bug现可支持更多rss源

View File

@ -79,6 +79,10 @@ def get_keywords_config(item):
elif item == 'Baidu': elif item == 'Baidu':
Baidu = config['Baidu'] Baidu = config['Baidu']
return Baidu return Baidu
elif item == 'Unity':
uni_switch = config.get('uni-switch', False)
Unity = config['Unity']
return uni_switch, Unity
else: else:
logger.error("参数错误,请检查./config/keywords.yaml") logger.error("参数错误,请检查./config/keywords.yaml")

View File

@ -1,11 +1,11 @@
# 飞书相关配置信息 # 飞书相关配置信息
# fs_activate: True # fs_activate: True
fs_activate: False fs_activate: True
fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74 # 此处填写token记得冒号后空一格如aa04a02f-d7bf-4279-bd48-44c4f28c8f74 fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74 # 此处填写token记得冒号后空一格如aa04a02f-d7bf-4279-bd48-44c4f28c8f74
fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥记得冒号后空一格如4tq65T4jm1MO2IlxvHxBWe fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥记得冒号后空一格如4tq65T4jm1MO2IlxvHxBWe
# 企业微信相关配置信息 # 企业微信相关配置信息
wx_activate: True wx_activate: False
wx_key: 9a3dd6ff-75d6-4208-bc4b-77724a5805d6 # 此处填写token记得冒号后空一格如9a3dd6ff-75d6-4208-bc4b-77724a5805d6 wx_key: 9a3dd6ff-75d6-4208-bc4b-77724a5805d6 # 此处填写token记得冒号后空一格如9a3dd6ff-75d6-4208-bc4b-77724a5805d6
# 钉钉相关配置信息 # 钉钉相关配置信息
@ -27,7 +27,7 @@ e_hour: 4 # 程序运行时间间隔
time_mode: 1 time_mode: 1
# 0定时运行模式仅在指定时间运行参照Core.py中设置 # 0定时运行模式仅在指定时间运行参照Core.py中设置
# 1启用循环一定间隔时间后运行 # 1启用循环一定间隔时间后运行
mode: [0] # 运行模式,可多选 mode: [1, 2, 3] # 运行模式,可多选
# 0启用RSS抓取模式 # 0启用RSS抓取模式
# 1启用搜狗-微信公众号文章监测 # 1启用搜狗-微信公众号文章监测
# 2启用github项目监测 # 2启用github项目监测
@ -37,4 +37,4 @@ mode: [0] # 运行模式,可多选
url: https://info.masonliu.com/ # 请设置为您自己反代的域名,或者改为 http://127.0.0.1:5000 或者对应IP域名 url: https://info.masonliu.com/ # 请设置为您自己反代的域名,或者改为 http://127.0.0.1:5000 或者对应IP域名
# 调试模式 # 调试模式
debug: False debug: True

View File

@ -1,4 +1,6 @@
Sogou-WX: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于搜狗引擎搜索特定关键词的微信公众号文章
Doonsec-switch: False Doonsec-switch: False
Doonsec: ["逆向", "解包", "POC"] # 洞见微信安全资讯关键词 Doonsec: ["逆向", "解包", "POC"] # 洞见微信安全资讯关键词
uni-switch: False
Unity: ["逆向", "解包", "POC", "漏洞"] # 聚合RSS资讯关键词
Sogou-WX: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于搜狗引擎搜索特定关键词的微信公众号文章
Baidu: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于百度搜索特定关键词的文章 Baidu: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于百度搜索特定关键词的文章

8
config/uni_rss.yaml Normal file
View File

@ -0,0 +1,8 @@
link:
- 美团技术团队|https://tech.meituan.com/feed
- 360 Netlab Blog|https://blog.netlab.360.com/rss
- 知道创宇404实验室|https://paper.seebug.org/rss
- 腾讯安全响应中心|https://security.tencent.com/index.php/feed/blog
wechat:
- 美团技术团队|https://wechat2rss.xlab.app/feed/294bc034c9941529cd86a8a4b8999d100186c04d.xml

View File

@ -6,3 +6,5 @@ requests
python-dateutil python-dateutil
loguru loguru
beautifulsoup4 beautifulsoup4
feedparser

File diff suppressed because one or more lines are too long

View File

@ -0,0 +1,162 @@
[
{
"guid": "https://www.anquanke.com/post/id/305052",
"title": "腾达 AC7 路由器漏洞:攻击者可借助恶意有效载荷获取 Root Shell 权限",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-14 11:32:33"
},
{
"guid": "https://www.anquanke.com/post/id/305049",
"title": "GitLab警告多个高危漏洞或致使攻击者可冒充有效用户登录",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-14 11:24:45"
},
{
"guid": "https://www.anquanke.com/post/id/305045",
"title": "Siemens SINAMICS S200 陷安全危机,引导加载程序漏洞引攻击者觊觎",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-14 11:18:08"
},
{
"guid": "https://www.anquanke.com/post/id/305043",
"title": "微软警示ClickFix 通过虚假 Booking. com 邮件,对酒店业展开网络钓鱼行动",
"author": " 安全客",
"description": null,
"source": "TheHackersNews",
"pubDate": "2025-03-14 11:05:39"
},
{
"guid": "https://www.anquanke.com/post/id/305041",
"title": "黑客滥用Microsoft Copilot进行复杂的网络钓鱼攻击",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-14 10:54:30"
},
{
"guid": "https://www.anquanke.com/post/id/305038",
"title": "勒索软件攻击达到历史新高2025年2月攻击数量激增126%",
"author": " 安全客",
"description": null,
"source": "hackread",
"pubDate": "2025-03-14 10:36:04"
},
{
"guid": "https://www.anquanke.com/post/id/305035",
"title": "Medusa 勒索软件威胁:企业面临的持续挑战",
"author": " 安全客",
"description": null,
"source": "securitybrief",
"pubDate": "2025-03-14 10:23:46"
},
{
"guid": "https://www.anquanke.com/post/id/305026",
"title": "360预警银狐木马又双叒变异PDF文件成传播“帮凶”",
"author": " 安全客",
"description": null,
"source": "360数字安全",
"pubDate": "2025-03-14 10:08:25"
},
{
"guid": "https://www.anquanke.com/post/id/305023",
"title": "ExHub 的 IDOR 漏洞可致攻击者篡改网站托管配置",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 14:50:25"
},
{
"guid": "https://www.anquanke.com/post/id/305020",
"title": "施乐打印机漏洞可致攻击者从PDA和SMB捕获身份验证数据",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 14:39:42"
},
{
"guid": "https://www.anquanke.com/post/id/305015",
"title": "瞻博网络成功修复 Session Smart Router 关键漏洞",
"author": " 安全客",
"description": null,
"source": "securityaffairs 2",
"pubDate": "2025-03-13 11:38:18"
},
{
"guid": "https://www.anquanke.com/post/id/305013",
"title": "Blind Eagle APT-C-36快速利用补丁漏洞借知名平台发动网络攻击",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 11:24:58"
},
{
"guid": "https://www.anquanke.com/post/id/305010",
"title": "通过 YouTube 传播的 DCRat 恶意软件正攻击用户以窃取登录凭证",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 11:03:28"
},
{
"guid": "https://www.anquanke.com/post/id/305007",
"title": "不断演变的分布式拒绝服务DDoS攻击策略网络专家剖析社交媒体平台X的遭袭事件",
"author": " 安全客",
"description": null,
"source": "securitybrief",
"pubDate": "2025-03-13 10:49:42"
},
{
"guid": "https://www.anquanke.com/post/id/305005",
"title": "新型Anubis恶意软件可完全躲避检测让黑客得以执行远程命令",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 10:41:12"
},
{
"guid": "https://www.anquanke.com/post/id/305002",
"title": "Opentext推出人工智能网络安全解决方案抵御威胁",
"author": " 安全客",
"description": null,
"source": "securitybrief",
"pubDate": "2025-03-13 10:23:40"
},
{
"guid": "https://www.anquanke.com/post/id/304997",
"title": "Nasuni 与 CrowdStrike 合作,大幅提升威胁检测效能",
"author": " 安全客",
"description": null,
"source": "securitybrief",
"pubDate": "2025-03-13 10:13:45"
},
{
"guid": "https://www.anquanke.com/post/id/304995",
"title": "360携手首都在线 拟推动DeepSeek一体机安全与服务落地合作",
"author": " 安全客",
"description": null,
"source": "360数字安全",
"pubDate": "2025-03-13 10:01:25"
},
{
"guid": "https://www.anquanke.com/post/id/304990",
"title": "紧急CISA 警告苹果 iOS 漏洞正被恶意利用",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-12 17:53:54"
},
{
"guid": "https://www.anquanke.com/post/id/304988",
"title": "360携手清微智能DeepSeek一体机 拟推动“国产算力+大模型安全+AI应用”协同发展",
"author": " 安全客",
"description": null,
"source": "360数字安全",
"pubDate": "2025-03-12 17:40:24"
}
]

File diff suppressed because it is too large Load Diff

View File

@ -1,160 +1,162 @@
[ [
{ {
"title": "新的AI安全在2025年正对CISO及其团队构成挑战", "title": "人工智能聊天机器人DeepSeek R1可被操纵用于创建恶意软件",
"link": "https://www.freebuf.com/news/420445.html", "link": "https://www.freebuf.com/articles/network/424572.html",
"description": "AI 创新步伐的加快、日益复杂的网络威胁和新的监管政策将要求首席信息安全官 CISO 驾驭更复杂的环境。", "description": "DeepSeek R1可被操纵生成恶意软件降低网络犯罪门槛尽管仍需手动修正但加速了恶意软件开发。",
"body": "<p>安全团队总是必须适应变化但2025年将出现的新发展可能会使变化特别具有挑战性。AI 创新步伐的加快、日益复杂的网络威胁和新的监管政策将要求首席信息安全官 CISO 驾驭更复杂的环境。</p><p><img src=\"https://image.3001.net/images/20250121/1737459264_678f8640703ee88fd4cf3.png!small\" wid", "body": "<p>网络安全公司Tenable Research的最新分析揭示开源人工智能聊天机器人<strong>DeepSeek R1</strong>能够被操纵用于生成恶意软件包括键盘记录器和勒索软件。Tenable的研究团队评估了DeepSeek生成有害代码的能力重点测试了两种常见的恶意软件类型键盘记录器和勒索软件。</p><p>尽管DeepSeek无法直接“开箱即用”生成完全可用的恶意软件",
"category": "资讯", "category": "网络安全",
"pubDate": "Tue, 21 Jan 2025 19:29:51 +0800" "pubDate": "Fri, 14 Mar 2025 00:51:27 +0800"
}, },
{ {
"title": "SUSE发布重要补丁保护系统免受CVE-2025-21613攻击", "title": "朝鲜威胁组织ScarCruft利用KoSpy恶意软件监控安卓用户",
"link": "https://www.freebuf.com/articles/420421.html", "link": "https://www.freebuf.com/articles/es/424540.html",
"description": "该漏洞可能允许攻击者在特定情况下篡改git-upload-pack标志。", "description": "朝鲜黑客组织ScarCruft通过伪装应用投放KoSpy恶意软件监控安卓用户攻击针对韩语和英语用户。",
"body": "<p><img src=\"https://image.3001.net/images/20250121/1737445957_678f524523c573d95d8eb.jpg!small\" width=\"690\" height=\"388\" alt=\"\" /></p><p>SUSE近日发布针对Amazon Systems ManagerSSMAgent的重要安全更新解决了“go-git”库中", "body": "<p><img src=\"https://image.3001.net/images/20250313/1741878280398181_a226a43ddb394530a82c72add0dcff49.png!small\" alt=\"image\" /></p><p>据报道与朝鲜有关的威胁组织ScarCruft开发了一种名为 <strong>KoSpy</strong>的安卓监控工具,专门针对韩",
"pubDate": "Tue, 21 Jan 2025 15:57:28 +0800" "category": "企业安全",
"pubDate": "Thu, 13 Mar 2025 19:53:00 +0800"
}, },
{ {
"title": "Shiro CVE-2020-17510 路径绕过", "title": "大模型越狱(通常)比你想象的容易——一种基于伪造对话历史的攻击算法",
"link": "https://www.freebuf.com/vuls/420408.html", "link": "https://www.freebuf.com/vuls/424360.html",
"description": "在使用 Apache Shiro 与 Spring 集成时,如果 Apache Shiro 的版本低于 1.7.0,经过精心构造的 HTTP 请求可能会导致身份验证绕过。", "description": "一种基于伪造会话历史的大模型对抗算法",
"body": "<h1>漏洞描述</h1><p>Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.</p><p>If you are NOT using Shiros Spring Boot Star", "body": "<h1>1.摘要</h1><p>微软的研究团队提出了一种名为“上下文一致性攻击”Context Compliance Attack以下简称CCA算法的大模型越狱攻击算法这种攻击算法相对轻巧既不需要复杂的提示词工程也不要消耗大量算力来迭代优化恶意提示词。</p><p>CCA算法利用了目前大模型架构中一个漏洞——会话历史的无状态性。即用户可以伪造会话历史输入给大模型而大模型在无法分辨该对",
"category": "漏洞", "category": "漏洞",
"pubDate": "Tue, 21 Jan 2025 14:54:33 +0800" "pubDate": "Thu, 13 Mar 2025 16:37:29 +0800"
}, },
{ {
"title": "梅赛德斯—奔驰信息娱乐系统漏洞详细信息披露", "title": "CISA警告苹果WebKit越界写入漏洞已被野外利用",
"link": "https://www.freebuf.com/articles/420410.html", "link": "https://www.freebuf.com/vuls/424562.html",
"description": "卡巴斯基披露了在梅赛德斯-奔驰信息娱乐系统中发现的十多个漏洞的细节,但奔驰保证这些安全漏洞已经得到修复。", "description": "苹果WebKit越界写入漏洞CVE-2025-24201已被野外利用攻击者可执行未经授权的代码。",
"body": "<p><img src=\"https://image.3001.net/images/20250121/1737443647_678f493f7ea13166686f8.jpeg!small\" alt=\"\" width=\"690\" height=\"388\" /><strong>卡巴斯基披露了在梅赛德斯—奔驰信息娱乐系统中发现的十多个漏洞的细节,但这家汽车制造商向客户保证,这些安全漏洞已经得到修复,", "body": "<p><img src=\"https://image.3001.net/images/20250314/1741889032347357_5c64ed0a88814dc4bc5fd233083566e8.webp!small\" alt=\"image\" /></p><p>美国网络安全和基础设施安全局CISA近日警告称苹果WebKit浏览器引擎中存在一个被野外利用的零日漏洞编号为CVE-202",
"pubDate": "Tue, 21 Jan 2025 14:50:19 +0800" "category": "漏洞",
"pubDate": "Thu, 13 Mar 2025 16:21:31 +0800"
}, },
{ {
"title": "FreeBuf早报 | 中国与多国联合解救7万电诈受害者德国驻美大使密电遭到泄露", "title": "微信小程序测试技巧总结",
"link": "https://www.freebuf.com/news/420399.html", "link": "https://www.freebuf.com/articles/web/424498.html",
"description": "德国驻美国大使安德烈亚斯·米夏埃利斯的一份电报19日遭泄露这令德国陷入外交旋涡。", "description": "测试微信小程序跟web网站基本相同抓包测试接口逆向看小程序源码。",
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 网信部门严厉打击整治网络水军问题</h3><p>目前网信部门已协调关闭爱××网、买××心等网络水军专门平台指导应用商店对微××理、星×通等应用程序采取拦截或者下架等处置措施累计协调关闭、下架相关违法违规网站平台400余家。 【<a href=\"https://www.cnii.com.cn/rmydb/20250", "body": "<h2 id=\"h2-1\">前言</h2><p>目前越来越多的企业都开始开发微信小程序如果在web测试过程中没有结果不如换个思路去看看微信小程序是否有问题。</p><p>测试微信小程序跟web网站基本相同抓包测试接口逆向看小程序源码。本篇文章就来看看如何进行微信小程序抓包以及逆向。</p><p><br /></p><h2 id=\"h2-2\">微信小程序抓包</h2><p>要测试微信小程序",
"category": "Web安全",
"pubDate": "Thu, 13 Mar 2025 16:16:54 +0800"
},
{
"title": "全美29州逾8.6万名医护人员信息因AWS S3存储桶配置错误遭泄露",
"link": "https://www.freebuf.com/articles/database/424561.html",
"description": "全美29州逾8.6万名医护人员信息因AWS S3存储桶配置错误遭泄露包含敏感PII和医疗文件。",
"body": "<p><img src=\"https://image.3001.net/images/20250314/1741889027627786_9dbc9c95718140af8ac0145800762e1c.webp!small\" alt=\"image\" /></p><p>近日一起涉及医护人员敏感信息的大规模数据泄露事件被发现总部位于新泽西州的健康科技公司ESHYFT的超过8.6万条记录被暴露。<",
"category": "数据安全",
"pubDate": "Thu, 13 Mar 2025 16:09:35 +0800"
},
{
"title": "黑客滥用微软Copilot发动高仿钓鱼攻击",
"link": "https://www.freebuf.com/news/424552.html",
"description": "黑客利用微软Copilot发起高仿钓鱼攻击通过伪造发票邮件和虚假登录页面窃取用户凭据威胁企业安全。",
"body": "<p><img src=\"https://image.3001.net/images/20250314/1741885485840984_47bf608e967345259deb66fcf48bec25.webp!small\" alt=\"image\" /></p><p>随着越来越多企业将微软Copilot集成到其日常工作中网络犯罪分子瞄准了这一AI助手的用户发起了高度复杂的钓鱼攻击。微软Cop",
"category": "资讯", "category": "资讯",
"pubDate": "Tue, 21 Jan 2025 14:22:30 +0800" "pubDate": "Thu, 13 Mar 2025 16:07:50 +0800"
}, },
{ {
"title": "2024年近2亿人受影响美国医疗成重点攻击目标", "title": "FreeBuf早报 | 特朗普提名Sean Plankey掌权CISA勒索病毒袭美逾300关键机构",
"link": "https://www.freebuf.com/news/420391.html", "link": "https://www.freebuf.com/news/424478.html",
"description": "2024年期间各组织向美国政府报告了720起医疗保健数据泄露事件这些事件共影响1.86亿条用户记录。", "description": "特朗普提名Sean Plankey掌权CISA勒索病毒袭美逾300关键机构",
"body": "<h2 id=\"h2-1\">2024年期间各组织向美国政府报告了720起医疗保健数据泄露事件这些事件共影响1.86亿条用户记录。</h2><p><img src=\"https://image.3001.net/images/20250121/1737430766_678f16ee2f76c506551fd.png!small\" alt=\"\" /></p><p>SecurityWeek对美国卫生", "body": "<h2 id=\"h2-1\">全球网安事件速递</h2><h3 id=\"h3-1\">1. Win10 / Win11 装机镜像不再“裸奔”,微软发布 Defender 更新填补安全漏洞</h3><p>微软针对 Windows 10、Windows 11 和 Windows Server 安装镜像,发布了新版 Defender 更新,解决安装镜像中可能存在的旧版反恶意软件问题,提升系统安全性和性能。 ",
"category": "资讯", "category": "资讯",
"pubDate": "Tue, 21 Jan 2025 11:40:28 +0800" "pubDate": "Thu, 13 Mar 2025 14:10:05 +0800"
}, },
{ {
"title": "2025 OWASP 十大安全漏洞", "title": "新手友好spring内存马学习篇二",
"link": "https://www.freebuf.com/news/420401.html", "link": "https://www.freebuf.com/articles/web/424441.html",
"description": "OWASP发布2025年智能合约十大漏洞报告反映了不断演变的攻击向量深入剖析了近年来的常见漏洞及缓解策略。", "description": "这是spring内存马第二篇主要学习实战中如何打内存马",
"body": "<p><img src=\"https://image.3001.net/images/20250121/1737440528_678f3d1025ec7982598b6.jpg!small\" width=\"690\" height=\"388\" alt=\"\" />随着去中心化金融DeFi和区块链技术的不断发展智能合约安全的重要性愈发凸显。在此背景下开放网络应用安全项目OWASP发布了备受期", "body": "<h2 id=\"h2-1\">反序列化注入内存马</h2><h3 id=\"h3-1\">Fastjson靶场搭建</h3><p>我们在前面的springboot项目上引入fastjson模拟一下漏洞环境</p><p><img src=\"https://image.3001.net/images/20250306/1741255427_67c97303619323cef3b85.png!small\" ",
"category": "Web安全",
"pubDate": "Thu, 13 Mar 2025 09:17:22 +0800"
},
{
"title": "D-link: 轻量级正反向文件同步后渗透持久化控制",
"link": "https://www.freebuf.com/sectool/424419.html",
"description": "#后渗透 #文件同步 #轻量 #持久化 #正/反向隧道 #C++ #D-Link",
"body": "<h1>D-link</h1><p>D-link 是一款用 C++ 编写的轻量级 Linux 文件同步工具。</p><ol><li><p>支持反向文件同步操作。</p></li><li><p>目录监控,实时更新。</p></li><li><p>访问控制:客户端只能自动上传和删除文件,无法从服务器下载敏感文件。就算同步的文件在服务器端被删掉,客户端还是会自动恢复。</p></li><li><p>客户",
"category": "工具",
"pubDate": "Thu, 13 Mar 2025 00:45:10 +0800"
},
{
"title": "多视角解码大模型安全:以 AI 制衡 AI突破安全困局",
"link": "https://www.freebuf.com/fevents/424379.html",
"description": "“模型有界、安全无疆”主题技术研讨会在西安圆满落幕。",
"body": "<p>在人工智能快速发展的今天,大模型已经成为了推动各行业变革的核心技术之一,从医疗诊断到智能交通,从金融风险控制到教育个性化推荐,各行各业中都出现了大模型的身影。</p><p>根据Gartner的预测2026年将有超过80%的企业部署启用生成式人工智能GenAI的应用而2023年这一比例尚不足5%,可以说大模型正以前所未有的速度重塑着我们的世界。</p><p>技术突飞猛进的同时,也伴生着",
"category": "活动",
"pubDate": "Wed, 12 Mar 2025 17:31:35 +0800"
},
{
"title": "超400个IP地址协同攻击利用多个SSRF漏洞发起网络攻势",
"link": "https://www.freebuf.com/vuls/424412.html",
"description": "至少400个IP地址被发现同时利用多个SSRF漏洞攻击尝试之间表现出显著的重叠。",
"body": "\n<p><img src=\"https://image.3001.net/images/20250312/1741788137072942_62d5d71c105a40c7a1be5eeb33fbab11.png!small\" alt=\"image\"></p>\n<p>威胁情报公司GreyNoise发出警告称近期针对多个平台的服务器端请求伪造SSRF漏洞利用活动出现了“协同激增”现象。</p>",
"category": "漏洞",
"pubDate": "Wed, 12 Mar 2025 17:26:00 +0800"
},
{
"title": "AI会取代渗透测试工程师吗",
"link": "https://www.freebuf.com/articles/neopoints/424414.html",
"description": "关于哪些职业会受到AI冲击的讨论从未停止而渗透测试Pentesting最近也被推到了风口浪尖。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741788229145520_ea88f496d23c41d9b5a2c92b14a8910e.png!small\" alt=\"image\" /></p><p>多年来我们一直在听到同样的说法AI将会取代你的工作。事实上2017年麦肯锡发布了一份报告《消失与新增的岗位自动化时代下的劳动",
"category": "观点",
"pubDate": "Wed, 12 Mar 2025 15:55:00 +0800"
},
{
"title": "FreeBuf早报 | 微软与VMware零日漏洞紧急修复指南TP-Link漏洞感染超6000台设备",
"link": "https://www.freebuf.com/news/424346.html",
"description": "微软与VMware零日漏洞紧急修复指南TP-Link漏洞感染超6000台设备",
"body": "<h2 id=\"h2-1\">全球网安事件速递</h2><h3 id=\"h3-1\">1. Manus代码遭越狱季逸超本人回应“团队一直有开源传统”</h3><p>北京时间3月10日清晨推特用户jianxliao发布推文称成功“越狱”了Manus AI的代码据其透露他只是简单地要求Manus提供\"/opt/.manus/\"目录下的文件系统便直接提供了沙盒运行时代码并揭示了Manus使用C",
"category": "资讯", "category": "资讯",
"pubDate": "Tue, 21 Jan 2025 11:30:01 +0800" "pubDate": "Wed, 12 Mar 2025 14:30:42 +0800"
}, },
{ {
"title": "420万主机暴露含VPN和路由器", "title": "API攻击威胁加剧2025年如何确保API安全",
"link": "https://www.freebuf.com/news/420386.html", "link": "https://www.freebuf.com/articles/web/424399.html",
"description": "新研究表明,多种隧道协议存在安全漏洞,这些漏洞可能让攻击者实施多种攻击。", "description": "API攻击威胁加剧59%的组织开放API“写入”权限黑客可未经授权访问导致数据窃取、账户接管等重大风险。",
"body": "<h2 id=\"h2-1\">新研究表明,多种隧道协议存在安全漏洞,这些漏洞可能让攻击者实施多种攻击。</h2><p>一项研究表明“网络主机若接受隧道数据包却不验证发送者身份就可能被劫持以执行匿名攻击并获得对其网络的访问权限。”该研究是与鲁汶大学KU Leuven的教授兼研究员马蒂·范霍夫Mathy Vanhoef合作开展的。</p><p><img src=\"https://image.", "body": "<p><img src=\"https://image.3001.net/images/20250312/1741780939666956_d18f4fcfe4ab4b048c66f1169504989e.png!small\" alt=\"image\" /></p><p>API攻击正持续增加<strong>一项令人担忧的研究</strong>显示59%的组织为至少一半的API开放了“写入”权限这",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 11:29:24 +0800"
},
{
"title": "攻击者开始利用MFA漏洞在内的高级手段绕过多因素身份验证",
"link": "https://www.freebuf.com/articles/web/424386.html",
"description": "这些高级技术利用了身份验证工作流程中的漏洞,而非身份验证因素本身。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741773779537870_8402efd7d8fa46fa8d2f0067903712ee.webp!small\" alt=\"image\" /></p><p>研究人员最近发现了一种令人不安的攻击趋势这些攻击专门设计来绕过多因素身份验证MFA的保护机制。这些高级技术利用了身份验证工作",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 09:53:49 +0800"
},
{
"title": "Hessian反序列化原理到武器化利用",
"link": "https://www.freebuf.com/articles/web/424308.html",
"description": "今天和大家共同探讨Java安全领域中一种常见的安全威胁也就是Hessian反序列化漏洞。",
"body": "<p>今天和大家共同探讨Java安全领域中一种常见的安全威胁也就是Hessian反序列化漏洞。作为贯穿Java生态的RPC通信基石Hessian协议如同微服务架构的\"神经网络\"其安全风险直接影响多个Java核心组件的命脉如近几年披露的一些Hessian协议相关的安全组件漏洞Seata Hessian 反序列化漏洞、Nacos 集群 Hessian 反序列化漏洞、xxl-job Hessi",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 09:42:19 +0800"
},
{
"title": "新型XCSSET恶意软件利用增强混淆技术攻击macOS用户",
"link": "https://www.freebuf.com/articles/web/424375.html",
"description": "新型XCSSET恶意软件利用增强混淆技术攻击macOS用户感染Xcode项目窃取敏感信息采用复杂持久化机制威胁开发者安全。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741770276931049_1ffd07215f97425f8ba4f5216c276ae5.webp!small\" alt=\"image\" /></p><p>微软威胁情报团队发现了一种新型的XCSSET变种这是一种复杂的模块化macOS恶意软件能够感染Xcode项目并在开发者构建这",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 07:44:44 +0800"
},
{
"title": "AI 辅助的虚假 GitHub 仓库窃取敏感数据,包括登录凭证",
"link": "https://www.freebuf.com/articles/database/424374.html",
"description": "AI 辅助的虚假 GitHub 仓库窃取敏感数据,伪装合法项目分发 Lumma Stealer 恶意软件。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741770262754508_969bbeb5d15b4a8795a84388a5078ab3.webp!small\" alt=\"image\" /></p><p>近期发现了一种复杂的恶意软件活动,该活动利用人工智能创建具有欺骗性的 GitHub 仓库,并分发 SmartLoader 负载,最",
"category": "数据安全",
"pubDate": "Wed, 12 Mar 2025 07:40:26 +0800"
},
{
"title": "谷歌紧急警告Chromecast用户切勿进行出厂重置",
"link": "https://www.freebuf.com/news/424361.html",
"description": "谷歌紧急警告别对Chromecast进行出厂重置。过期证书导致2000万台设备无法正常运行用户陷入“变砖”困境。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741766697560974_acdc23f708a34b058255dc1d9a0b0fcd.webp!small\" alt=\"image\" /></p><p>谷歌已向第二代Chromecast2015年和Chromecast Audio设备的所有者发出紧急通知警告不要进行出厂重置",
"category": "资讯", "category": "资讯",
"pubDate": "Tue, 21 Jan 2025 11:17:38 +0800" "pubDate": "Wed, 12 Mar 2025 07:10:20 +0800"
},
{
"title": "新型僵尸网络正对路由器、摄像头等设备发起大规模DDoS攻击",
"link": "https://www.freebuf.com/news/420383.html",
"description": "自 2024 年底以来,一个新发现的物联网 IoT 僵尸网络一直在全球策划大规模分布式拒绝服务 DDoS 攻击。",
"body": "<p>趋势科技的一项新研究发现,自 2024 年底以来,一个新发现的物联网 IoT 僵尸网络一直利用路由器、IP 摄像头和其他连接设备等物联网设备中的漏洞,在全球策划大规模分布式拒绝服务 DDoS 攻击。</p><p><img src=\"https://image.3001.net/images/20250121/1737428755_678f0f130e34f01ede788.png!s",
"category": "资讯",
"pubDate": "Tue, 21 Jan 2025 11:04:23 +0800"
},
{
"title": "新型Android恶意软件模仿聊天应用窃取敏感数据",
"link": "https://www.freebuf.com/news/420346.html",
"description": "Cyfirma 的网络安全研究人员最近发现了一个伪装成聊天应用,针对南亚用户的复杂 Android 恶意软件活动。",
"body": "<p>据Cyber Security News消息Cyfirma 的网络安全研究人员最近发现了一个针对南亚用户,尤其是印度克什米尔地区用户的复杂 Android 恶意软件活动通过伪装成一款名为“Tanzeem” 的聊天应用程序以窃取目标设备中的敏感数据。</p><p>该恶意软件归因于臭名昭著的“DONOT”APT组织具有印度国家背景。而“Tanzeem”在乌尔都语中意为“组织”是一个经常与",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 19:50:15 +0800"
},
{
"title": "B站2025年第一个大瓜“代码投毒”报复用户",
"link": "https://www.freebuf.com/news/420334.html",
"description": "这不仅暴露了B站在内部管理和技术安全方面的漏洞也引发了大众对用户信息安全的担忧。",
"body": "<p>最近的B站可以说是处于多事之秋前面才有员工自曝操纵直播间抽奖概率这几天又被曝出员工滥用职权加载恶意代码攻击用户。这不仅暴露了B站在内部管理和技术安全方面的漏洞也引发了大众对用户信息安全的担忧。</p><p>涉事员工倪袁成是B站网页端DanmakuX弹幕引擎的开发和优化负责人。根据B站网友“老变态了了了”发布的消息2025年1月倪袁成因为与两名用户在站内发生了口角心生怨恨随后利",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 18:08:20 +0800"
},
{
"title": "验证码对抗之殇Clickfix最新钓鱼事件分析报告",
"link": "https://www.freebuf.com/articles/paper/420320.html",
"description": "腾讯云安全科恩实验室威胁情报中心捕获到了多起国外黑灰产团伙通过Clickfix社工钓鱼手法对windows系统用户进行攻击的事件。",
"body": "<p><span style=\"color:#000000;\">曾几何时,验证码是横亘在人与机器之间的那道数字藩篱,以看似简单的交互,守护着虚拟世界的秩序。然而,当人工智能的浪潮席卷而来,昔日泾渭分明的界限开始变得模糊不清。黑产团伙敏锐地捕捉到这种变化带来的</span><span lang=\"en-us\" style=\"color:#000000;\" xml:lang=\"en-us\">“</sp",
"category": "安全报告",
"pubDate": "Mon, 20 Jan 2025 16:32:27 +0800"
},
{
"title": "解读出国劳务:表面邀请拍戏,实则人口交易,走上小路,却是末路!",
"link": "https://www.freebuf.com/news/420316.html",
"description": "近日,中国演员王星赴泰拍戏失联一事引发网友广泛关注,好在几经周折,王星本人最终还是安然回国。",
"body": "<p>近日中国演员王星赴泰拍戏失联一事引发网友广泛关注好在几经周折王星本人最终还是安然回国。失联期间元芳持续关注事件进展其中一系列在网络上流传的有关“买卖王星”的TG聊天截图引起了元芳的注意。</p><p>元芳从中提取出关键发言账号信息,通过 <strong>重明-网络犯罪情报分析平台</strong>搜索引擎对相应用户ID进行检索溯源本来只是想找找看有没有什么有价值的线索但实际的",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 16:08:39 +0800"
},
{
"title": "FreeBuf早报 | 网信办启动春节网络环境整治行动;美网络攻击我国某研究院细节公布",
"link": "https://www.freebuf.com/news/420305.html",
"description": "为了营造喜庆祥和的春节网络氛围中央网信办决定即日起开展为期1个月的“清朗·2025年春节网络环境整治”专项行动。",
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 中方对美情报机构对华网络攻击表示严重关切</h3><p>针对美国情报机构对中国企业机构进行网络攻击一事中国外交部17日在例行记者会上指出中方对此表示严重关切敦促美方立即停止相关恶意活动。 【<a href=\"http://usa.people.com.cn/n1/2025/0120/c241376-4040529",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 15:03:27 +0800"
},
{
"title": "惠普被黑客入侵,机密数据在暗网出售",
"link": "https://www.freebuf.com/news/420293.html",
"description": "黑客IntelBroker宣称已经入侵惠普企业公司HPE公布了诸如源代码、证书和个人身份信息PII等敏感数据。",
"body": "<p><img src=\"https://image.3001.net/images/20250120/1737354626_678ded82807f2e40cb1d3.png!small\" alt=\"\" /></p><p>黑客IntelBroker宣称已经入侵惠普企业公司HPE并公布了诸如源代码、证书和个人身份信息PII等敏感数据这些数据如今可在线售卖。</p><p>声名狼藉的Int",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 14:31:01 +0800"
},
{
"title": "无需拆机Windows 11 BitLocker加密文件被破解",
"link": "https://www.freebuf.com/news/420297.html",
"description": "“bitpixie”漏洞通过利用Windows启动管理器的降级攻击使攻击者可以在不物理篡改设备的情况下绕过安全启动。",
"body": "<p><img src=\"https://image.3001.net/images/20250120/1737355717_678df1c5a8f6825c9315b.jpg!small\" width=\"690\" height=\"388\" alt=\"\" /></p><p>混沌通信大会 (38C3)上安全研究员Thomas Lambertz展示了一个名为“bitpixie”(CVE-2023-2",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 14:10:38 +0800"
},
{
"title": "黑客滥用微软VSCode 远程隧道绕过安全工具",
"link": "https://www.freebuf.com/news/420277.html",
"description": "微软VSCode 远程隧道功能正被攻击者利用,以绕过安全措施部署恶意脚本。",
"body": "<p>据Cyber Security News消息微软VSCode 远程隧道功能正被攻击者利用,以绕过安全措施部署恶意脚本。</p><p><img src=\"https://image.3001.net/images/20250120/1737345720_678dcab8e42523784e9ee.jpg!small\" alt=\"\" width=\"690\" height=\"388\" /></p",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 11:54:14 +0800"
},
{
"title": "《零日风暴》| 正式前导预告 | Netflix",
"link": "https://www.freebuf.com/video/420267.html",
"description": "一场重大网路攻击酿成灾难,下一波攻击又来势汹涌汹涌。",
"body": "<p>一场重大网路攻击酿成灾难,下一波攻击又来势汹涌汹涌,前任总统(劳勃狄尼洛饰)必须查明幕后黑手、查清真相。然而,真正的威胁究竟是损害外部还是内部危险?</p><p>#劳勃狄尼洛首次亮相Netflix影集全新迷你影集《零日风暴》2月20日首播。</p><p style=\"text-align:center;\"><iframe src=\"//player.bilibili.com/player.",
"category": "视频",
"pubDate": "Mon, 20 Jan 2025 10:46:28 +0800"
},
{
"title": "ChatGPT被曝存在爬虫漏洞OpenAI未公开承认",
"link": "https://www.freebuf.com/news/420273.html",
"description": "OpenAI的ChatGPT爬虫似乎能够对任意网站发起分布式拒绝服务DDoS攻击而OpenAI尚未承认这一漏洞。",
"body": "<p><img src=\"https://image.3001.net/images/20250120/1737353745_678dea1157e14e0eac4a5.jpg!small\" alt=\"\" width=\"690\" height=\"402\" /></p><p><strong>OpenAI的ChatGPT爬虫似乎能够对任意网站发起分布式拒绝服务DDoS攻击而OpenAI尚未承认这",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 10:40:16 +0800"
},
{
"title": "网络安全领域研究人员遭遇假PoC专项攻击",
"link": "https://www.freebuf.com/news/420252.html",
"description": "这些假PoC攻击事件凸显了网络安全领域面临的严峻挑战。",
"body": "<h2 id=\"h2-1\"><strong>一、事件概述</strong></h2><p>近期网络安全领域接连曝出针对研究人员的假PoC概念验证攻击事件引发业界高度关注。2024年12月微软在当月的补丁星期二更新中修复了两个关键的LDAP漏洞分别是CVE-2024-49112和CVE-2024-49113。其中CVE-2024-49113是一个拒绝服务DoS漏洞。然而就在漏洞修",
"category": "资讯",
"pubDate": "Mon, 20 Jan 2025 10:00:12 +0800"
} }
] ]

View File

@ -1,20 +1,11 @@
[ [
{ {
"link": "https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main", "link": "https://github.com/wujun728/jun_api_service",
"name": "WebFrameworkTools-5.1-main", "name": "jun_api_service",
"created_at": "2023-01-08T05:21:26Z", "created_at": "2021-07-01T14:43:39Z",
"description": "本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更...", "description": "jun_api_service是一个基于我另外一个自定义的starter的动态API框架。项目本身使用技术有SpringBoot+字节码生成执行+动态脚本+动态SQL可以实时动态生成RESTAPI并动态发布或者热加载。且发布后可动态执行java源码、groovy脚本及SQL脚本...",
"author": "peiqiF4ck", "author": "wujun728",
"language": "C#", "language": "JavaScript",
"keyword": "sql注入"
},
{
"link": "https://github.com/1024-lab/smart-admin",
"name": "smart-admin",
"created_at": "2019-11-16T02:30:31Z",
"description": "SmartAdmin国内首个以「高质量代码」为核心「简洁、高效、安全」快速开发平台基于SpringBoot2/3 + Sa-Token + Mybatis-Plus 和 Vue3 + Vite5 + Ant Design Vue 4.x (同时支持JavaScript和TypeScript双版本);满足国家三级等保要求、支持登录限制、接...",
"author": "1024-lab",
"language": "Java",
"keyword": "sql注入" "keyword": "sql注入"
}, },
{ {
@ -26,6 +17,15 @@
"language": "Java", "language": "Java",
"keyword": "sql注入" "keyword": "sql注入"
}, },
{
"link": "https://github.com/1024-lab/smart-admin",
"name": "smart-admin",
"created_at": "2019-11-16T02:30:31Z",
"description": "SmartAdmin国内首个以「高质量代码」为核心「简洁、高效、安全」快速开发平台基于SpringBoot2/3 + Sa-Token + Mybatis-Plus 和 Vue3 + Vite5 + Ant Design Vue 4.x (同时支持JavaScript和TypeScript双版本);满足国家三级等保要求、支持登录限制、接...",
"author": "1024-lab",
"language": "Java",
"keyword": "sql注入"
},
{ {
"link": "https://github.com/JaveleyQAQ/SQL-Injection-Scout", "link": "https://github.com/JaveleyQAQ/SQL-Injection-Scout",
"name": "SQL-Injection-Scout", "name": "SQL-Injection-Scout",
@ -36,23 +36,41 @@
"keyword": "sql注入" "keyword": "sql注入"
}, },
{ {
"link": "https://github.com/xiangyuecn/AreaCity-JsSpider-StatsGov", "link": "https://github.com/henryxm/autumn",
"name": "AreaCity-JsSpider-StatsGov", "name": "autumn",
"created_at": "2018-11-28T05:11:35Z", "created_at": "2018-10-08T12:12:12Z",
"description": "省市区县乡镇三级或四级城市数据带拼音标注、坐标、行政区域边界范围2025年01月14日最新采集提供csv格式文件支持在线转成多级联动js代码、通用json格式提供软件转成shp、geojson、sql、导入数据库带浏览器里面运...", "description": "采用Spring、Spring Boot、Redis、MyBatis、Shiro、Druid框架开发,搭载mysql数据。 如果你厌烦了MyBatis中需要手动创建表的事情这个项目非常适合你自动为你生成表。 从此你不在需要导入sql文件了项目初始化变得异常简单结构清...",
"author": "xiangyuecn", "author": "henryxm",
"language": "JavaScript", "language": "JavaScript",
"keyword": "sql注入" "keyword": "sql注入"
}, },
{ {
"link": "https://github.com/zlt2000/microservices-platform", "link": "https://github.com/ProbiusOfficial/ssrf-labs",
"name": "microservices-platform", "name": "ssrf-labs",
"created_at": "2019-03-07T07:13:37Z", "created_at": "2025-02-17T16:28:50Z",
"description": "基于SpringBoot2.x、SpringCloud和SpringCloudAlibaba并采用前后端分离的企业级微服务多租户系统架构。并引入组件化的思想实现高内聚低耦合项目代码简洁注释丰富上手容易适合学习和企业中使用。真正实现了基于RBAC、jwt和oauth2的...", "description": "一个ssrf的综合靶场包含RCESQL注入TomcatRedisMySQL提权等ssrf攻击场景",
"author": "zlt2000", "author": "ProbiusOfficial",
"language": "Shell",
"keyword": "sql注入"
},
{
"link": "https://github.com/suqianjue/sqlmap_gui",
"name": "sqlmap_gui",
"created_at": "2025-02-18T08:52:30Z",
"description": "sqlmap_gui是一款图形界面化的 SQL 注入漏洞测试工具",
"author": "suqianjue",
"language": "Java", "language": "Java",
"keyword": "sql注入" "keyword": "sql注入"
}, },
{
"link": "https://github.com/Aki-1038/MySQL",
"name": "MySQL",
"created_at": "2025-03-03T01:22:07Z",
"description": "這個頁面展示了 MySQL 的基本功能,包括 QUERY、INSERT、UPDATE 和 DELETE 等 SQL 操作。 請在下方輸入 SQL 查詢,然後點擊「執行」按鈕,查看結果。 注意:這個頁面僅供測試使用,請勿在正式環境中使用。",
"author": "Aki-1038",
"language": "HTML",
"keyword": "sql注入"
},
{ {
"link": "https://github.com/saoshao/DetSql", "link": "https://github.com/saoshao/DetSql",
"name": "DetSql", "name": "DetSql",
@ -63,119 +81,92 @@
"keyword": "sql注入" "keyword": "sql注入"
}, },
{ {
"link": "https://github.com/ClearloveLA/sql-injection-defense", "link": "https://github.com/toolgood/ToolGood.SQLFirewall",
"name": "sql-injection-defense", "name": "ToolGood.SQLFirewall",
"created_at": "2025-01-04T10:42:03Z", "created_at": "2024-06-21T06:31:42Z",
"description": "基于Node.js和Vue3技术栈结合MySQL数据库设计并实现了一个Web应用SQL注入防护系统旨在解决MySQL数据库在Web应用中面临的SQL注入安全威胁。", "description": "SQL Firewall, Prevent SQL injection, 防sql注入",
"author": "ClearloveLA", "author": "toolgood",
"language": "Vue", "language": "C#",
"keyword": "sql注入" "keyword": "sql注入"
}, },
{ {
"link": "https://github.com/henryxm/autumn", "link": "https://github.com/gege-circle/.github",
"name": "autumn", "name": ".github",
"created_at": "2018-10-08T12:12:12Z", "created_at": "2020-09-20T04:47:25Z",
"description": "采用Spring、Spring Boot、Redis、MyBatis、Shiro、Druid框架开发,搭载mysql数据。 如果你厌烦了MyBatis中需要手动创建表的事情这个项目非常适合你自动为你生成表。 从此你不在需要导入sql文件了项目初始化变得异常简单结构清...", "description": "这里是GitHub的草场也是戈戈圈爱好者的交流地主要讨论动漫、游戏、科技、人文、生活等所有话题欢迎各位小伙伴们在此讨论趣事。This is GitHub grassland, and the community place for Gege circle lovers, mainly discusses anime, games, technology,...",
"author": "henryxm", "author": "gege-circle",
"language": null,
"keyword": "sql注入"
},
{
"link": "https://github.com/yuqingfang2004/AriaDB-for-SDCs-",
"name": "AriaDB-for-SDCs-",
"created_at": "2024-12-11T08:17:34Z",
"description": "本仓库来自确定性执行数据库AriaDB在此基础上进行修改实现了SDC注入SQL层面",
"author": "yuqingfang2004",
"language": "C++",
"keyword": "sql注入"
},
{
"link": "https://github.com/steveopen1/ruoyi_vulnscan",
"name": "ruoyi_vulnscan",
"created_at": "2025-02-23T07:15:22Z",
"description": "ruuoyi_vulnscan 是一款基于 Python 和 Tkinter 开发的图形化界面工具,用于检测若依 Vue 框架应用程序中的常见漏洞。该工具提供了多种漏洞检测模块,包括 Swagger 检测、Druid 检测、文件下载漏洞检测、SQL 注入检测、定时任务漏洞检...",
"author": "steveopen1",
"language": "Python",
"keyword": "sql注入"
},
{
"link": "https://github.com/LtmThink/SQLRecorder",
"name": "SQLRecorder",
"created_at": "2025-02-13T12:20:51Z",
"description": "SQLRecorder是一个能够实时记录SQL语句的工具方便代码审计时对SQL注入的实时关注。(A proxy to record all passing SQL statements.)",
"author": "LtmThink",
"language": "Go",
"keyword": "sql注入"
},
{
"link": "https://github.com/DDL08/directory",
"name": "directory",
"created_at": "2025-02-10T05:44:39Z",
"description": "sql注入或rce或者其他的爆破字典模糊测试fuzz字典",
"author": "DDL08",
"language": null,
"keyword": "sql注入"
},
{
"link": "https://github.com/peiqiF4ck/WebFrameworkTools-5.1-main",
"name": "WebFrameworkTools-5.1-main",
"created_at": "2023-01-08T05:21:26Z",
"description": "本软件首先集成危害性较大框架和部分主流cms的rce(无需登录,或者登录绕过执行rce)和反序列化(利用链简单)。傻瓜式导入url即可实现批量getshell。批量自动化测试。例如:Thinkphp,Struts2,weblogic。出现的最新漏洞进行实时跟踪并且更...",
"author": "peiqiF4ck",
"language": "C#",
"keyword": "sql注入"
},
{
"link": "https://github.com/xiangyuecn/AreaCity-JsSpider-StatsGov",
"name": "AreaCity-JsSpider-StatsGov",
"created_at": "2018-11-28T05:11:35Z",
"description": "省市区县乡镇三级或四级城市数据带拼音标注、坐标、行政区域边界范围2025年01月14日最新采集提供csv格式文件支持在线转成多级联动js代码、通用json格式提供软件转成shp、geojson、sql、导入数据库带浏览器里面运...",
"author": "xiangyuecn",
"language": "JavaScript", "language": "JavaScript",
"keyword": "sql注入" "keyword": "sql注入"
}, },
{ {
"link": "https://github.com/AndyWannaSing/trace-canvas", "link": "https://github.com/PstarSec/AI-Ollama",
"name": "trace-canvas", "name": "AI-Ollama",
"created_at": "2024-12-29T10:39:59Z", "created_at": "2025-03-07T04:46:28Z",
"description": "TraceCanvas 是一款专注于基础链路追踪功能的工具旨在帮助开发者全面监控和分析系统性能。其主要功能包括方法执行树的可视化展示、SQL 操作追踪、HTTP 请求追踪、Redis 操作追踪以及消息队列MQ操作追踪等。此外TraceC...", "description": "Ollama 未授权访问【CNVD-2025-04094】验证脚本",
"author": "AndyWannaSing", "author": "PstarSec",
"language": null,
"keyword": "sql注入"
},
{
"link": "https://github.com/Sanandd/---doAction-SQL-",
"name": "---doAction-SQL-",
"created_at": "2024-12-21T09:39:42Z",
"description": "秒优科技-供应链管理系统doAction存在SQL注入漏洞",
"author": "Sanandd",
"language": null,
"keyword": "sql注入"
},
{
"link": "https://github.com/Sanandd/yongyou",
"name": "yongyou",
"created_at": "2024-12-21T09:28:22Z",
"description": "SQL注入",
"author": "Sanandd",
"language": "Python",
"keyword": "sql注入"
},
{
"link": "https://github.com/jiaqiwang8/wjq-goods",
"name": "wjq-goods",
"created_at": "2024-12-21T09:03:52Z",
"description": "微商城系统 goods.php SQL注入漏洞",
"author": "jiaqiwang8",
"language": null,
"keyword": "sql注入"
},
{
"link": "https://github.com/zhang-nan666/-HCM-LoadOtherTreeServlet-SQL-",
"name": "-HCM-LoadOtherTreeServlet-SQL-",
"created_at": "2024-12-21T08:49:32Z",
"description": "宏景HCM-LoadOtherTreeServlet SQL注入检测",
"author": "zhang-nan666",
"language": null,
"keyword": "sql注入"
},
{
"link": "https://github.com/zhang-nan666/-FE-apprvaddNew.jsp-SQL-",
"name": "-FE-apprvaddNew.jsp-SQL-",
"created_at": "2024-12-21T08:48:44Z",
"description": "某远互联FE协作办公平台 apprvaddNew.jsp SQL注入漏洞",
"author": "zhang-nan666",
"language": null,
"keyword": "sql注入"
},
{
"link": "https://github.com/ayy138/SpringBlade_Sql",
"name": "SpringBlade_Sql",
"created_at": "2024-12-21T08:34:10Z",
"description": "SpringBlade tenant/list SQL 注入漏洞复现及POC",
"author": "ayy138",
"language": "Python",
"keyword": "sql注入"
},
{
"link": "https://github.com/Ning-0223/-HCM-LoadOtherTreeServlet-SQL-",
"name": "-HCM-LoadOtherTreeServlet-SQL-",
"created_at": "2024-12-21T07:54:40Z",
"description": "宏景HCM-LoadOtherTreeServlet SQL注入 ",
"author": "Ning-0223",
"language": "Python",
"keyword": "sql注入"
},
{
"link": "https://github.com/20142995/wxvl",
"name": "wxvl",
"created_at": "2024-11-16T11:21:28Z",
"description": "复现|漏洞|CVE|CNVD|POC|EXP|0day|1day|nday等相关微信文章收集",
"author": "20142995",
"language": "Python", "language": "Python",
"keyword": "cnvd" "keyword": "cnvd"
}, },
{ {
"link": "https://github.com/20142995/CNVD_crawler", "link": "https://github.com/KzNight/CNVD-2025-04094-ollama_unauth",
"name": "CNVD_crawler", "name": "CNVD-2025-04094-ollama_unauth",
"created_at": "2024-09-02T10:54:53Z", "created_at": "2025-03-04T07:06:13Z",
"description": null, "description": "国家信息安全漏洞共享平台CNVD收录了Ollama未授权访问漏洞CNVD-2025-04094。未经授权的攻击者可以远程访问Ollama服务接口执行敏感资产获取、虚假信息投喂、拒绝服务等恶意操作",
"author": "20142995", "author": "KzNight",
"language": "Python",
"keyword": "cnvd"
},
{
"link": "https://github.com/liuguolong139/CNVD-2024-33023",
"name": "CNVD-2024-33023",
"created_at": "2025-01-16T04:46:44Z",
"description": "CNVD-2024-33023 Python poc",
"author": "liuguolong139",
"language": "Python", "language": "Python",
"keyword": "cnvd" "keyword": "cnvd"
}, },
@ -188,6 +179,51 @@
"language": "Python", "language": "Python",
"keyword": "cnvd" "keyword": "cnvd"
}, },
{
"link": "https://github.com/Ellison-zhang/cnvd_spider",
"name": "cnvd_spider",
"created_at": "2025-02-12T05:59:31Z",
"description": null,
"author": "Ellison-zhang",
"language": "Python",
"keyword": "cnvd"
},
{
"link": "https://github.com/phtcloud-dev/CVE-2024-36837",
"name": "CVE-2024-36837",
"created_at": "2024-06-15T16:44:51Z",
"description": "CVE-2024-36837 | CNVD-2024-30128 POC",
"author": "phtcloud-dev",
"language": "Python",
"keyword": "cnvd"
},
{
"link": "https://github.com/phtcloud-dev/CVE-2024-39199",
"name": "CVE-2024-39199",
"created_at": "2024-06-18T16:36:12Z",
"description": "CVE-2024-39119 | CNVD-2024-31551 POC",
"author": "phtcloud-dev",
"language": "Python",
"keyword": "cnvd"
},
{
"link": "https://github.com/shagongz/CNVD_Crawler",
"name": "CNVD_Crawler",
"created_at": "2025-02-05T07:28:32Z",
"description": "CNVD的简单爬虫",
"author": "shagongz",
"language": null,
"keyword": "cnvd"
},
{
"link": "https://github.com/liuguolong139/CNVD-2024-33023",
"name": "CNVD-2024-33023",
"created_at": "2025-01-16T04:46:44Z",
"description": "CNVD-2024-33023 Python poc",
"author": "liuguolong139",
"language": "Python",
"keyword": "cnvd"
},
{ {
"link": "https://github.com/j8agent/CNVD-2024-15077--AJ-Report-RCE--", "link": "https://github.com/j8agent/CNVD-2024-15077--AJ-Report-RCE--",
"name": "CNVD-2024-15077--AJ-Report-RCE--", "name": "CNVD-2024-15077--AJ-Report-RCE--",
@ -295,41 +331,5 @@
"author": "youxox", "author": "youxox",
"language": "Python", "language": "Python",
"keyword": "cnvd" "keyword": "cnvd"
},
{
"link": "https://github.com/mesyedjunaidali/cnvdetection",
"name": "cnvdetection",
"created_at": "2024-07-16T05:57:09Z",
"description": null,
"author": "mesyedjunaidali",
"language": "Python",
"keyword": "cnvd"
},
{
"link": "https://github.com/bxxiaoxiong/cnvd_fofa_assets",
"name": "cnvd_fofa_assets",
"created_at": "2024-07-12T15:22:03Z",
"description": "通过爱企查和FOFA接口获取注册资本大于5000w公司的公网通用系统方便获得CNVD证书 在搜索公网资产数量的基础上增加使用fid参数查询结果更精准",
"author": "bxxiaoxiong",
"language": "Python",
"keyword": "cnvd"
},
{
"link": "https://github.com/rtwen/cnvdst",
"name": "cnvdst",
"created_at": "2018-12-01T08:36:53Z",
"description": "Copy number variant detection softawre",
"author": "rtwen",
"language": "Python",
"keyword": "cnvd"
},
{
"link": "https://github.com/RowtonSD/cnvdb",
"name": "cnvdb",
"created_at": "2024-03-14T08:17:22Z",
"description": "Handles conversion between XLS, DB2, and external SQL DB sources via python dataframes",
"author": "RowtonSD",
"language": "Python",
"keyword": "cnvd"
} }
] ]

View File

@ -4,11 +4,5 @@
"published_at": "2021-11-01T08:54:13Z", "published_at": "2021-11-01T08:54:13Z",
"author": "BeichenDream", "author": "BeichenDream",
"keyword": "BeichenDream/Godzilla" "keyword": "BeichenDream/Godzilla"
},
{
"link": "https://github.com/wy876/POC/releases/tag/POC20241228",
"published_at": "2024-12-29T09:00:56Z",
"author": "wy876",
"keyword": "wy876/POC"
} }
] ]

View File

@ -7,14 +7,5 @@
"author": "beichen", "author": "beichen",
"link_2": "https://github.com/BeichenDream/Godzilla/commit/a5558e6c37139ebb0b7b4491dc3ea7ce8d8f9e49", "link_2": "https://github.com/BeichenDream/Godzilla/commit/a5558e6c37139ebb0b7b4491dc3ea7ce8d8f9e49",
"keyword": "BeichenDream/Godzilla" "keyword": "BeichenDream/Godzilla"
},
{
"link": "https://api.github.com/wy876/POC",
"name": "wy876/POC",
"updated_at": "2025-01-07T07:14:02Z",
"description": "Update README.md",
"author": "wy876",
"link_2": "https://github.com/wy876/POC/commit/9eefec0a4c311a412a86ab83bef3a25d3cb1766d",
"keyword": "wy876/POC"
} }
] ]

View File

@ -0,0 +1,11 @@
[
{
"link": "https://github.com/su18/POC",
"name": "POC",
"created_at": "2023-01-08T01:56:47Z",
"description": "收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了1400多个poc/exp长期更新。",
"author": "su18",
"language": null,
"keyword": "su18"
}
]

View File

@ -1,72 +1,72 @@
[ [
{ {
"guid": "https://forum.butian.net/share/4063", "guid": "https://forum.butian.net/share/4191",
"title": "2.35版本以下堆沙盒绕过模板总结带例题", "title": "从域认证协议以及密码凭据机制的角度来看内网渗透",
"description": "总结了2.35版本以下堆沙盒绕过的各种模板,包括2.272.292.31的原理和模板还有对应例题", "description": "本文记录了内网渗透中主机之间的认证以及横向,域渗透相关的协议以及思路的多种方式,",
"source": "subject", "source": "subject",
"pubDate": "2025-01-22 10:00:02" "pubDate": "2025-03-14 09:00:00"
}, },
{ {
"guid": "https://forum.butian.net/share/4062", "guid": "https://forum.butian.net/share/4181",
"title": "巧用Chrome-CDP远程调用Debug突破JS逆向", "title": "XSS防御-揭秘Unicode溢出与CSP Bypass",
"description": "CDP远程调用非常方便他允许我们直接可以通过代码来操作浏览器完成一系列行为希望通过我的这篇文章让师傅们对其有一定了解学习并赋能与我们的渗透测试与安全研究工作之中提升效率", "description": "Unicode溢出与CSP Bypass",
"source": "subject", "source": "subject",
"pubDate": "2025-01-22 09:00:01" "pubDate": "2025-03-13 09:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/4060", "guid": "https://forum.butian.net/share/4170",
"title": "windows com组件模糊测试入门", "title": "一次渗透过程中的CVE-2022-45460撞洞RCE",
"description": "windows com组件模糊测试入门\r\n什么是windows com组件\r\ncom全称是Component Object Model即组件对象模型。按照微软官方的说法COM 是一个平台无关的、分布式的、面向对象的系统,用于创建可交...", "description": "在一次渗透中我们遇到了雄迈XiongMai的uc-httpd这是一款被全球无数网络摄像机使用的轻量级Web服务器。根据Shodan的数据大约有7万个该软件的实例在互联网上公开暴露。尽管这款软件存在严...",
"source": "subject", "source": "subject",
"pubDate": "2025-01-21 10:00:02" "pubDate": "2025-03-12 09:00:02"
}, },
{ {
"guid": "https://forum.butian.net/share/4055", "guid": "https://forum.butian.net/share/4190",
"title": "实战 | 微信小程序EDUSRC渗透漏洞复盘", "title": "记一次某大厂csrf漏洞通过蠕虫从低危到高危",
"description": "这里给师傅们总结下我们在进行漏洞挖掘过程中需要注意的细节,比如我们在看到一个功能点多个数据包的时候,我们需要去挨个分析里面的数据包构造,进而分析数据包的走向,去了解数据包的一个业务逻辑,特别是微信小程序", "description": "本文记载了笔者src漏洞挖掘的经历如何将一个简单的csrf提高至高危的程度",
"source": "subject", "source": "subject",
"pubDate": "2025-01-21 08:00:02" "pubDate": "2025-03-11 09:00:00"
}, },
{ {
"guid": "https://forum.butian.net/share/4050", "guid": "https://forum.butian.net/share/4168",
"title": "浅谈恶意样本の反沙箱分析", "title": "掌握Django隐秘漏洞构建内存马实现命令执行",
"description": "说实话单纯的静态免杀其实不是很难,只要通过足够新颖的加壳手段就能够成功将木马加载到内存中,但是抵御不了蓝队(比如微步云沙箱)使用沙箱的动态分析,所以通常只能够免杀小一天就上传了病毒库,从而免杀失效了。\r\n\r\n本文就是来介绍几种反沙箱的思路来帮助红队搞出耐得住沙箱考验的payload", "description": "内存马作为一种常见的攻击与权限维持手段往往多见于Java Web应用中Django在日常开发中使用频率较高的框架今天来探寻在Python Web场景下的内存马",
"source": "subject", "source": "subject",
"pubDate": "2025-01-20 10:00:00" "pubDate": "2025-03-10 17:38:25"
}, },
{ {
"guid": "https://forum.butian.net/share/4053", "guid": "https://forum.butian.net/share/4134",
"title": "在 JSP 中优雅的注入 Spring 内存马", "title": "使用分支对抗进行webshell bypass",
"description": "JSP 下注入 Spring 内存马 & Spring Hack 无条件的一种方法", "description": "使用分支对抗进行webshell bypass",
"source": "subject", "source": "subject",
"pubDate": "2025-01-20 09:00:00" "pubDate": "2025-03-10 11:17:55"
}, },
{ {
"guid": "https://forum.butian.net/share/4048", "guid": "https://forum.butian.net/share/4162",
"title": "探寻Bottle框架内存马", "title": "论如何从发现者视角看 apache solr 的 js 代码执行漏洞",
"description": "在某次测试时候 碰见了一个叫bottle的框架 于是探寻了下在实际中可应用的注入内存马的方法", "description": "平时分析和复现了很多 cve但是一遇到逻辑稍微复杂的漏洞通告给的位置不是很详细的代码 diff 很冗杂的,分析起来就会很困难,然后这时候其实就是需要耐心和思维逻辑了,这次花了接近一周的时间来了解这个漏洞,其实这个漏洞倒是不重要,就是逼着自己去锻炼思维和看官方文档的能力,让自己尽量接近发现者的视角,虽然这个漏洞很老,但是我还是感觉发现它的人真的很厉害,前后的分析过程也是花费了整整一周",
"source": "subject", "source": "subject",
"pubDate": "2025-01-17 10:00:01" "pubDate": "2025-03-10 10:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/4046", "guid": "https://forum.butian.net/share/4171",
"title": "使用汇编代码实现反向shell", "title": "vaadin反序列化链挖掘tabby静态分析实践",
"description": "本章为笔者在学习过程中的学习记录其目的是使用python的keystone引擎来一步步实现一个完整的反向shell这种方法相对麻烦但主要是为了理解汇编代码的运行过程。", "description": "在学习前面几条链子的基础上结合静态分析工具在前面的基础上的一些小发现包括vaadin的新利用方式以及对tabby的检测缺陷的总结",
"source": "subject", "source": "subject",
"pubDate": "2025-01-17 09:00:00" "pubDate": "2025-03-07 09:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/4041", "guid": "https://forum.butian.net/share/4178",
"title": "Pipe管道利用", "title": "Tomcat内存马之Upgrade构建调试分析",
"description": "关于Pipe管道的安全技术分享", "description": "在现今攻防演练日趋常态化和网络安全检测设备检测技术越来越成熟的大环境下,传统的以文件形式驻留的后门文件极其容易检测查杀到,随之\"内存马\"技术开始登上历史的舞台。在JAVA安全知识体系中JAVA内存马也是必须要学习的一个关键板块本篇文章主要介绍Tomcat-Upgrade型内存马",
"source": "subject", "source": "subject",
"pubDate": "2025-01-16 09:30:00" "pubDate": "2025-03-06 09:00:02"
}, },
{ {
"guid": "https://forum.butian.net/share/4045", "guid": "https://forum.butian.net/share/4173",
"title": "x86_shellcode的一些总结", "title": ".Net Core下的内存马",
"description": "本文章会涉及到各种shellcode的原理和撰写然后还有可见字符串漏洞的撰写和原理以及工具梭哈和 一些针对不同orw情况的模板shellcode", "description": "在审计了一套.net core的CMS后的扩展延伸",
"source": "subject", "source": "subject",
"pubDate": "2025-01-16 09:00:00" "pubDate": "2025-03-05 09:00:00"
} }
] ]

View File

@ -1,122 +1,122 @@
[ [
{ {
"title": "盘点 2024 年备受关注的那些高风险漏洞\n", "title": "机器学习的逻辑回归模型\n",
"link": "https://paper.seebug.org/3268/", "link": "https://paper.seebug.org/3303/",
"description": "作者知道创宇404实验室\n2024年网络安全领域接连曝出了一系列高危漏洞这些漏洞不仅影响范围广泛而且破坏力极大对全球的网络安全构成了严峻挑战。以下是我们从今年的安全漏洞应急中总结出的一些颇具危害性和影响力的网络安全漏洞排名不分先后当然我们也从Seebug漏洞平台访问数据和ZoomEye网络空间搜索引擎对应搜索出来的受影响量级中筛选出了排名相对靠前的漏洞附在文末供大家参考。通...\n", "description": "\n\n\n .katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日\n1. 前言\n在「机器学习的线性回归模型」文章中我们学习了监督学习中如何使用线性回归模型拟合连...\n",
"pubDate": "Tue, 21 Jan 2025 07:17:00 +0000", "pubDate": "Thu, 13 Mar 2025 07:37:00 +0000",
"guid": "https://paper.seebug.org/3268/", "guid": "https://paper.seebug.org/3303/",
"category": "404专栏"
},
{
"title": "Love and hate under war: The GamaCopy organization, which imitates the Russian Gamaredon, uses military - related bait to launch attacks on Russia\n",
"link": "https://paper.seebug.org/3270/",
"description": "AuthorKnownsec 404 Advanced Threat Intelligence team\nDate: January 21, 2025\n中文版https://paper.seebug.org/3269\nRecently, our team discovered attack samples targeting Russian-speaking targets during...\n",
"pubDate": "Tue, 21 Jan 2025 02:17:00 +0000",
"guid": "https://paper.seebug.org/3270/",
"category": "威胁情报"
},
{
"title": "战争下的相爱相杀疑似GamaCopy组织利用军事诱饵对俄发起攻击\n",
"link": "https://paper.seebug.org/3269/",
"description": "作者知道创宇404高级威胁情报团队\n英文版https://paper.seebug.org/3270\n近期团队在威胁狩猎过程中发现了针对俄语区目标的攻击样本。团队还关联到另外一个样本两个样本在运行流程是一致的并且使用的诱饵主题也是相同的。\n通过对样本的分析和关联本次样本具备以下特点\n\n利用军事设施相关内容为诱饵发起攻击。\n使用7z自解压程序SFX释放和加载后续载荷。\n利用...\n",
"pubDate": "Mon, 20 Jan 2025 09:25:00 +0000",
"guid": "https://paper.seebug.org/3269/",
"category": "威胁情报"
},
{
"title": "探索大型语言模型在Android恶意软件语义分析与分类中的应用\n",
"link": "https://paper.seebug.org/3267/",
"description": "作者Brandon J Walton, Mst Eshita Khatun, James M Ghawaly, Aisha Ali-Gombe.\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/abs/2501.04848\n摘要\n恶意软件分析是一项复杂的过程涉及对恶意软件功能、来源和潜在影响的检查与评估。通常这一艰巨的任务需要对软件进行详细剖析以理解其...\n",
"pubDate": "Tue, 14 Jan 2025 06:48:00 +0000",
"guid": "https://paper.seebug.org/3267/",
"category": "AI安全" "category": "AI安全"
}, },
{ {
"title": "Self-changing Data Type - CVE-2024-40676 漏洞分析\n", "title": "「深蓝洞察」2024年度最憋屈的漏洞披露\n",
"link": "https://paper.seebug.org/3266/", "link": "https://paper.seebug.org/3304/",
"description": "作者canyie\n原文链接https://blog.canyie.top/2024/11/07/self-changing-data-type/\n今年 10 月份的时候Android 安全公告用 CVE-2024-40676 的编号公布了一个很奇怪的 patch。 \nAccountManagerService checkKeyIntent() 负责检查 account authent...\n", "description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/Y8-wT88VnLeMUiD-HssPyw\n在网络安全领域漏洞披露一直被视为保护用户的重要环节但在现实中这一过程却充满了争议和矛盾。究竟什么才算得上“负责任的披露”当厂商在信息公开和补丁发布上占据主导地位而安全研究者则需要耗费大量精力进行沟通与博弈这一模式是否还能真正实现保护用户安全的初衷...\n",
"pubDate": "Fri, 10 Jan 2025 08:46:00 +0000", "pubDate": "Wed, 12 Mar 2025 08:28:00 +0000",
"guid": "https://paper.seebug.org/3266/", "guid": "https://paper.seebug.org/3304/",
"category": "经验心得"
},
{
"title": "「深蓝洞察」2024年度最“安全”的防线\n",
"link": "https://paper.seebug.org/3302/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/LaM5iz_EKbAK_lkaAcBshw\n在攻防对抗日益激烈的2024年安全软件一直被视为企业安全防线的重要基石。然而这些安全软件本身也可能存在漏洞甚至被攻击者利用作为入侵的跳板来对用户造成危害。多年来因为安全软件而导致的事故不禁让人产生一个疑问——安全软件真的可信吗\n安全软件被滥用为攻击工...\n",
"pubDate": "Tue, 11 Mar 2025 08:39:00 +0000",
"guid": "https://paper.seebug.org/3302/",
"category": "经验心得"
},
{
"title": "「深蓝洞察」2024年度最难以阻挡的攻防趋势\n",
"link": "https://paper.seebug.org/3301/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/lUA03YjBiCAatcJh-bUHEQ\n近年来漏洞攻防不断演进。从多年前仅需一个栈溢出就能攻破系统到如今需要运用各种精妙的手法来突破系统的层层防御。“盾”与“矛”始终处于动态对抗每当新的防御措施出现新的攻击手段随之而来。防御机制的升级促使攻击者寻找新的突破口而攻击方法的创新又推动着防御技术...\n",
"pubDate": "Mon, 10 Mar 2025 08:19:00 +0000",
"guid": "https://paper.seebug.org/3301/",
"category": "经验心得"
},
{
"title": "机器学习的线性回归模型\n",
"link": "https://paper.seebug.org/3300/",
"description": "\n\n\n .katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\n跟随着 ChatGPT 等大语言模型掀起的人工智能的浪潮,在这个时间点学习 A...\n",
"pubDate": "Fri, 07 Mar 2025 07:22:00 +0000",
"guid": "https://paper.seebug.org/3300/",
"category": "AI安全"
},
{
"title": "Llama 的悖论:深入探索 Llama.cpp 的堆迷宫,从堆溢出到远程代码执行\n",
"link": "https://paper.seebug.org/3299/",
"description": "作者Patrick Peng \n译者知道创宇404实验室翻译组\n原文链接https://retr0.blog/blog/llama-rpc-rce\n我一直对 Llama.cpp 情有独钟,它堪称我在人工智能与机器学习研究领域孜孜以求的“终极目标”。不仅如此,能在如此复杂且成熟的人工智能项目中挖掘出堆栈/堆溢出导致的远程代码执行漏洞,听起来就格外酷炫。当然,我内心深处渴望在人工智能项目中...\n",
"pubDate": "Thu, 06 Mar 2025 06:27:00 +0000",
"guid": "https://paper.seebug.org/3299/",
"category": "漏洞分析" "category": "漏洞分析"
}, },
{ {
"title": "基于差分隐私的检索增强生成\n", "title": "Emoji攻击增强针对Judge LLMs检测的越狱攻击\n",
"link": "https://paper.seebug.org/3265/", "link": "https://paper.seebug.org/3297/",
"description": "作者Nicolas Grislain\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2412.19291v1#Sx4\n摘要\n检索增强生成Retrieval-Augmented Generation, RAG已成为为大型语言模型Large Language Models, LLM提供最新且相关上下文的主流技术。这一技术可以缓解模型生成不准确...\n", "description": "作者:Zhipeng Wei, Yuqi Liu, N. Benjamin Erichson\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2411.01077v2\n摘要\n越狱Jailbreaking技术可以欺骗大型语言模型LLMs使其生成受限制的输出从而构成严重威胁。其中一种防御方法是使用另一个 LLM 作为 Judge裁判来评估...\n",
"pubDate": "Thu, 02 Jan 2025 07:44:00 +0000", "pubDate": "Tue, 04 Mar 2025 09:37:00 +0000",
"guid": "https://paper.seebug.org/3265/", "guid": "https://paper.seebug.org/3297/",
"category": "AI安全" "category": "AI安全"
}, },
{ {
"title": "Qemu重入漏洞梳理 & CVE-2024-3446分析\n", "title": "模型序列化攻击\n",
"link": "https://paper.seebug.org/3264/", "link": "https://paper.seebug.org/3298/",
"description": "作者:华为安全应急响应中心\n原文链接https://mp.weixin.qq.com/s/gWK5JwzLz8qdfG4VUJqVhA\n1 简介\n主要是分析CVE-2024-3446漏洞的成因和漏洞的补丁以及之前的补丁为何失效顺便对Qemu历史重入漏洞进行了分析梳理\n2 时间线\n\n\n2020/07/21 e1000e重入导致的UAF还没归为重入问题\n\n\n2021/08/23 重入漏...\n", "description": "译者知道创宇404实验室翻译组\n原文链接https://github.com/protectai/modelscan/blob/main/docs/model_serialization_attacks.md\n机器学习ML模型是基于机器学习的应用程序的核心资产。安全地存储和检索模型对成功至关重要。根据使用的机器学习库模型可以以多种常见格式保存。流行的选择包括Pickle、HDF5...\n",
"pubDate": "Mon, 30 Dec 2024 07:35:00 +0000", "pubDate": "Tue, 04 Mar 2025 07:09:00 +0000",
"guid": "https://paper.seebug.org/3264/", "guid": "https://paper.seebug.org/3298/",
"category": "漏洞分析"
},
{
"title": "使用开源大语言模型将安全通告与易受攻击的函数配对\n",
"link": "https://paper.seebug.org/3263/",
"description": "作者Trevor Dunlap, John Speed Meyers, Bradley Reaves, and William Enck.\n译者知道创宇404实验室翻译组\n原文链接https://www.enck.org/pubs/dunlap-dimva24.pdf\n摘要\n随着对开源软件依赖性的需求不断增加管理这些依赖中的安全漏洞变得愈加复杂。当前最先进的工业工具通过代码的可达性分...\n",
"pubDate": "Mon, 30 Dec 2024 06:34:00 +0000",
"guid": "https://paper.seebug.org/3263/",
"category": "AI安全" "category": "AI安全"
}, },
{ {
"title": "假 Zoom 会议钓鱼分析\n", "title": "关于 Chat Template 注入方式的学习\n",
"link": "https://paper.seebug.org/3262/", "link": "https://paper.seebug.org/3296/",
"description": "作者Reborn, Lisa@慢雾安全团队\n原文链接https://mp.weixin.qq.com/s/bPGbEdTCKaM9uJhaRXlO6A\n背景\n近期X 上多位用户报告了一种伪装成 Zoom 会议链接的钓鱼攻击手法,其中一受害者在点击恶意 Zoom 会议链接后安装了恶意软件,导致加密资产被盗,损失规模达百万美元。在此背景下,慢雾安全团队对这类钓鱼事件和攻击手法展开分析,并追...\n", "description": "作者: dawu@知道创宇404实验室\n日期: 2025年2月28日 \n1. 前言\n伴随着年后 DeepSeek R1 模型的火热,号称能运行 DeepSeek R1 “满血版” 的 Ktransformers 框架也受到了大量关注。在使用该框架和阅读相关源码时,我发现框架在借助聊天模版(chat template) 将用户输入转化为输入模型的 token 列表的过程中,可能会存在类似于拼...\n",
"pubDate": "Fri, 27 Dec 2024 07:08:00 +0000", "pubDate": "Mon, 03 Mar 2025 06:35:00 +0000",
"guid": "https://paper.seebug.org/3262/", "guid": "https://paper.seebug.org/3296/",
"category": "情报分析"
},
{
"title": "[Agent]WKM在智能代理中注入世界知识\n",
"link": "https://paper.seebug.org/3261/",
"description": "作者:简单的机器学习\n原文链接https://mp.weixin.qq.com/s/2pn3QGLWWbG5yW-G2Ap9Yg\n在面对特定任务时人们往往会首先利用丰富的先验知识在大脑中简要演练整个过程然后再执行无意识的动作。称这种知识为全局任务知识也称为环境/任务常识)。此外,在任务过程中,心智世界知识模型会不断维持一种局部状态知识,代表人类对当前世界状态的认知。例如,想象你在一个...\n",
"pubDate": "Thu, 26 Dec 2024 07:28:00 +0000",
"guid": "https://paper.seebug.org/3261/",
"category": "AI安全" "category": "AI安全"
}, },
{ {
"title": "卡巴斯基禁令之后的影响\n", "title": "从零开始搭建:基于本地 DeepSeek 的 Web 蜜罐自动化识别\n",
"link": "https://paper.seebug.org/3260/", "link": "https://paper.seebug.org/3295/",
"description": "作者Pedro Umbelino, Jake Olcott\n译者知道创宇404实验室翻译组\n原文链接https://www.bitsight.com/blog/aftermath-kaspersky-ban\n在2024年春全球对供应链风险的担忧日益加剧对技术供应商的信任和可靠性问题也愈发凸显。在这样的背景下美国对俄罗斯的杀毒软件巨头卡巴斯基实验室下了禁令禁止其产品进入美国市场。...\n", "description": "作者wh0am1i@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\npocsuite3 框架可以通过 --dork 或 --dork-zoomeye 参数获取 ZoomEye 网络空间测绘平台的搜索引擎数据。但随着近几年网络空间领域的攻防对抗升级导致网络空间中存在大量的蜜罐。为了过滤掉这些蜜罐ZoomEye 中加入了自动标注蜜罐的识别算法, 同时 pocsuite3 ...\n",
"pubDate": "Wed, 25 Dec 2024 02:52:00 +0000", "pubDate": "Fri, 28 Feb 2025 06:18:00 +0000",
"guid": "https://paper.seebug.org/3260/", "guid": "https://paper.seebug.org/3295/",
"category": "情报分析"
},
{
"title": "以大模型为目标的威胁攻击与安全思考\n",
"link": "https://paper.seebug.org/3259/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/YL37d_PjiFJkarEjcrTdiA\n一、概 述\n自2023年以来以ChatGPT为代表的大语言模型LLM向人们展现出了人工智能所具有的无限潜力为各行业带来了全新的发展模式和生产力提升。以大语言模型为基础的智能平台及系统也逐渐成为国家和企业的一种重要的基础设施面对这样一种全新的基础设施...\n",
"pubDate": "Mon, 23 Dec 2024 08:21:00 +0000",
"guid": "https://paper.seebug.org/3259/",
"category": "AI安全" "category": "AI安全"
}, },
{ {
"title": "趋利避害的大模型行为:伪对齐\n", "title": "DeepSeek 启示:深度揭秘基于 PTX 的 GPU 底层优化技术\n",
"link": "https://paper.seebug.org/3258/", "link": "https://paper.seebug.org/3294/",
"description": "作者:Ryan Greenblatt, Carson Denison等\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/abs/2412.14093v1\n摘要\n我们在此呈现了一项关于大型语言模型在训练过程中进行“对齐伪装”行为的演示该模型有选择地遵从其训练目标以防止其行为在训练之外被改变。具体来说我们首先向Claude 3 Opus模型提供了一个系统提示...\n", "description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/FVVes7UIK_OORUk3fXy9mQ\n一、概述\n近日DeepSeek连续不断地开源了多个项目一时间引发了关于GPU底层优化的热潮这在如今国内算力被广泛打压的背景下给我国在现代高性能计算HPC和人工智能AI领域带来了希望其中尤其引人瞩目的是关于底层PTX优化技术引入这在一定程度...\n",
"pubDate": "Mon, 23 Dec 2024 03:06:00 +0000", "pubDate": "Thu, 27 Feb 2025 07:24:00 +0000",
"guid": "https://paper.seebug.org/3258/", "guid": "https://paper.seebug.org/3294/",
"category": "AI安全" "category": "AI安全"
}, },
{ {
"title": "找出披着羊皮的狼:通过文本摘要技术破解对抗性文本到图像提示\n", "title": "银狐突袭DeepSeek本地化部署暗藏“致命陷阱”\n",
"link": "https://paper.seebug.org/3257/", "link": "https://paper.seebug.org/3293/",
"description": "作者:Portia Cooper, Harshita Narnoli, Mihai Surdeanu\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/pdf/2412.12212\n摘要\n文本到图像模型常常遭受一种称为“分而治之攻击”DACA的逐步攻击该攻击通过大型语言模型将敏感文本包装在看似无害的叙述中以隐藏不当内容。为了有效抵御这种逐步DACA攻击...\n", "description": "作者:启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/VUzwaR7eti2YoNebGFz80A\n一、前言\n近期国产大模型DeepSeek凭借其高效的推理能力、创新性的优化技术、低门槛本地化部署能力、灵活的开源商业授权等迅速成为开源生态中的“现象级选手”。然而技术普及的加速期往往伴随着网络安全攻防对抗的升级。当前大量政府、企业和个人开发者在基于D...\n",
"pubDate": "Fri, 20 Dec 2024 07:43:00 +0000", "pubDate": "Thu, 27 Feb 2025 02:47:00 +0000",
"guid": "https://paper.seebug.org/3257/", "guid": "https://paper.seebug.org/3293/",
"category": "AI安全" "category": "AI安全"
}, },
{ {
"title": "探索 AI 驱动的网络安全框架深度学习技术、GPU 支持和未来增强\n", "title": "使用 DeepSeek-R1 在固件漏洞挖掘领域的新实践\n",
"link": "https://paper.seebug.org/3255/", "link": "https://paper.seebug.org/3292/",
"description": "作者:Tobias Becher, Simon Torka\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/pdf/2412.12648\n摘要\n传统的基于规则的网络安全系统在防御已知恶意软件方面表现出色但面对新型威胁它们却显得力不从心。为应对这一挑战新一代网络安全系统开始融合人工智能技术尤其是深度学习算法以提升其识别事件、分析警报和响应安全事件的能力...\n", "description": "作者:启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/rZ4iGXs2O_xYD1yEOyu3CQ\n1. 前言\n在数字化时代固件是硬件设备的核心软件组件直接控制着硬件的运行状态和功能其安全性至关重要。一旦固件存在安全漏洞黑客即可利用来攻击设备的运行或者控制设备发起其它网络攻击典型有Mirai病毒利用设备固件漏洞发起大规模的分布式拒绝服务。因此...\n",
"pubDate": "Fri, 20 Dec 2024 01:14:00 +0000", "pubDate": "Wed, 26 Feb 2025 07:20:00 +0000",
"guid": "https://paper.seebug.org/3255/", "guid": "https://paper.seebug.org/3292/",
"category": "AI安全" "category": "AI安全"
},
{
"title": "Fuzz 工作流解析与 AI 引入方案分享\n",
"link": "https://paper.seebug.org/3291/",
"description": "作者ghost461@知道创宇404实验室\n时间2025年2月26日\n本文为知道创宇404实验室内部分享沙龙“404 Open Day”的议题内容作为目前团队AI安全研究系列的一部分分享出来与大家一同交流学习。\n1. 概述\n本文受 Google 安全博客的《Leveling Up Fuzzing: Finding more vulnerabilities with AI》启发结合自...\n",
"pubDate": "Wed, 26 Feb 2025 06:10:00 +0000",
"guid": "https://paper.seebug.org/3291/",
"category": "AI安全"
},
{
"title": "「深蓝洞察」2024年度最悲剧的后门\n",
"link": "https://paper.seebug.org/3290/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/BZtSTpTQbNiAY_KDhnqc8Q\n“看到了软件的源码就意味着没有后门吗”\n1983年的图灵奖颁奖仪式上Ken Thompson抛出了这个问题。作为历史上唯三在40岁以下获得图灵奖的传奇之一他在获奖演讲中向听众展示了如何通过在编译器中植入后门来骇入由无害源码编译得到的Unix系统。Ken...\n",
"pubDate": "Tue, 25 Feb 2025 09:17:00 +0000",
"guid": "https://paper.seebug.org/3290/",
"category": "经验心得"
} }
] ]

View File

@ -1,434 +1,413 @@
{ {
"银行测试": [ "银行测试": [
{
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9eGY9uACgt2whpM3uArsKJhtPcW3yngI2os4opoqkJ3CVlyQRDaV_HvuZGgEiqH5qWVyu8f-CdizGGuzUBaUw7bsimoDXdO0tkjwoWmP-IR9FiZxR7Rc1qNIqBowcxeVnIZeM8ubsGmWg6T-TWZRp5hMz8sMk5-v1orwBepw7bhs5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...",
"author": "新华网思客",
"pubDate": "2023-03-16 10:44:22"
},
{ {
"title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元", "title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9zHGYqlalT_VJfHDwO02w2ubGj6ACF2k2sCzsIsgR4GhI4L_qnp_v4V9Ua596Obr-lOwJLzSFD4EOMu9ZMumPtDHSwDplYMtaBqrGxdbQjGnA7ARKXsg7FmoJfE-U2yV7ggUz3yBpaUr9EVYC2DfmvqhJLZUOsMufJoKUtO8QUTmq3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9_kxI_VvZmKgIBPWuqWqxGjP3L13Sx5Z8ue1Bt6fMWTNbF8uHcSw7yotWKb45hPYOaO6s4gjlb4BSJWEIov6vVWlkKRxOU5zRnkoYXaXVF4CL4XDiNBnzLCkPG3h6guywoth2eDg90PDqC7YyxYWm08OGcMk1MyMvIg8f5XKwm5pFH6In5Ei3zg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...", "description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...",
"author": "观八闽", "author": "观八闽",
"pubDate": "2022-02-22 15:30:56" "pubDate": "2022-02-22 15:30:56"
}, },
{
"title": "央行出手!支付宝们正式被“收编”了!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbZAu6cad5tPelPzLtv1Lwxu4iyHDCcmcabpXC1X0WaaA4xln6MP2dgarr0xpk5odhX1kWStfnfvj4Z6Z2lq8I1TrmwZ3NjM7mICVKVuf8hXbSgXZgprj6MUY-UZGbO56rA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
"description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...",
"author": "人民网",
"pubDate": "2017-10-17 11:43:30"
},
{
"title": "美联储最新消息!要求银行多备“家底”,特别是→",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9ss8CigRbhT_yMa4YqOu96E7Xh0U9c0BAbvoB6c3I3c4DAEyT01f-1lIvf8U9cDwz9LOCmyYK9mK7kheh35rpjQG2Usw7E-63flovrxorx8E1VfWiFHJPhYv-iLgGfd_7OU18FY5YCIbcgrAOAqCmwLrc-SQ9N9bqrXoyjzescGQNGbbB75bUeA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
"description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...",
"author": "央视财经",
"pubDate": "2023-07-12 16:15:05"
},
{
"title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9aPDFhYC8n_PNja9JhuLl9kxF6yapTbed5HRMDTnDwzN9XVcW1w1wQeH3VmAIy6GBJWowvMxfjekqshLLGAuai8aOcmULjtXq1IIkfngfrEGt_F4mQS3hxgxZAyaKanzRGibtH4X2P47JDWNOs6bkOr3BzwJ2E4sc4ALha0IAQRlQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
"description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...",
"author": "人民网舆情数据中心",
"pubDate": "2022-08-31 19:55:10"
},
{
"title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbTdGRMwa_653aBQyU47D6FlkqSKzl6e1ffSkU6QpugmafsejFJCUl6__wiHN6alHh_wMDl4D0BPCjsCgkLkk-CpBfsOHm55Uy61fWckpbRhi-ejLc7uOxLENGbbB75bUeA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
"description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
"author": "人民网",
"pubDate": "2017-05-29 08:02:43"
},
{
"title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9WymiMDeKO_fhN5VvStj6hFNGQmFzkNC4cwOup0nFvpXtmPIGjThDzS-G0i2LhVkycd4R8o7iwhRBidlSIpHl1qod-Q5Cnb-oZeztTQ1lTy3D-dIUyWmCORYm4hDqgjGm8AfEntrJp45Wcvwwy4Gr1L0wxV0sO3jAIwv9_HXHgvde0WC6Sbi7DA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
"description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
"author": "新华网思客",
"pubDate": "2023-05-05 13:51:35"
},
{ {
"title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?", "title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9aPDFhYC8n_PNja9JhuLl9kxF6yapTbed5HRMDTnDwzN9XVcW1w1wQSjIVyN3uhxTqStfkC2YdJd5CLbtO2v1Ikx8fybmPaKjraVlKeXJyyEUNOiMClRHotBpj9olJy2-MNz2AI--yTLVfD86FkCU7guPnCx4CAO9oRRg5ZuiETsHpHkoPMgL3A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9IchiyQiq6LeEKaAPMU9juA1bCFHqCk42rdC7dGu5J0TJV_TSWviegeqZ9YXMeCE_1wsqouY29bLxCPTCe8uqEk8CV1BaKlRyHJGOUCh3xLg9XozB208ctDIH93tc2FnHL_p4NJMsWg5LVTThT-sYBgI8wmJ55I-ygjm-qJq0CU9flztgI7RZ1g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...", "description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...",
"author": "人民网舆情数据中心", "author": "人民网舆情数据中心",
"pubDate": "2017-09-14 08:16:46" "pubDate": "2017-09-14 08:16:46"
}, },
{ {
"title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10", "title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4YUzE4CSGQjeVgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3LQ2q4RtFD6M1s0Dc4LpO5wy8KM5mA5n8tAOlWETac2080W518x-5tm7Ax68ZBx0KiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAvgZg6-4mCHKVgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3fwC5XTKkq9kDNJdxFew8RNmF5J1xVuqKMCAHGR_7TST1Ck-cB6ZhGHapdNWZDDb-iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...", "description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...",
"author": "人民网舆情数据中心", "author": "人民网舆情数据中心",
"pubDate": "2017-01-12 17:06:08" "pubDate": "2017-01-12 17:06:08"
}, },
{ {
"title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?", "title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4YUzE4CSGQjeVgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmMknVSjThfxnakac6hZ0A51m0h56Yfltd8X6KlCWe4r0J4pBP9nxXGmYam4HSJrIuNiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9eGY9uACgt2whpM3uArsKJhtPcW3yngI2os4opoqkJ3CVlyQRDaV_Hro8hmfPwsD9irSLU7ZTXQZPusXiTVPor0eS9LIJKhnse38AsvaT-nG6hJL6b8Kzeyje4PArh_xRW1V5Suf8pEzooHBWUQT7cxZpbLyIjptUldFTpL_yObZ6VKrzu_4XKA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...", "description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
"author": "央视新闻", "author": "新华网思客",
"pubDate": "2017-01-14 16:40:10" "pubDate": "2023-05-05 13:51:35"
}, },
{ {
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?", "title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9WymiMDeKO_fhN5VvStj6hFNGQmFzkNC4cwOup0nFvpXtmPIGjThDzaTe_eog5sBzSEl3tdM79uSHkuSjXbbqihWrrzzdCtGEmiKJVgV5NHj24_6PNylGMIPQe1bPP6Ynl4Oq84MGlr6luCEmXPxpghF6t7hyWboeVTPjuaZtZDR5LU3lqtPw9g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB0MErXwD6mYx_6V1D09fTT_5d3JnQMhdgHrYwSoI_oc0AiMVx1lwOJ1rVNI_Jhpps3az_iRjW0e4QuAW_QYdi8_rH0mz8XQ2U0luG9iCLg784j_DiAYpueDYl_Q5RRZQjg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...", "description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
"author": "新华网思客", "author": "人民网",
"pubDate": "2023-03-16 10:44:22" "pubDate": "2017-05-29 08:02:43"
},
{
"title": "一家银行最多8个APP!功能交叉重叠,是时候该瘦身了……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd994RykCd99wpOEkXvzxCBzIVUS1LA4FKRqdNCxaFpwnfejFPgpux26ggsJHZMa7xJ7gsX7ZN6JdPWaYdBoLjRwY9SIttIWfKJ4tvsU0VTsoST1rCBrLSNNpFWMnV6TSSUZZaKVHYlDmU51kteFU4c75kSP8zcYxYIrJ-Xg-ls-jvzAjcIGepUqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "“你想买理财产品的话,请先下载注册我们银行的APP.”每当走进银行,这样的场景极为常见.近年来,为了增加获客,手机APP成...",
"author": "中国网财经",
"pubDate": "2019-06-14 17:18:12"
},
{
"title": "今年银行保险业监管工作14大要点:坚决落实“房住不炒”要求 深入推进网络借贷专项整治……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd994RykCd99wpOEkXvzxCBzIVUS1LA4FKRqdNCxaFpwnfejFPgpux26sA3XGUDtx3axmAHlXnZgn7rN8UZh4aW0K-vLb1GPNhF2FXQ3glcrc5YLGgLbZ69GCWpbNclo9q8uWawWGL3Do-Kq9tdkvf-V7gbltH5y0CEk6ESiMI9-6w89kyxDwoXvg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "稳妥处置高风险机构,压实各方责任,全力做好协调、配合和政策指导.继续拆解影子银行,特别要大力压降高风险影子银行业务,防止死灰复燃.坚决落实“房住不炒”要求,严格执行授信集中度等监管规则,严防信贷资金违规流入房地产领域.",
"author": "中国网财经",
"pubDate": "2020-01-12 13:33:01"
},
{
"title": "惊人 | 手机这样充电严重泄露隐私 1秒操控你的银行账户",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAvgZg6-4mCHKVgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0eFifmgfhkzbK3MsPyC4ya4w3uOr8wpkTZe-rcwPrNFQINVjsV5vJ1wOlHEOuNWsLsxmGHQK1jyCZ6MwAG9p7EODSTxKXCJbgrpZDj-zG_ndQ3GsP0o8f2FtAn0-35eJ8OzP63VZ-EaTF4-aXtL55m17xploZKyLyaRGHxSWNMLU7g3Ftgn3b4uiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "但你要小心了,如果不谨慎,一秒就可能控制你的银行账户!测试:手机用充电桩可被操控央视记者做了一个测试,曝光了不法分子通...",
"author": "央视新闻",
"pubDate": "2017-04-16 13:37:16"
} }
], ],
"APP逆向": [ "APP逆向": [
{ {
"title": "AndroidApp常见逆向工具和使用技巧", "title": "AndroidApp常见逆向工具和使用技巧",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4wKz3c_ko8DGVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AyC_nS3wnZj0iNsJLywZ6RbaykOSlSwU4dYRZMjPjPFpirNjC3rXHVWm7P7BUaCMkiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAnkQk5xkE8zWVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AR0NI7jhJYTMVcz7PJUxIxodsB_IuTowGyZv6b-_QmuEJE4oYD-Hd2y51bNkKRyRNiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...", "description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...",
"author": "黑白之道", "author": "黑白之道",
"pubDate": "2016-10-26 10:17:15" "pubDate": "2016-10-26 10:17:15"
}, },
{
"title": "一文了解安卓APP逆向分析与保护机制",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9Fh3XIYrMAGv8DFrr22hvP7lXc8UxwhPrmt35a3KpBu6ny2zYHVUy0SsOJjskydDvO3wLOPnpaQCaSR8p2UO7B9BkbwobdSIikD8FDX-9J0O3kPWJiNfaiEAGC8U7o5bKP7YigLRNhrAshrUjZ0KgzMPkolrcIHbL_lGqUy072-WrCDCayYmfpA..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
"description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
"author": "FreeBuf",
"pubDate": "2018-03-31 18:12:34"
},
{ {
"title": "记某APP登录逆向解密过程", "title": "记某APP登录逆向解密过程",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9-x80KM2ExBnuTLaCGHND4pnodWQPfS713l4o4wsrc482IPoKr1Um2HzgvxA0EybWw16OdaRSypMDI0pnF6VUUW1g0c3Gfij7f-NC6j_yPRVOfC1THeHO8UiywAE1Cgs6g6myVY3KoX_zVVm4Sy_n5-_QV12l5zpNEdNaBfgoAUzyPfCoem7FzA..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9dW5oQAMZhc7ZBqfiMFLXG0GQTv2lk_XvxV5bo6L_2VOd4t-r5x3pbI1Gx3EPaC8OJkaDwKAihuibfqYjIBScgTBgSQR65GHD1ovgvuYrz1SLBPf7pGpZz4oa7gW5DCyVlBmNg_TQcN2-Xhwn-8fSxrOrI95WfXBN3EzZ8pTvy0INGbbB75bUeA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...", "description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...",
"author": "黑白之道", "author": "黑白之道",
"pubDate": "2024-05-03 08:36:47" "pubDate": "2024-05-03 08:36:47"
}, },
{ {
"title": "FlutterAPP逆向实践", "title": "FlutterAPP逆向实践",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd92U8oVlW74XCy_hT5Z6fd3wg-E2l-K3Eibp5tKtnEOT7Ai4Lo9w2wJqnCwd5sG8uHKKIVqSswHQv9WTr8JgCIA3Va7QM70SQPj1a_JGOrOlB-nr_k7Ye9gelIGGR6XqpSVCz9r6uIzM_J9_ojCoSIG0pdsdNo8Zink5oRK5NLzTjI3OTRHYU2og..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9J_zVaWw2uFg686rt6ZvNVl60K0aBaZDqdFQVXjiv0XhcM1gIerRkPxIxT4lKFS5XT7GwdtE9H4nLgwu6ohgaLTmGcpSyTO8mBlZ-8ML7pptw4tAT8AJhUJTN8HLoTdsqo5mo5LofbMG1GVImin52YaRs1GYXibKaKgMw5X68IbItPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...", "description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...",
"author": "看雪学苑", "author": "看雪学苑",
"pubDate": "2022-07-21 17:59:03" "pubDate": "2022-07-21 17:59:03"
}, },
{
"title": "一文了解安卓APP逆向分析与保护机制",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRCh-UHGD48L7-I7DWkXnEsIObYXDBg3HYEMXqu0K6h8xhcc62DSq_lv4XrzZVrB48gYRCjyCMepFYVz4yijIGRhQ0g40xftK4fVFS2KAtKzPeWCeu4Cz_SU18tPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
"author": "FreeBuf",
"pubDate": "2018-03-31 18:12:34"
},
{
"title": "鸿蒙APP逆向分析工具和方法",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd96k-G4vgcspPLYU-OdVbivgE_1CqqMF6EOxcfbY4fKS8ON2lobS7MG9GkIaxxwqKhQfj3i8aWjoLflkGcsoJz5Yx2qNurMgWx40Et_0YV0tuvMTeUdWc2sGljxh1T3xgl7amCkbHc5mEEEJl7le_KnBGLfqHxFcxgZqH1DD98IO654z_tGSZTqA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "鸿蒙APP逆向分析工具和方法需要结合专用工具与开发环境特性,以下从工具选择、分析流程及注意事项进行详细说明一、逆向分析工...",
"author": "哆啦安全",
"pubDate": "2025-03-03 07:03:21"
},
{ {
"title": "APP逆向神器之Frida【Android初级篇】", "title": "APP逆向神器之Frida【Android初级篇】",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9MLT0_HWdfepul4uZd1-sqYjPkDJOBTX5ScPMk3ZLze1YYmLdlbLd9YCQywu7Xx_1aUhDbwM6kCW1mdmmd62zqOC1HFgIx7CyM88tmpkmbLYRTF_uAp4oOyGfhJfYCbzPACNT3uQyHhHKzZ8SL37ZftbXDnx54uXZtynVfH9EJNny08OLTBhW0A..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9c9ru1dp7EGcNRWc7m9Vto2jfuvCS_Mpc9MSOn0VU2l0FC8Zx3aXpX0UJ2-YXO-jeeL7GMcDHdlao26PENFpEby4g9Zv-Q3ZdqXO1gHmfrrNnzI8NoDM7cHXc_aYfqQL-sRWvLKG59mTHAJVAOjd33gOjee0gAZukCiuzuct1FnhhWLv6O878UA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...", "description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...",
"author": "NightTeam", "author": "NightTeam",
"pubDate": "2019-07-03 09:00:11" "pubDate": "2019-07-03 09:00:11"
}, },
{ {
"title": "某文APP逆向抓取分析", "title": "对某数藏类app逆向安全分析",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9A2w6H1-L671_cpd7DIwb6HxM8Tg2skDofI5uP0eqZVyT-ZKz1dMK-N9zbOh5JytwuQMI9Iw1eklR9NU_YschWd8WuSVWZGneifUlgUO0DdmQZj7acxftXS57wN0R3gkTLGLP4v_ZS9l8vkYgT1vinXbGqACn98KJShDScdzRj9TYl_Q5RRZQjg..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9lXcNX9AOOoTm4CBrpf0a-sBoRZk4Hd4NMf3NFX_hTnPUBFDO-H4INSEcbjxWPpdnBn-AZglZbicNTigYbg2H7qdRL4o9ns-lYIMjPuIxF33xHcrOROK0Ryt7VpTw8LTTZmvGGaQd2pfwj2ErCUI2wmyPNzVj_SyltmhBVT1n_jDm0CtGSSkZQQ..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "逆向app一定要多练习,这样才能在实践中找到自己的不懂之处,才能够成长.好啦,今天的逆向小文章就到此结束啦,童鞋们下篇文...", "description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...",
"author": "猿人学Python", "author": "编角料",
"pubDate": "2020-05-07 20:19:43" "pubDate": "2023-03-10 18:32:22"
}, },
{ {
"title": "APP逆向系列(一)", "title": "APP逆向系列(一)",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9lKEFNQl0rrlenp4wiJ8SXvf80-YxmieIEjsgWR3J5xNlBAk-V1FIXL1qCf8pITgwKB66yt9Sj5cdNFS7YUvPcOjBqWON9It4wh94ZyOOgTSe1t7XJPgtKizTsNmaXttc6IEvnYYYefYytHrekPzji63WAkJb4HNnNRzgBtY_RGZ5LU3lqtPw9g..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9tUUp5U1amv6rVz_XTmtn0mdOmyG1nqM9oBM4n5C4uAvylPx-49SZoEBhA0b-zBpJsQFk04s6KlDA8AmsqNP4xzefHWP558a5M8BSkLIq_ZaLBrBb6kiIh2RwFHCc_BXVZFugczBJ9VuB_J4lMJKtsrqe2XulivXNeVfmKyOIKAl5LU3lqtPw9g..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "APP逆向系列(一)最近在解决APP逆向问题,之前都是不系统的学习,知道工具,知道hook,但是跟某些金融比起来还是差点意思...", "description": "APP逆向系列(一)最近在解决APP逆向问题,之前都是不系统的学习,知道工具,知道hook,但是跟某些金融比起来还是差点意思...",
"author": "呼啦啦安全", "author": "呼啦啦安全",
"pubDate": "2024-04-14 11:12:10" "pubDate": "2024-04-17 21:59:21"
},
{
"title": "APP逆向之SO必备分析手法",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd93QJZ_u6DtVBLCm5tIS1c4tgwdDeovk5qtt-Bk3ddgLhihS-O339CSoz3v5anw9Ye_G7S6Q3N8uYjNsyO--xiYd-3e_pv-8Dg_nq8TS6llOg-7aLr_T2yfgg65zCaHguXgFkG_6yja0R3-pvL3sGSyABm_ux1OvssSOHWu61Gkb7FcvUoAZZH7Q..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
"description": "APP逆向过程中,需要对dex文件和elf文件进行分析,又因现在各APP都有各种代码保护手法,因此都需要进行动态分析.今天就分享...",
"author": "编码安全",
"pubDate": "2023-04-07 08:31:00"
}, },
{ {
"title": "好用的APP逆向工具", "title": "好用的APP逆向工具",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9z3opM6K7omYoqQdItmBEbfQ0WnB_BhFgbn949veAQ7OzJoMWhEd-66EQQaxs_c2buizi4n44NhKmIOewTtBrR96f_CAhpxvjVdenCun64ZB1eWbkaXAGcDTZJqPyBYuYGIBcuTawofZ0jrgkBmbFPrCriDDeVxgOKgjoYz2pRmtAe0f8bRARvQ..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9uOgbmr5Xs6SFGTkWWTq1dNh66X-qAb5cKLOT1QvVslrpp4a4I0-m6j9v9f8cIyfgBPGHNfUgAPQE7f2t1-x9mZihVVB2ngV9kemhL-3At65I3PA5-zIKti84ioUpdJtGEgNkWYF66san6mCWt711PMRU6aMXJ2QQ0uW6HRm-x3UHpHkoPMgL3A..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "从此APP逆向快人一步Apkdb概述《Android APK+Dex文件反编译及回编译工具》 简称:APKDB.是一款,针对Android OS系统APK...", "description": "从此APP逆向快人一步Apkdb概述《Android APK+Dex文件反编译及回编译工具》 简称:APKDB.是一款,针对Android OS系统APK...",
"author": "素人一鸣", "author": "素人一鸣",
"pubDate": "2025-01-16 15:58:50" "pubDate": "2025-01-16 15:58:50"
}, },
{ {
"title": "对某数藏类app逆向安全分析", "title": "【APP逆向】某某租车app逆向分析",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9pDYDmo_6WbPmVpOz58Jw8jKLqWBpDx5FF2Gs-FMfbVxtEvJOilYPIgFYzPK4vkVky_nV98DTRup51rNXBda2oKmU7oWltoViI84BiKP-Dy-lIv1Wj5vGjLX9zGBlOR_UE5meSB4JJfkodeosb-nPKPrjwV6QzPrMUKFnD6TBUESfxjh3za6jWA..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9WI9MBCWBS0I03fDVYwvSJS7gdYQF3g4s1UKXr8nlM8auXXxFDSEuay2Em97i5hnc2dq6Tx8sa55G6iNoA0zIqXpVSeLn19g1yVT4VUQfUVuda8fN42zql4tEBXYdBMqVO6TiiJTVB3N5_Zy45rSzdXDOat6dFjV5Zas3Dyx4RGjy08OLTBhW0A..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...", "description": "【APP逆向】某某租车app逆向分析 背景 之前了解了fartext 魔改版的功能用法,但是一直没有合适的app用来测试,这次正好拿来练练...",
"author": "编角料", "author": "EternalBlue",
"pubDate": "2023-03-10 18:32:22" "pubDate": "2025-03-12 00:11:48"
} }
], ],
"渗透测试": [ "渗透测试": [
{ {
"title": "200万年薪!人民网这个岗位等你来!", "title": "200万年薪!人民网这个岗位等你来!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbW7umqEKhc-ffZiOymcpZuwFEdV2co-OaYS1WW8r2sRfpdIz1lnDH_S0pCw2N5saCbBkrHJFsNuFEELa-zoRJad9ORg0w6ALekOupoSt0ok0-Ybc4yPGCcpS6t2rFt2rnA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB2zJSH-XHxJYGg2BRycObnfKc6vqPrRScVijf9WWtRq_tjWUSCTqHZ_zcgr_WXE-m8ZMwKxJ1Y2clHKXN6HAQHSrXT6lBa2GicuNmqm54Rw3bHFnoxEXkhNflztgI7RZ1g..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...", "description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...",
"author": "人民网", "author": "人民网",
"pubDate": "2018-08-03 15:22:17" "pubDate": "2018-08-03 15:22:17"
}, },
{
"title": "人社部拟新增10个新职业,看看自己能干点啥",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9M5KIC-0rGvxrKrOE4yeaVB6jc9d8AW15FEbXjOLlcPp1-EZxVpENWkfxV-10Mav2T78uXAmjVAOefeDuF4cLKoC8Fu_b3bij_cQT4ySRNEffksrd64MBextydOvCsxoiSM-jGcEWUUNroyU4YeFsDHNwt-TxIhSa2NrUqYy87xv1AfaFW2DefQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
"description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
"author": "人民网海南频道",
"pubDate": "2020-05-13 14:27:12"
},
{
"title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9RsusdENeiGVElJrChdjvPNX1fkjozfz_F6fy-DJlS_RvnZqWbCJpksJoA15S_Hqd_3i-kL4Xs7KDzA7X8A4xhqmfzh63-HT6s1HZXbR-HRAxbf8_sK0eg67RHN2IMxYAwECVfhiGanzUmM23iMTlqTss7K9PXKpbMOArGZaJ9_fy08OLTBhW0A..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
"description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
"author": "新华网",
"pubDate": "2017-08-24 14:13:15"
},
{ {
"title": "中新网招新了!打工人,速来!", "title": "中新网招新了!打工人,速来!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd95OuhsEbLC57Qio8rhMngNxQ-vEVsbkF8HGScjeHMoX_Tn9cetiQ3iOxnV3ZC6M71ljIugnocwRayxpiw6-7WPdrgNjMAjrCos7tQ0kHdbHCRQJxwta5mDqc8mVlULy3snI5CoAaHnbJTB0wznThx5-ADm-EoU4hRZyl7oZWhCAzs46dn8Efgxg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9m7yv2ccEJ4i5LYy3cPhwUIIrJBaPxbEK8anG_cAz9D5mdEFw6KfCJfNhbADYC1DSHZAO02gCXMIVXr3HxQG1tMPNRm05JJ8Xxu7DlEG3gq69BuoSdIny0WRCDHOB3UXzmb_wXn0lhZVVY7Wc_RgQhKchioy7-HtvNyC4S4f3mI3S-e4Yz84xMA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...", "description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...",
"author": "中国新闻网", "author": "中国新闻网",
"pubDate": "2020-11-03 15:52:39" "pubDate": "2020-11-03 15:52:39"
}, },
{ {
"title": "人社部拟新增10个新职业,网友疯狂@李佳琦", "title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd98TDUbjC5H1Xa1oN67VNw5rKFcsG1D03eqW3KUFdUcHzSEUqMq_A9nQjTPsVZZPiOkE8Uyh-K_oDDeDuTbGUUgo2Uh0zUDlMVW01FkZthHOGXVHwjGiiDmIZLXsyprFWWShIhG_j9OdrQY6vQivX-QFzw0F0SW5PbJqKX1p1OtVKE8RsmObDbtQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9fP4Xj1QflXiE_uUOtgLs-VC7viQvoqUsNljU1prUHdABMu2hSav0LVZ6cZODAmDPnpDumn6Oge4o9xNUzx7burEBVHUFMhkKFEA_qutuCH-2qxk2BJAF6mCQ45mOP0TZd6VZUnHC8jSEQwYN7mKykz41OOAXs8rxyikQyIhN7BcC2Qmj7RgGwQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
"author": "光明网", "author": "新华网",
"pubDate": "2020-05-12 18:12:17" "pubDate": "2017-08-24 14:13:15"
}, },
{ {
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!", "title": "人社部拟新增10个新职业,看看自己能干点啥",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbXg7rMz4y5aCaGmAduDd8oYEnsCJNxnouw4DA67TrJ5lR-ReEQdsMnsrDpqQKM7mlH0I-dw6uGhTiCRo4ksSdJC8-UPAd_nwGVR54YceD_PJHlAKZvz3U9iq3X8EKMKOIA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd938XWbZVit1p12c7HjlKcxc0ct2UIRuW2IuQFNtwlOSwNBnqV_XFalJfWH0Fo0sqI2jXtkJpMFXtkJT5spcScNNd43EJRTZQXbKiB8gxe8MmhclEVHlHGuBTdGJnjDE6p1BPfoFHvxLSJhVaPMnaKR4dqv2GDzseij7f4Zuod9ya00NVofL2iDw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...", "description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
"author": "人民网", "author": "人民网海南频道",
"pubDate": "2020-07-10 19:38:53" "pubDate": "2020-05-13 14:27:12"
},
{
"title": "撒贝宁惊现滑雪场!硬核测评来了→",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9ss8CigRbhT_yMa4YqOu96E7Xh0U9c0BAbvoB6c3I3c4DAEyT01f-1gAJPi-uLeSDzVgAoUbeHg5gjJ8qIpcAuNaYTmSEVnsi0pBXrOagW8PQ2oVD18D68aHEfYSD-nvnlTuFDMsuvXFUkS99sCyYQxV3fwgwckp-gyadaqMUOxGq3X8EKMKOIA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
"description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...",
"author": "央视财经",
"pubDate": "2022-12-30 15:14:23"
},
{
"title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9ss8CigRbhT_yMa4YqOu96E7Xh0U9c0BAbvoB6c3I3c4DAEyT01f-1nxS5zk00z-gYcdUc7sC_gsl8k3sY0WMXy_tFbdEzgy7re0AEItUNr3TvhcYwUKidcWsIsO2z3qtWLgjL0szXxp0M0cXL-cSasncT6xJbOKBAwrO_AWNp0U89kyxDwoXvg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
"description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...",
"author": "央视财经",
"pubDate": "2018-10-09 06:45:24"
}, },
{ {
"title": "李佳琦们要“转正”了!", "title": "李佳琦们要“转正”了!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbX7E2NUksseVecS-zPq5ZTCt4te3nn8ZvRtGHaptLJqZehPm-aPT1g3cmt-ohWYPzeLbEWLZMNkoCNZesFuC6f6D_MPj9g3s6FE8O854_8gbjFAGKEsUIEHs46dn8Efgxg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB0DGECEe9GlcaW9mi2MBmXkLrK2aNKTXvdf2gz9sGguY4io2BKEILJvDOwOoWOamJKwz921jTlhuvjn-9H-nyaoEKqCVj_tYRROprp6YKqkfJpE-dnQJNFFr1dbZWbKUeQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
"author": "人民网", "author": "人民网",
"pubDate": "2020-05-12 19:02:37" "pubDate": "2020-05-12 19:02:37"
}, },
{ {
"title": "撒贝宁现身滑雪场,硬核测评“小汉堡”", "title": "李佳琦们“转正”了!又一波新职业发布…",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9QpRxgAL8K-_aNOjyfTqUYlJdh9QhUpbZ7Kpi_SUbwriq-KaDJqTyqcw4tiPHZ4UC0GWLHS215zl9h32uDsgIxFXHZLUhpd0VR55OSD50G3QsViD8bQlYchdDEM8CQDgaTo_75KW9Ywp26ZajvA3iP5B8_mq_hXaJDuFJ98ETRJbzAjcIGepUqA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB9EW3vvazU96ZKEnoo_JS3x0BzzWn10ximMuBWlT_5O9I0gqXal3SA9xAkmK__NeNaHmTzIKlvgdHMgV46VOYCkU-z-LXgKpny54VryVnWHIeu_sCOlTFyHvzHZXxeLdyg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...", "description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,信息安全测试员、互联网信息审核员的工作将越来越重要.据悉...",
"author": "央视新闻", "author": "人民网",
"pubDate": "2022-12-30 18:03:44" "pubDate": "2020-07-06 15:08:14"
},
{
"title": "妹子们注意!上海消保委测试了40款知名面膜,结果是……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9fP4Xj1QflXiE_uUOtgLs-VC7viQvoqUsNljU1prUHdABMu2hSav0LXFjP6OboT1q_s_i8-oAShCeQ64qo3_4eMPkTSLPrW7GJxBLlQI_Hx1QeXc9ertFCkSjXIGyr7pYJSgLTFHAd537rsyfHp4-1t3va3n34Gw05SG_XagNHQZe0WC6Sbi7DA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "4小时保湿功效分别进行了测试.1全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面...",
"author": "新华网",
"pubDate": "2018-10-06 16:53:48"
},
{
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB3Gf0crth1REpM7pnCtDQFICq64oviefEZ1vGp75hB_-VyPVdkkH4f88ejvmAzB97n9kx5vRkDJvVUmqh55kw-oFE23pG3T_Kpijfgr5UyMHkJlsOtybC6uFW6cwuUnkdA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...",
"author": "人民网",
"pubDate": "2020-07-10 19:38:53"
} }
], ],
"手机银行漏洞": [ "手机银行漏洞": [
{
"title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd9R5a3JsIKJZgohq3m8v5mGn3xEkC39-vENPW3M3YN-eUvl6CkFrfa2YxCDykRjos_xCwMyfJqsBGlPGGieaXpOKRjzA1GSaD3bhJ0lPEpY9m8AJTLcp-zaFBEv86chIYsoF2gd_e3GVlfQt2ozXteZVFCdmtvTd03cLj3HU9H0ij0OK9DLfgmPA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
"description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
"author": "木火通明",
"pubDate": "2019-04-23 21:42:11"
},
{ {
"title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现", "title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd9xVhy9OTbkCfriOx6asm8OI0Zz7zB6S7h4PmspIX-ELXRRItnAoXMaVMjEDe1G_Ojv_8j88Xqbi37bAXfnoUNgvAugLu5xkEKGujoejbOJVsv66nKI4YHqZ7YvEarDPBdQQ5Un8-YwKE1jSlPSqOMqt8HOeSXtI5mix5-w7cf1-Z535pjGOOjYg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9NFACt4r9XtAYsMhQto1wHGOTujEotFi8vSykO0Z07Xs9-tfxZkeUpY6iBgpIAt2qlcUFBr4NqlmxP_WAkDDHwxeCu0zsfNpcT2AjinmY7IFW1HgYGZhghgZJSXbhsdjNLtVmEDjiEeZ0w2BEIqo-WgT7-0TtL-1jEEemsV1E7q_f3q8uRDTfkw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...", "description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...",
"author": "支付百科", "author": "支付百科",
"pubDate": "2020-03-19 19:33:50" "pubDate": "2020-03-19 19:33:50"
}, },
{
"title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYsdolrzjXqj1pLnD8uWvrudhCMWot8BieLb2RzJwWX9iT4VrhNhgA8kVVaS2qYQBl8iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
"description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...",
"author": "安全牛",
"pubDate": "2016-05-19 11:48:56"
},
{
"title": "黑客攻击发现:多家手机银行APP存漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9gDwTTMmZuzjcwzyFhPO2nRAyjp6FV9VZanb98rO0XSjUwzGKY80HLV0Gx6COKz_hiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
"author": "E安全",
"pubDate": "2016-09-05 11:36:23"
},
{
"title": "某银行手机APP现支付漏洞3天被盗刷40多万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzyes-Ge369j3Co-sFbQAhKsPTEcOyYNKnZjXr3PeMRzDc1aFCsg8rsLC0brfg2qmeiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
"description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
"author": "支付界",
"pubDate": "2016-06-16 09:00:18"
},
{ {
"title": "警惕!手机银行APP也会存在高危漏洞", "title": "警惕!手机银行APP也会存在高危漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksQkoh1Sh9dJgKapgqEmlMlCvUs-o76bFk2D-dM70XIA9Cfc4SXbgsSam1TvQpJGHbiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksxHjTp5TWgTMtb0QT38qtXqaKAm6xneH4nKOxeqk3nGzTFmHsDF7RoDIQcIWu7eIDiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...", "description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...",
"author": "中国信通院CAICT", "author": "中国信通院CAICT",
"pubDate": "2017-03-15 14:13:34" "pubDate": "2017-03-15 14:13:34"
}, },
{ {
"title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停", "title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd90_MKY9BV-a_tzIegx12UuuuWaPLscBeVc4qYrn8ZgwH9zPn1-rYQA7okzHUXoZIqiGX2I0iRL53CsOS0hSavBhV2ypKgwO4bXCOnI4C2TWnG90SJCWGubxl5Cwv1el9yD3KN6c93CCFWpCZbJEefE8W7__mhpfrp_8qYNhP-iHktPujwwRB2Pw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9Hzh_lyNfZEqbnRTiI9rBQm3Q87lpJNG3cN4vp1YvJLDwBSPpNKz66VhemuvDOBKdbKq8zyckFEcDlRvZYhEBeMw9r9kKDTs8JkqrrVxvBBjVhoGJkK0jKZMExOmTHzxEnZwJiUsgHt426TGjjzW-m9d9apFNp5IhfTyuqbmZb4TFcvUoAZZH7Q..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...", "description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
"author": "银行科技研究社", "author": "木火通明",
"pubDate": "2019-10-23 12:18:17" "pubDate": "2019-04-23 21:42:11"
}, },
{ {
"title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……", "title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd9m5cb0s6JR_zNCEHz6i52VIFSpCqjLWk5J5P7KDVtCs0rVHWxH8XmEiwxsgfUQ8dBLgMBlmTfT9IJnVZNsFMRAl_vVO-1MQkMkOOXyoRIOLz_NxmZFqdUIH6GA3f5tfWm0j1Wrd2rlZaJIh4ryBTdn-9mBXU2Qh5-GdJojfO6gqs89kyxDwoXvg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzbfa51Lk7hnBdd-PXO8zD4bZBzkEs4qL91zXrAssxq_Fx_iURzYopd5FdYNUIpQFKjqT5bbRtXpk6qvJW3YSGGH4mUNEhHT1092NRPfeW2gOckW9rfO5f8Y4zZqnpfFaZ3i-R9z0OfFxpHSTjVCI9DmVfyAhJ0RCVBxAmAH5j2j34zQH5fQsyygiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "在银行客户所使用的手机银行软件之中存在一个严重的安全漏洞. Prakash解释称,通过利用这个漏洞,他可以从任何一名银行客户的...",
"author": "黑白之道",
"pubDate": "2016-05-27 08:16:49"
},
{
"title": "黑客攻击发现:多家手机银行APP存漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9Y7g5Zxp-ImqDVr2SrMfwi1gtbpSKZ2v4PWTMZ0URHjtUoGUnTGtCmFj7kb-frKMWiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
"author": "E安全",
"pubDate": "2016-09-05 11:36:23"
},
{
"title": "银行手机app存重大漏洞,余额为0也能成功转账?被人套取资金数百万4个月后才发现",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd95FuX7oHuqTy2vXk0m56mQ70Jd5155gD2Md3QcfhtX3-qLVh5LFUOweFf60r0lcM0QVDRCGxYZGQelXNR3W4tYu5LUfYWhH0buEMkJJBVgjYw_NNWnLEmovv2Q7hapVTrJs1xgQwC0o_gxP6VbP9Q8-ADnlWefaUbxpHxVwDXySyFW6cwuUnkdA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "揭示了平顶山银行APP中存在过巨大漏洞.判决书显示,罪犯朱某鑫,1996年生人,小学文化.2017年至2018年,朱某鑫在手机上下...",
"author": "支付爆光台",
"pubDate": "2020-03-19 20:19:19"
},
{
"title": "警惕!有人利用手机银行漏洞,在我市疯狂作案30余起...",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9uQLYrci54ZeLmLtABBGBCMIvO4GzVCXt80DQXHrBh8VSd1SY3lJZNDZNyjq5zoKt0mT_fnwtE_JIauljziXMGalNG8OVdv5bTR0I2AF5eLpJa2F-yUwexQGdQ_k6SHQwX3ySM0Gj6eAyQBjnkA7l8ZXOMbRNJafAdPiN8gBUESctPujwwRB2Pw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...", "description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...",
"author": "乐享崇仁", "author": "赣州公安",
"pubDate": "2019-09-12 22:35:10" "pubDate": "2019-09-11 18:44:52"
}, },
{ {
"title": "警惕!有人利用手机银行漏洞疯狂作案30余起……", "title": "警惕!有人利用手机银行漏洞疯狂作案30余起……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd9SamOCvhwx0d6CdZsiIUih7kLI9EpFh8bw0knJ6uHDIvPFEidt9VIvot456Cs-EitOt1KjbyuuWMxkm9Pqcodh5r6t7-CpXT5EboJIg6GGFdn48NJOLAJfwtr0G0aumvXnXccrNuPNREQiTm53HUFCEr13RD74cn9k71IYgxmdxd6VKrzu_4XKA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9NT8RvUvXV0PFeE3a2kUhkP2ZG_sX8zawtBT3KVXDaagk-cP3LlavEKLsUaYCzd6w6DZhlyQ9YspIRZKmkzay6EZQflQxyhdeqKfuAYpCA52ekN5651P75SmY3qYCzo2bOCCca3RPdx4ylb5AvEf1Wk8wPAKoG25Q9dQcrLNGeD3wdVqCwyPdzA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...", "description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...",
"author": "玉山生活", "author": "玉山生活",
"pubDate": "2019-09-15 17:21:04" "pubDate": "2019-09-15 17:21:04"
}, },
{ {
"title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!", "title": "某银行手机APP现支付漏洞3天被盗刷40多万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUab7a7Ge9ltPPuAjBirQ5ibdQXc807f3X9oUuPzrt1lzx18VZkBAfRr0QNwFMBtIX0iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzHWEdrYZx40buATK0RtUpeKuK4Xnc6AvoJJ3-8f7g0iBwlwVQ0IawpTKu0NTfZRcaiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...", "description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
"author": "集宁佰事通", "author": "支付界",
"pubDate": "2017-01-20 11:26:29" "pubDate": "2016-06-16 09:00:18"
},
{
"title": "浅析某城商行手机银行水平授权漏洞问题",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9xDBW9Rl70OcDaZ8d2t3eWLxTzFuASo02mX09efynhG3F4_7-WUI3gC3ZjaOrWCB9EsQUbql0RvIrYgINh8Nu28IO5qsg2KkFcI5Ud9tw-aj4WuHTgESjTlTUICBxW3zzbT2DRbilp0A20hoSggt-li4bneigETdENFVo2Of620Pf3q8uRDTfkw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "也导致此城商行从2019年1月18日至今一直关闭手机银行APP软件中Ⅱ、Ⅲ类账户开户链接功能.-问题原因分析-水平越权缺陷漏洞是...",
"author": "51Testing软件测试网",
"pubDate": "2022-10-12 12:01:01"
} }
], ],
"银行漏洞": [ "银行漏洞": [
{
"title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd91QfWQpjIAJaW83layKLh1VZ9Ren9N_a_qw0eNRcz9xLKKIPvb1DpvyT056VaMCnQSlpVQgbghkvpzWuvQrsVmO-XZvYY9YqB71UTGOX4OyMhI3ouZ9zqVGLmXj10loet697BoLLlj9xPR7jm1X_nC4V3Z5aqIlHSBlSccrJYSFiFW6cwuUnkdA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
"description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
"author": "新浪财经",
"pubDate": "2020-07-21 15:52:31"
},
{
"title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9AV_F105sXKjgUfWd9EmqhDVGAcOZQNrtdmc4FKRGLCWS6ht8l2LFworcfmUQz2BnDF95C3i8H5Kejta0fsV1i82R0iMHgu_JbmT0_g_Z_g_V3qvFdXJvNIRhBwsxNF5OSc5vrK2gY9-1-YbeklR9R24jz9oIVF96UWRhPGN-Og3yPfCoem7FzA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
"description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
"author": "纽扣资讯网",
"pubDate": "2018-08-21 19:29:05"
},
{ {
"title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?", "title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9mKT0DQUrRqb8BcrDQvD22xVFCARR8_K6I50421o4bAcZnvRX9hj5xKOp21ihQ9HwIYlgpdagvBTZEYVp7BXG5QjxFDC9Ay9DHpgaDCBRtfjFUj14VLWqrnrzNCe_28Plr-6K7gI13efqjXTDdMyazXrIMqaF5dAuwdDWgyumkZurCDCayYmfpA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9pzKu330fp4wKNvjCnpsTYJy_MYuu2jCD8DAS_luExtAWB1N6-Cxv3qasDw3uxHi0z8MjCNPczv36si2m__UqjpsfZTQNAbaoiYscmaVEzka-Nf0uOtaXOO83W4asiYuUGAW-rQuwk6eo8gpCckTFDmjFBvf9GaZ79Fhd4sLWmCqjotuuiAmOIg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...", "description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...",
"author": "测试届的LV", "author": "测试届的LV",
"pubDate": "2019-06-10 08:18:15" "pubDate": "2019-06-10 08:18:15"
}, },
{ {
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放", "title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9OmuA8nYXLl_VjNLyXI2_kJ_ks5sdQqCBdZiXwe9F99opJkuNWqfhwLKEF2Q3LuyRSkGRXZnlfpyBB44uHSCJP3HvTsDxvmULUiGUVubsRkMkclbVYcpqh7NROuOOJ0QaNQOhn797GvoF_efrh-HMTuJjFh_UReVfiwekxAFaKU7S-e4Yz84xMA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9yCKB9iwOJDtLWv88jWC4D3LqwHy7uz5eXXAi1F7RRhfTmxUGPHxNlpTpcgRBQ6HKHK5da9FY-PQYWsW6wwagjjDjk-whi91Qgy9WtCkxb-qLhZaY-aNqNZo-A-90R7nATCrHl4ejTzTSf1l1B9mwUO_aBLTc1iOYrXXwyxVEjXMHpHkoPMgL3A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...", "description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
"author": "外交之声", "author": "纽扣资讯网",
"pubDate": "2017-12-03 23:54:42" "pubDate": "2018-08-21 19:29:05"
},
{
"title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9S2Eo3tU5jDTsJukJn462S_znMvpv1N03eSCquBw8ozC8Kjf54NnFBVDNmKHvpWU6it1tMPJUFVFr6wPhORsG1k_s634cZg_uLnbgVKabqXTLbE4wqp2__wvLcYnsR06CLZyACeRIfcvYbg7zNe4M6Lq_CsIavlZKomCIJnR9itzS-e4Yz84xMA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
"description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...",
"author": "知书局",
"pubDate": "2023-02-03 18:20:39"
},
{
"title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9APYiJWUV4H41oWMpviG-HZ6bMVg6iRdy_BoZqPkzBppNsHIpxW_7G49KjyA544DK1KESybwIHl50tAWv7t_jRrvIAINcrVgCBdtrtaQIKeiJUZPlm81Aqp4eeoffWLdf8qpNKdHmDKUixC-Es5Bi4l63VEsuy28uLfl2uXEqlTwtPujwwRB2Pw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
"description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
"author": "澳网",
"pubDate": "2017-12-04 23:18:55"
},
{
"title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd95tXO73yUIYxpZ2N1p9_DUIKNVkmpnSvd8imVtUhsFBM6XxGXkSyVGsfCBxcCKfyVcL--c7airK9DR_ynKFfAnBmYaFvhbLNfWg8nCXKzDzWAy7mQPy7TyqemaN6lVxJf4FcA09tUflzsWhpSQ8DHs6MaSKbGNUUK5ShefSxN2yWrCDCayYmfpA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
"description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...",
"author": "火绒安全",
"pubDate": "2017-09-11 17:23:47"
}, },
{ {
"title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿", "title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9Q9y5NoSu3fPTEhbUtfboD7ffSVYQzD5XzTmaWk6LMtbVLPWKLJuIovkkYlwklEfVAhQ_pvTq3BZop9wivDl79SSTKmn6TMaFLi3h63AY09Mfo7PGnhHonJiKIwkGeuhUy45wB_CuIyhsAoANVt-rbrKh2kOI0XadFfa08WkRe1dCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd95i37lwf53KQXhIurbqJ78EwAthuML43VGgVJaQi0-yHjXSXQt6yNSFB9IXhZ2qRlx8h84Wk9DhG-65N7kylrgZSAS8EF4JoB7gLO8CtrkqAkUh-oIJhz2JFYUslUu5suP83v9EowWRAL3jlKxMCZS-F8OToB1kbJVAxZxwFsJHdQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...", "description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...",
"author": "灵枫历史阁", "author": "灵枫历史阁",
"pubDate": "2023-06-04 17:49:26" "pubDate": "2023-06-04 17:49:26"
}, },
{ {
"title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息", "title": "华裔女留学生发现银行漏洞消费超2千万 获无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd98QupOUv1qsdPWAzStrsMMAWaH52qDqvIZH4DqopbwqGNQqWLhSxHaFHSOYGXhaxGX0NO4_VkU17lBMRGQKgeEp0AqydnR5eWCoSyNrBy7-Qd92t1W3nkz-RLKevg22V7OgKHARff09PiWPNGQ5Ckqx92DyWf0nhV_TGp3flSWEEtPujwwRB2Pw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9Y9dzG87vgOnZ1Pc8kgUn4bOjDKoqa0WENxM-PZgqv19n30ZqfoqFybLK1SR7LYH-QCkY-6vQJJYQTF1vlweUrhn78sPKj2o_GrDfgQa25qzSTggfIFWslDhRkC_VjqvqrWlk0CAlCiFgyV5xySIl44uhYpsJDbjVNZWI5TFmlNCE8RsmObDbtQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...", "description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
"author": "城市知道温哥华", "author": "网易新闻客户端",
"pubDate": "2023-10-09 06:55:35" "pubDate": "2017-12-04 19:29:22"
}, },
{ {
"title": "这几种套现方式钻了银行漏洞!竟没有被封…", "title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9pHh2Wmpt9ARzRZOQ4kQsBr9f5x9ub8EW_b4f4oPihLb6_js2nXXjVYnVhhKQ1RIcJYX5xVspxXZljzj46SZxGoiBSvRN_Uuse5AlZlNMRAQaXUe7lZSpQNAWozonBknCJymElDf9IhohrWkle3_jtva3DRp0hY1_wUlrPsHMri0O8fIRwtipOg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9v5ehQ7aW1JrlZRA0hZQJXryemPyhOEIG8SsPkKVwA1sPvJD5lLpq7bzDWppkR171ixxIoa_DU8md1f4wjSote19_OcS3Nh9M6nZ0smXRixVcky8-IucQNTXYuUAh4dDsfikJaUblV14sI7zkCqc8NLDAAOczmKq7RstcmWk3oo5Cy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "不过随着银行监管越来越严,很多卡友也受到了处罚,卡姐有个朋友,堪称“套现小行家”,用信用卡套现了5万元.仍然在银行保持...", "description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
"author": "来谈钱", "author": "新浪财经",
"pubDate": "2024-03-17 18:02:42" "pubDate": "2020-07-21 15:52:31"
},
{
"title": "黑产利用光大银行漏洞,信用卡1万额度可提15万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9_l1Bjwrux0F8XX3ZwV0YGrjfAMzkM73UoJC81rUsfwUnC0L0pK2NGWNghIH-J-fYIncaKaBKcUsuIlpwk4-3jk4VToaA9SRp9Vr4XkwUF0LCcfIRH-kfYWOyUAhatvlV7uhKM-K6ewbGShFPW_aIOF1TAIpU4sbeTHGWMu-x92t5LU3lqtPw9g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...",
"author": "可转债摊大饼",
"pubDate": "2018-05-26 13:15:31"
},
{
"title": "卷!某银行漏洞管理平台投标限价1115万元,浪潮近半价拿下",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9ifWXEHUoNmfSyLSSYMdnbbqUPPxfMrR_HpEuKaBJKg8PTI9uoyQdisGi3AKbA0cCDIcz0fhIwhmPAuY_jwZcpmJUVzanQWGkl-1v7fBXZvYm5oOi6PffjcUvJJu5EaHf0qt35Qbl3EiiZ3DOOBA-0d2rsxJ5Q5UX7efkrvAUqVI6Ebq8fk9diw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "近期,农业发展银行采购漏洞管理平台,产品包括漏洞管理系统和漏洞扫描设备,投标限价1115万元,要求提供投标产品的同品牌同类...",
"author": "安知讯",
"pubDate": "2023-02-06 19:02:16"
},
{
"title": "六安徽商银行再爆监管漏洞!违规吸收存款,罚25万元!负责人被行政处罚!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9kcTUthZEfb8g-5IZT5zCoUSBUeJYC34rdFaDNYyJmAoXFUZ5CJ3JiX9xGPY5VnW5ScRIpQ68upf1GZG4zUK1E4hjcF9tu16epEQS3uFzQnI4_zOPR7F8DHn-d1o-hRu2S5LGk62RcNBRLRFf_9Xto_IOkkmAQabZ_B7BZGsB0cfm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "yuan元:银行漏洞百出,金融部门应该管管了.阿莫:金融行业的蛀虫,破坏金融秩序的健康发展...小龙:这样的人居然在银行担担当...",
"author": "六地品安",
"pubDate": "2018-10-25 14:25:30"
},
{
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9oW-h7ODZ-2qwX0zMPf7C6RCHPwN_SVrexdeJKTUt6u70a3A4YFjhJy2-ceZ6AezyCVa99sgWUSMG1BxjJXmQTC9necAA8QWQpGliM5Vh89nlmjp6vgvDSiKLTXkY9DkrRgWkt8QJ-tB-Ir1Q1eXP1H87FuOXldJ_GV0QQxjE3Dyq3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...",
"author": "外交之声",
"pubDate": "2017-12-03 23:54:42"
},
{
"title": "有钱没命花! 3名华人钻银行“漏洞” 获利千万美元  获刑82年!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9B4aKooqWHsSX8MfFu9KbHvc4fitnLtTm8fvOyPI9IxxpfezbeTUEo-5I1gXwlj2nzTlA7YViDnsYI3MiVnSH83UGdL_9nfZ5CnPFsoQNVHHv5gJHFUCJbKrvsffl30U9SZwi1LbYQp5Kjb6rwDDLFSiA5W18-Aksmk_8Z_sDxnoSYTqT4eyLmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "银行明明有时间差漏洞为什么不修补,这其实就是最基本的银行与客户间的信任与承诺,过去的几十年里,对于绝大多数客户来说,这...",
"author": "留学生公社",
"pubDate": "2023-11-18 18:00:57"
} }
], ],
"支付漏洞": [ "支付漏洞": [
{ {
"title": "天融信:《电子支付漏洞报告》重磅发布!", "title": "天融信:《电子支付漏洞报告》重磅发布!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9FUBZyclKJzppnNaqf7khdjN2uFFWHfgbNBdOgu0AN8ihhIt6jlxYIAfdwEtEIisenyuvTbHdcdeKraTPArwnRvdUl8X8l3-w9yRHMbKr4fggTEwaPw94-uJhrJA4TUne51gxQ7y3ZvPUmNwJBhhku3ozjPYjF0P0EAO3v4ygrI5f_71bqkOtiw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9OZBwVnf0OZvVkDThqmS0KvPYf9vd0fHL-1NzwpelId6ZjzS0XkOchUXb-1nTvzwUw2lXvVOhe6UnAbSqXsVbT7SxAOPamN2pIyS9f5HmkZ2B7S2a8JMXTvBYYErM7l8LyDqQEOuupqFCNfmVif-GnjgfY1u-EGPEyR6tmRvfLGcNGbbB75bUeA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...", "description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...",
"author": "天融信", "author": "天融信",
"pubDate": "2023-07-12 18:21:06" "pubDate": "2023-07-12 18:21:06"
}, },
{
"title": "利用支付漏洞套现1300万被判15年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9xVhy9OTbkCfriOx6asm8OI0Zz7zB6S7h4PmspIX-ELXRRItnAoXMaQqiw0cp712l9OfgbQAYlqPj6PNNoiSeUdw8ieX7_wJS6B1B78__qrNurVFEwTrUqaYDkICI5tBUigDFaP2EOvnbjOzn7p7X70NYaZvt_yv0dKGuPBDSWoXI3OTRHYU2og..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...",
"author": "支付百科",
"pubDate": "2022-01-03 13:54:08"
},
{ {
"title": "敏付科技存“支付漏洞”被约谈整改", "title": "敏付科技存“支付漏洞”被约谈整改",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9wTdzBee7O2k8ExqdT1_3DwxLFIkXB4nq_NSl0PP-0qdZpln2nQqS73ax1H0izCZZpiDwJy_4qu3VLt4sxF9ZkbXXuJwR9nNhFD2Na4dWNJViHoFAC3If4LRCqb7Xjl76KEa431KeeOyzy-v0h98AoGaiucgpGGmxViRxinjF30kO8fIRwtipOg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9mXuxCPlr9wuMG1zGFKYTVdQ6NbOgjV3V00dz2oMl86RWnpNZdq7Kx7bwuNXgqln9u0SXOIrj7gbeHDszmwhzqbV1lKylQ6RfvW3H0ycB_6keGoLVmFkX_AXTykKUvEAJQK3ft1pFVY_Vg6kFWy0wgJjjAXrkYVuU453FXdGyDT9Q_LeJW-Rhtg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...", "description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...",
"author": "支付之家网", "author": "支付之家网",
"pubDate": "2022-01-24 08:00:21" "pubDate": "2022-01-24 08:00:21"
}, },
{
"title": "银行卡免密支付漏洞这么大!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4VWBshEBEZNGVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xEh0WNyMn01OUafeHdhv3xxm4ND7NmPq0rxWvcsyGTHFX2cnH9ZxIeLdVgVH2XfGwiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
"author": "犀牛生意经",
"pubDate": "2016-08-29 09:23:44"
},
{
"title": "就一加手机支付漏洞讨论在线支付中的安全风险",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9Fh3XIYrMAGv8DFrr22hvP7lXc8UxwhPrmt35a3KpBu6ny2zYHVUy0fzTmouD28uKucdB59exCwtVCeimLs4dn2JPBUmulZbNTAP4G5_gOfeROuE4dn7-AsFFDT2rm6if8GuWvgfh537hfTvtwelqT145vXTrHh_vOI2oNCrthFf1AfaFW2DefQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
"author": "FreeBuf",
"pubDate": "2018-02-12 19:17:27"
},
{
"title": "渗透测试之支付逻辑漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9-x80KM2ExBnuTLaCGHND4pnodWQPfS713l4o4wsrc482IPoKr1Um2KX9oy-H2wZpAC0-bguM9a6wpsHEs_stwZG7Pnkd13W3NB_vEpmc18f1BCp1yUI62z4PnNuDyHfxooHtUBL1in2xBTkSI9l-62SJ8n7Ehs0wNlM8bWPSIzgtPujwwRB2Pw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
"description": "支付逻辑漏洞分类:1、支付过程中可直接修改数据包中的支付金额这种漏洞应该是支付漏洞中最常见的,主要针对支付宝等需要第三...",
"author": "黑白之道",
"pubDate": "2020-05-03 10:23:30"
},
{
"title": "从最近的微信支付看XXE漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9Fh3XIYrMAGv8DFrr22hvP7lXc8UxwhPrmt35a3KpBu6ny2zYHVUy0U6-iFffsFZZKupXLyrvXSi38ERphi-I1mL123iNJTqJhWIn1jLi70QHLrc8BXKqNIrYSDC3SuFj8sJ83EgOBAXVz9hZNxHvL8kNcXA2dk33zhfqYkx7ep0HpHkoPMgL3A..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
"description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
"author": "FreeBuf",
"pubDate": "2018-07-08 18:03:00"
},
{
"title": "逻辑漏洞 |支付漏洞学习",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9-x80KM2ExBnuTLaCGHND4pnodWQPfS713l4o4wsrc482IPoKr1Um2AwsjcBxBqzscxW4CeKA1NI3LGa8_-pH0OWAfBUFgUROSuQME650iJ_uW5kDB55_8B3mNJDsarqE8gTj1anAtfv-e87wRb4HTx-cwBXtHh5g2MqOsPA67Z_P28temKTOwg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
"description": "验证正常则对订单进行状态处理或为用户进行网站内入账等常见支付漏洞修改支付的价格支付三步曲 —— 订购、订单、付款三个步骤...",
"author": "黑白之道",
"pubDate": "2020-10-31 10:33:06"
},
{ {
"title": "手机支付漏洞已成盗刷之源!小编教你如何防范!", "title": "手机支付漏洞已成盗刷之源!小编教你如何防范!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4VWBshEBEZNGVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZlD7FXtCuDS0qTyAiA4AISYTHyEWhmWzDDHK2A0ycAz8fI_OPt2xV_kDfTq-aCI8LiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZDFs5gtIb2zRKTVklZSD7LN6AbwUzvZio_quACiFs8NLmD_Eh-Th7MpDZ-ixMe2dgiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...", "description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...",
"author": "电脑爱好者", "author": "电脑爱好者",
"pubDate": "2016-05-20 17:30:26" "pubDate": "2016-05-20 17:30:26"
}, },
{ {
"title": "微信支付惊曝安全漏洞!0元就能买买买!官方称已修复", "title": "从最近的微信支付看XXE漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9t2415XxXWeWOd4x_q4Bx7HW4iE_621bUVqharOs6i6Vxvo1sihAVLQvK-fjfhcVB9C52dIU_AwfKxoegUlNfKGEwxEw6U7bDVmOg8XeMLrwOfCCjfurTzWwSV4omaPjIUe2-hhV84SH5dSRcxu13q0EQODWQeoUJ2zwrKahfkUF5LU3lqtPw9g..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRChz8_pO8mtSkn9lXhXHUkYMYENsBFAw4MpbDSeZX0cZU1zR3nbXPtYia6L7-46xKO3KmNFRmSu32pWZ_YvGzlmU_R_rWuQm9uNSShFsfQZtiOAS1Eo5m1NxDdrgozfSg6bw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "陌陌的微信支付漏洞利用过程vivo的微信支付漏洞利用过程值得注意的是,目前漏洞的详细信息以及攻击方式已被公开,安全人员建议...", "description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
"author": "中国网", "author": "FreeBuf",
"pubDate": "2018-07-04 17:38:58" "pubDate": "2018-07-08 18:03:00"
},
{
"title": "支付漏洞:你可能收到了假微信转账",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDonBfgmHjxCOd5XAY1uNSeSCEkLPGf4cu3kGZpLvvkSCuHaUmcDkcnrwDQLZHUliJi-KdKemZNhbMwwfs2qZ-ey2WueZfM3Q2xvQYgxQa-wMRl520NthlI2CaKKPCpDZe-eWIvRYrW2ZNcTo3KmF86iEowge5WjG0YYa5AR-5kBvaRxFoZVxS3OmJechIZPIVjJajuUu5V_Us1XMZbTAxic6vsr67-iOh1v5FwtbFaAkiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "这一支付方式被别有用心的不法分子玩出了“新套路”.从事服装生意7年的晓雯,眼看“回头客”已将钱转至自己的微信上,谁知是...",
"author": "画乡之窗",
"pubDate": "2017-02-28 18:28:24"
},
{
"title": "就一加手机支付漏洞讨论在线支付中的安全风险",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRCh-L5VoC6JnrqApIEh_-2oIPZjtRsmX4pPhbTbM6tiyMB93hkLeBBYoEZOkmyt0NGPjZnp902yylFJvxWBnNXdCSxEFrHicHaEgf3IuPe41nQmxVL51aVjsJflztgI7RZ1g..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
"author": "FreeBuf",
"pubDate": "2018-02-12 19:17:27"
},
{
"title": "利用支付漏洞套现1300万被判15年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9NFACt4r9XtAYsMhQto1wHGOTujEotFi8vSykO0Z07Xs9-tfxZkeUpTcjypPGbjy1dzndMaxfsw-B9kMCysl9Q2JC1F-c4KWIii5atqTrR2E5H27QHHkcE0EslGSb2u3Sda0wOdznXVXGERgXa2BsvbMBN1ghMG_zS-JkohXtNAgY-UZGbO56rA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...",
"author": "支付百科",
"pubDate": "2022-01-03 13:54:08"
},
{
"title": "支付漏洞实战",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9Mhk1GjVLnS3VHON7gk3zpZbU9KmHHCJJLg47g3ZmcNtZwp5Wq-oGePXvAK5urD-4C4yk8q__JM5Jcdj-G0RjPcE93MwAKtCMZRGrluOMy6HFTdJK5HByXKYdciKZTBSxD8fZWRsvoT7OjCsM5Jo-FiA9YWwQV24IAKCjGJg0JjHS-e4Yz84xMA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "本文作者:Heart(Ms08067实验室 SRSP TEAM小组成员) 首先先了解支付漏洞:支付漏洞的理解通常都是篡改价格.比如,一分钱买...",
"author": "Ms08067安全实验室",
"pubDate": "2020-08-28 09:00:22"
},
{
"title": "银行卡免密支付漏洞这么大!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xoJoT7dq0ZINPpTcUcFfc5Yu3qxonRRd6dOgptLPH2lD_2VmKXtAg58IEiz6Zny7IiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
"author": "犀牛生意经",
"pubDate": "2016-08-29 09:23:44"
},
{
"title": "某小程序的支付漏洞+任意地址删除",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9AKiOW-WJ7zh0-bPf6gXkyGutYIrVVRNKhs5Zma6jodl3HgUbak8MkfEx6b8RQNbvd8Ml2TZMWJlGlNstepzq4wMfBNggnY_PHlanDvUbRD6Nm-vWZS8ZccVToRBI7HqsiJmSmiuTe5jjbPG3Qbk94xqlbuVgE15V_OmylOfgzc1hWLv6O878UA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...",
"author": "狐狸说安全",
"pubDate": "2023-09-14 14:25:44"
} }
] ]
} }

642
resources/JSON/uni_rss.json Normal file
View File

@ -0,0 +1,642 @@
[
{
"title": "老显卡福音美团开源首发INT8无损满血版DeepSeek R1",
"link": "https://tech.meituan.com/2025/03/07/meituan-int8-deepseek-r1.html",
"author": "美团技术团队",
"description": "DeepSeek R1模型权重原生为FP8类型仅能被英伟达新型GPU支持。美团技术团队进行了INT8精度量化的尝试量化后模型精度基本无损可部署到A100等其他型号GPU从而解锁了芯片限制相比BF16实现了50%的吞吐提升降低了推理成本。相关技术已在Hugging Face上开源。",
"published": "2025-03-07 08:00:00",
"source": "美团技术团队"
},
{
"title": "上下文感知的聚合页广告优化实践",
"link": "https://tech.meituan.com/2025/03/02/context-enhanced-learning-for-intelligent-marketing.html",
"author": "美团技术团队",
"description": "聚合页广告将商家和优惠信息以多种形式聚合展示给用户,是美团广告业务中一个重要的业务场景。本文从最能影响用户决策的“发券”和“排序”两个方向出发,介绍了上下文感知建模在广告场景的落地方案,证明了聚合页上下文感知的收益空间。希望能对从事相关研究的同学带来一些启发或帮助。",
"published": "2025-03-02 08:00:00",
"source": "美团技术团队"
},
{
"title": "行为正则化与顺序策略优化结合的离线多智能体学习算法",
"link": "https://tech.meituan.com/2025/02/21/marl-in-meituan.html",
"author": "美团技术团队",
"description": "离线多智能体强化学习MARL是一个新兴领域目标是在从预先收集的数据集中学习最佳的多智能体策略。随着人工智能技术的发展多智能体系统在诸如自动驾驶、智能家居、机器人协作以及智能调度决策等方面展现了巨大的应用潜力。但现有的离线MARL方法也面临很多挑战仍存在不协调行为和分布外联合动作的问题。为了应对这些挑战中山大学计算机学院、美团履约平台技术部开展了学术合作项目并取得了一些的成果希望分享给大家。",
"published": "2025-02-21 08:00:00",
"source": "美团技术团队"
},
{
"title": "预测技术在美团弹性伸缩场景的探索与应用",
"link": "https://tech.meituan.com/2025/02/14/prediction-technology-in-meituan-elastic-scaling.html",
"author": "美团技术团队",
"description": "在管理企业大规模服务弹性伸缩的场景下Web应用的负载时序数据分析和预测至关重要。然而由于应用的周期性特征和负载的复杂性寻找一种能够适应所有应用的预测模型成为了一项挑战。美团与中国人民大学信息学院柴云鹏教授团队展开了“预测技术在弹性伸缩场景的应用”科研合作取得了较好的成果。希望能给从事相关研究工作的同学带来一些帮助或启发。",
"published": "2025-02-14 08:00:00",
"source": "美团技术团队"
},
{
"title": "美团技术年货 | 600+页电子书,算法、工程、测试、数据、安全系列大合集",
"link": "https://tech.meituan.com/2025/01/16/2024-spring-festival-present.html",
"author": "美团技术团队",
"description": "值蛇年春节到来之际我们精选过去一年公众号30多篇技术文章和科研论文整理制作成一本600多页的电子书作为一份特别的新年礼物献给每一位热爱技术的你。愿大家乘风破浪勇往直前",
"published": "2025-01-16 08:00:00",
"source": "美团技术团队"
},
{
"title": "鸿蒙应用签名实操及机制探究",
"link": "https://tech.meituan.com/2025/01/06/openharmony.html",
"author": "美团技术团队",
"description": "本文对鸿蒙公开资料进行了深入分析和解读,梳理了鸿蒙单框架应用的签名机制,拆解每一步的实操过程和背后的实现原理,并对源码分析整理签名的校验机制。从中管中窥豹,探究鸿蒙系统的安全设计思路,希望能给从事鸿蒙研发的同学提供一些借鉴。",
"published": "2025-01-06 08:00:00",
"source": "美团技术团队"
},
{
"title": "2024 | 美团技术团队热门技术文章汇总",
"link": "https://tech.meituan.com/2024/12/26/2024-happy-new-year-top10.html",
"author": "美团技术团队",
"description": "本文整理了2024年美团技术团队最为热门的10篇技术文章这些文章覆盖了基础理论、数据存储、因果推断、搜索推荐、智能测试、知识图谱、领域驱动设计等多个技术领域期望这些精选内容能为大家带来一些启发或帮助。愿大家在新的一年里持续深耕技术沃土稳步前行不断攀登新的高峰。",
"published": "2024-12-26 08:00:00",
"source": "美团技术团队"
},
{
"title": "AutoConsisUI内容一致性智能检测",
"link": "https://tech.meituan.com/2024/11/21/autoconsis-ui-meituan.html",
"author": "美团技术团队",
"description": "美团到店研发平台质量工程部与复旦大学计算机学院周扬帆教授团队展开了大前端智能化测试领域的科研合作从UI界面内容一致性校验入手并实现了一套自动化智能检测流程相关论文被软件工程领域具有国际影响力的会议ICSE 2024CCF-A类会议的Software In Practice Track软件工程实践应用收录。",
"published": "2024-11-21 08:00:00",
"source": "美团技术团队"
},
{
"title": "CIKM 2024 | 美团技术团队精选论文解读",
"link": "https://tech.meituan.com/2024/10/31/cikm-2024-meituan.html",
"author": "美团技术团队",
"description": "本文精选了美团技术团队被 CIKM 2024 收录的 8 篇论文进行解读覆盖了自监督学习、解释生成、CTR预测、跨域推荐、向量召回、图像生成、时效预测等多个技术领域。这些论文有美团独立研究还有跟高校、科研机构合作的成果。希望能给从事相关研究工作的同学带来一些帮助或启发。",
"published": "2024-10-31 08:00:00",
"source": "美团技术团队"
},
{
"title": "大前端:如何突破动态化容器的天花板?",
"link": "https://tech.meituan.com/2024/10/18/recce-in-meituan.html",
"author": "美团技术团队",
"description": "长久以来,容器要实现动态化和双端复用,难免要牺牲掉一些性能。有没有办法让动态化容器的性能尽可能接近原生?美团金服大前端团队给出了一种解决方案,尝试突破动态化容器的天花板。",
"published": "2024-10-18 08:00:00",
"source": "美团技术团队"
},
{
"title": "僵尸网络911 S5的数字遗产",
"link": "https://blog.netlab.360.com/911s5/",
"author": "lvxing",
"description": "<h1 id=\"%E6%A6%82%E8%BF%B0\">&#x6982;&#x8ff0;</h1><p>2024&#x5e74;5&#x6708;29&#x65e5;&#xff0c;&#x7f8e;&#x56fd;&#x53f8;&#x6cd5;&#x90e8;&#x53d1;&#x5e03;&#x901a;&#x544a;&#xff0c;&#x58f0;&#x79f0;&#x5176;&#x6267;&#x6cd5;&#x6d3b;&#x52a8;&#x6467;&#x6bc1;&#x4e86;&quot;&#x53f2;&#x4e0a;&#x6700;&#x5927;&#x7684;&#x50f5;&#x5c38;&#x7f51;&#x7edc;&quot; 911 S5&#xff0c;&#x67e5;&#x5c01;&#x4e86;&#x76f8;&#x5173;&#x57df;&#x540d;</p>",
"published": "Fri, 14 Jun 2024 09:20:11 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Heads up! Xdr33, A Variant Of CIAs HIVE Attack Kit Emerges",
"link": "https://blog.netlab.360.com/headsup_xdr33_variant_of_ciahive_emeerges/",
"author": "Alex.Turing",
"description": "<h1 id=\"overview\">Overview</h1>\n<p>On Oct 21, 2022, 360Netlab&apos;s honeypot system captured a suspicious ELF file <code>ee07a74d12c0bb3594965b51d0e45b6f</code>, which propagated via F5 vulnerability with zero VT detection, our system observces that it communicates with IP <code>45.9.150.144</code> using SSL with <strong>forged Kaspersky certificates</strong>, this caught our attention. After further lookup,</p>",
"published": "Tue, 10 Jan 2023 14:00:37 GMT",
"source": "360 Netlab Blog"
},
{
"title": "警惕魔改后的CIA攻击套件Hive进入黑灰产领域",
"link": "https://blog.netlab.360.com/warning-hive-variant-xdr33-is-coming_cn/",
"author": "Alex.Turing",
"description": "<!--kg-card-begin: markdown--><h1 id=\"id\">&#x6982;&#x8ff0;</h1>\n<p>2022&#x5e74;10&#x6708;21&#x65e5;&#xff0c;360Netlab&#x7684;&#x871c;&#x7f50;&#x7cfb;&#x7edf;&#x6355;&#x83b7;&#x4e86;&#x4e00;&#x4e2a;&#x901a;&#x8fc7;F5&#x6f0f;&#x6d1e;&#x4f20;&#x64ad;&#xff0c;VT 0&#x68c0;&#x6d4b;&#x7684;&#x53ef;&#x7591;ELF&#x6587;&#x4ef6;<code>ee07a74d12c0bb3594965b51d0e45b6f</code>&#xff0c;&#x6d41;&#x91cf;&#x76d1;&#x63a7;&#x7cfb;&#x7edf;&#x63d0;&#x793a;&#x5b83;&#x548c;</p>",
"published": "Mon, 09 Jan 2023 03:13:20 GMT",
"source": "360 Netlab Blog"
},
{
"title": "快讯使用21个漏洞传播的DDoS家族WSzero已经发展到第4个版本",
"link": "https://blog.netlab.360.com/new-ddos-botnet-wszeor/",
"author": "Hui Wang",
"description": "<!--kg-card-begin: markdown--><h2 id=\"id\">&#x6982;&#x8ff0;</h2>\n<p>&#x8fd1;&#x671f;&#xff0c;&#x6211;&#x4eec;&#x7684;BotMon&#x7cfb;&#x7edf;&#x8fde;&#x7eed;&#x6355;&#x83b7;&#x5230;&#x4e00;&#x4e2a;&#x7531;Go&#x7f16;&#x5199;&#x7684;DDoS&#x7c7b;&#x578b;&#x7684;&#x50f5;&#x5c38;&#x7f51;&#x7edc;&#x5bb6;&#x65cf;&#xff0c;&#x5b83;&#x7528;&#x4e8e;DDoS&#x653b;&#x51fb;&#xff0c;&#x4f7f;&#x7528;&#x4e86;&#x5305;&#x62ec;SSH/Telnet&#x5f31;&#x53e3;</p>",
"published": "Wed, 07 Dec 2022 12:58:21 GMT",
"source": "360 Netlab Blog"
},
{
"title": "P2P Botnets: Review - Status - Continuous Monitoring",
"link": "https://blog.netlab.360.com/p2p-botnets-review-status-continuous-monitoring/",
"author": "360Netlab",
"description": "<h1 id=\"origins\">Origins</h1>\n<p>P2P networks are more scalable and robust than traditional C/S structures, and these advantages were recognized by the botnet authors early on and used in their botnets. In terms of time, <a href=\"https://en.wikipedia.org/wiki/Storm_botnet?ref=blog.netlab.360.com\">Storm</a>, which appeared in 2007, can be considered the progenitor of this area, when botnet threats were</p>",
"published": "Thu, 03 Nov 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "P2P 僵尸网络:回顾·现状·持续监测",
"link": "https://blog.netlab.360.com/p2p-botnet-monitor/",
"author": "360Netlab",
"description": "<!--kg-card-begin: markdown--><h1 id=\"id\">&#x7f18;&#x8d77;</h1>\n<p>P2P&#x7ed3;&#x6784;&#x7684;&#x7f51;&#x7edc;&#x6bd4;&#x4f20;&#x7edf;&#x7684;C/S&#x7ed3;&#x6784;&#x5177;&#x6709;&#x66f4;&#x597d;&#x7684;&#x53ef;&#x6269;&#x5c55;&#x6027;&#x548c;&#x5065;&#x58ee;&#x6027;&#xff0c;&#x8fd9;&#x4e9b;&#x4f18;&#x70b9;&#x5f88;&#x65e9;&#x5c31;&#x4e3a;botnet&#x7684;&#x4f5c;&#x8005;&#x6240;&#x8ba4;&#x8bc6;&#x5230;&#x5e76;&#x88ab;&#x7528;&#x5230;</p>",
"published": "Wed, 02 Nov 2022 03:11:33 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Fodcha Is Coming Back, Raising A Wave of Ransom DDoS",
"link": "https://blog.netlab.360.com/fodcha-is-coming-back-with-rddos/",
"author": "Alex.Turing",
"description": "<h1 id=\"background\">Background</h1>\n<p>On April 13, 2022, 360Netlab first disclosed the <code>Fodcha</code> botnet. After our article was published, Fodcha suffered a crackdown from the relevant authorities, and its authors quickly responded by leaving <code>&quot;Netlab pls leave me alone I surrender&quot;</code> in an updated sample.No surprise, Fodcha&apos;s authors</p>",
"published": "Mon, 31 Oct 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "卷土重来的DDoS狂魔Fodcha僵尸网络再次露出獠牙",
"link": "https://blog.netlab.360.com/ddosmonster_the_return_of__fodcha_cn/",
"author": "Alex.Turing",
"description": "<h1 id=\"%E8%83%8C%E6%99%AF\">&#x80cc;&#x666f;</h1>\n<p>2022&#x5e74;4&#x6708;13&#x65e5;&#xff0c;360Netlab&#x9996;&#x6b21;&#x5411;&#x793e;&#x533a;&#x62ab;&#x9732;&#x4e86;Fodcha&#x50f5;&#x5c38;&#x7f51;&#x7edc;&#xff0c;&#x5728;&#x6211;&#x4eec;&#x7684;&#x6587;&#x7ae0;&#x53d1;&#x8868;&#x4e4b;&#x540e;&#xff0c;Fodcha&#x906d;&#x53d7;&#x5230;&#x76f8;&#x5173;&#x90e8;&#x95e8;&#x7684;&#x6253;&#x51fb;&#xff0c;&#x5176;&#x4f5c;&#x8005;</p>",
"published": "Thu, 27 Oct 2022 02:49:26 GMT",
"source": "360 Netlab Blog"
},
{
"title": "PureCrypter is busy pumping out various malicious malware families",
"link": "https://blog.netlab.360.com/purecrypter-is-busy-pumping-out-various-malicious-malware-families/",
"author": "wanghao",
"description": "<p>In our daily botnet analysis work, it is common to encounter various loaders.Compared to other types of malware, loaders are unique in that they are mainly used to &quot;promote&quot;, i.e., download and run other malware on the infected machine. According to our observations, most loaders are</p>",
"published": "Mon, 29 Aug 2022 13:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "PureCrypter Loader持续活跃已经传播了10多个其它家族",
"link": "https://blog.netlab.360.com/purecrypter/",
"author": "wanghao",
"description": "<!--kg-card-begin: markdown--><p>&#x5728;&#x6211;&#x4eec;&#x7684;&#x65e5;&#x5e38;botnet&#x5206;&#x6790;&#x5de5;&#x4f5c;&#x4e2d;&#xff0c;&#x78b0;&#x5230;&#x5404;&#x79cd;loader&#x662f;&#x5e38;&#x4e8b;&#x3002;&#x8ddf;&#x5176;&#x5b83;&#x79cd;&#x7c7b;&#x7684;malware&#x76f8;&#x6bd4;&#xff0c;loader&#x7684;&#x7279;&#x6b8a;&#x4e4b;&#x5904;&#x5728;&#x4e8e;&#x5b83;&#x4e3b;&#x8981;&#x7528;&#x6765;&#x201c;&#x63a8;&#x5e7f;&#x201d;&#xff0c;</p>",
"published": "Mon, 29 Aug 2022 01:20:17 GMT",
"source": "360 Netlab Blog"
},
{
"title": "A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information",
"link": "https://blog.netlab.360.com/a-new-botnet-orchard-generates-dga-domains-with-bitcoin-transaction-information/",
"author": "daji",
"description": "<p>DGA is one of the classic techniques for botnets to hide their C2s, attacker only needs to selectively register a very small number of C2 domains, while for the defenders, it is difficult to determine in advance which domain names will be generated and registered.</p><p>360 netlab has long focused</p>",
"published": "Fri, 05 Aug 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "DGA家族Orchard持续变化新版本用比特币交易信息生成DGA域名",
"link": "https://blog.netlab.360.com/orchard-dga/",
"author": "daji",
"description": "<!--kg-card-begin: markdown--><p>DGA&#x662f;&#x4e00;&#x79cd;&#x7ecf;&#x5178;&#x7684;botnet&#x5bf9;&#x6297;&#x68c0;&#x6d4b;&#x7684;&#x6280;&#x672f;&#xff0c;&#x5176;&#x539f;&#x7406;&#x662f;&#x4f7f;&#x7528;&#x67d0;&#x79cd;DGA&#x7b97;&#x6cd5;&#xff0c;&#x7ed3;&#x5408;&#x7279;&#x5b9a;&#x7684;&#x79cd;&#x5b50;&#x548c;&#x5f53;&#x524d;&#x65e5;&#x671f;&#xff0c;&#x5b9a;&#x671f;&#x751f;&#x6210;&#x5927;&#x91cf;&#x7684;&#x57df;&#x540d;</p>",
"published": "Fri, 05 Aug 2022 03:31:07 GMT",
"source": "360 Netlab Blog"
},
{
"title": "公有云网络安全威胁情报202204",
"link": "https://blog.netlab.360.com/public-cloud-threat-intelligence-202204/",
"author": "360Netlab",
"description": "<!--kg-card-begin: markdown--><h2 id=\"id\">&#x6982;&#x8ff0;</h2>\n<!--kg-card-end: markdown--><blockquote>&#x672c;&#x6587;&#x805a;&#x7126;&#x4e8e;&#x4e91;&#x4e0a;&#x91cd;&#x70b9;&#x8d44;&#x4ea7;&#x7684;&#x626b;&#x63cf;&#x653b;&#x51fb;&#x3001;&#x4e91;&#x670d;&#x52a1;&#x5668;&#x603b;&#x4f53;&#x653b;&#x51fb;&#x60c5;&#x51b5;&#x5206;&#x6790;&#x3001;&#x70ed;&#x95e8;&#x6f0f;&#x6d1e;&#x53ca;&#x6076;&#x610f;&#x7a0b;&#x5e8f;&#x7684;&#x653b;&#x51fb;&#x5a01;&#x80c1;&#x3002;</blockquote><!--kg-card-begin: markdown--><ul>\n<li><a href=\"https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com\">360&#x9ad8;&#x7ea7;</a></li></ul>",
"published": "Wed, 11 May 2022 02:53:55 GMT",
"source": "360 Netlab Blog"
},
{
"title": "公有云网络安全威胁情报202203",
"link": "https://blog.netlab.360.com/public-cloud-threat-intelligence-202203/",
"author": "360Netlab",
"description": "<h3 id=\"-\">&#x6982;&#x8ff0;</h3><blockquote>&#x672c;&#x6587;&#x805a;&#x7126;&#x4e8e;&#x4e91;&#x4e0a;&#x91cd;&#x70b9;&#x8d44;&#x4ea7;&#x7684;&#x626b;&#x63cf;&#x653b;&#x51fb;&#x3001;&#x4e91;&#x670d;&#x52a1;&#x5668;&#x603b;&#x4f53;&#x653b;&#x51fb;&#x60c5;&#x51b5;&#x5206;&#x6790;&#x3001;&#x70ed;&#x95e8;&#x6f0f;&#x6d1e;&#x53ca;&#x6076;&#x610f;&#x7a0b;&#x5e8f;&#x7684;&#x653b;&#x51fb;&#x5a01;&#x80c1;&#x3002;</blockquote><ul><li><a href=\"https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com\">360&#x9ad8;&#x7ea7;</a></li></ul>",
"published": "Tue, 19 Apr 2022 02:24:17 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Fodcha, a new DDos botnet",
"link": "https://blog.netlab.360.com/fodcha-a-new-ddos-botnet/",
"author": "Hui Wang",
"description": "<h2 id=\"overview\">Overview</h2><p>Recently, CNCERT and 360netlab worked together and discovered a rapidly spreading DDoS botnet on the Internet. The global infection looks fairly big as just in China there are more than 10,000 daily active bots (IPs) and alsomore than 100 DDoS victims beingtargeted on a daily basis. We named</p>",
"published": "Wed, 13 Apr 2022 14:01:14 GMT",
"source": "360 Netlab Blog"
},
{
"title": "机器学习的逻辑回归模型",
"link": "https://paper.seebug.org/3303/",
"author": "",
"description": ".katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日\n1. 前言\n在「机器学习的线性回归模型」文章中我们学习了监督学习中如何使用线性回归模型拟合连...",
"published": "2025-03-13 15:37:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最憋屈的漏洞披露",
"link": "https://paper.seebug.org/3304/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/Y8-wT88VnLeMUiD-HssPyw\n在网络安全领域漏洞披露一直被视为保护用户的重要环节但在现实中这一过程却充满了争议和矛盾。究竟什么才算得上“负责任的披露”当厂商在信息公开和补丁发布上占据主导地位而安全研究者则需要耗费大量精力进行沟通与博弈这一模式是否还能真正实现保护用户安全的初衷...",
"published": "2025-03-12 16:28:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最“安全”的防线",
"link": "https://paper.seebug.org/3302/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/LaM5iz_EKbAK_lkaAcBshw\n在攻防对抗日益激烈的2024年安全软件一直被视为企业安全防线的重要基石。然而这些安全软件本身也可能存在漏洞甚至被攻击者利用作为入侵的跳板来对用户造成危害。多年来因为安全软件而导致的事故不禁让人产生一个疑问——安全软件真的可信吗\n安全软件被滥用为攻击工...",
"published": "2025-03-11 16:39:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最难以阻挡的攻防趋势",
"link": "https://paper.seebug.org/3301/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/lUA03YjBiCAatcJh-bUHEQ\n近年来漏洞攻防不断演进。从多年前仅需一个栈溢出就能攻破系统到如今需要运用各种精妙的手法来突破系统的层层防御。“盾”与“矛”始终处于动态对抗每当新的防御措施出现新的攻击手段随之而来。防御机制的升级促使攻击者寻找新的突破口而攻击方法的创新又推动着防御技术...",
"published": "2025-03-10 16:19:00",
"source": "知道创宇404实验室"
},
{
"title": "机器学习的线性回归模型",
"link": "https://paper.seebug.org/3300/",
"author": "",
"description": ".katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\n跟随着 ChatGPT 等大语言模型掀起的人工智能的浪潮,在这个时间点学习 A...",
"published": "2025-03-07 15:22:00",
"source": "知道创宇404实验室"
},
{
"title": "Llama 的悖论:深入探索 Llama.cpp 的堆迷宫,从堆溢出到远程代码执行",
"link": "https://paper.seebug.org/3299/",
"author": "",
"description": "作者Patrick Peng \n译者知道创宇404实验室翻译组\n原文链接https://retr0.blog/blog/llama-rpc-rce\n我一直对 Llama.cpp 情有独钟,它堪称我在人工智能与机器学习研究领域孜孜以求的“终极目标”。不仅如此,能在如此复杂且成熟的人工智能项目中挖掘出堆栈/堆溢出导致的远程代码执行漏洞,听起来就格外酷炫。当然,我内心深处渴望在人工智能项目中...",
"published": "2025-03-06 14:27:00",
"source": "知道创宇404实验室"
},
{
"title": "Emoji攻击增强针对Judge LLMs检测的越狱攻击",
"link": "https://paper.seebug.org/3297/",
"author": "",
"description": "作者Zhipeng Wei, Yuqi Liu, N. Benjamin Erichson\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2411.01077v2\n摘要\n越狱Jailbreaking技术可以欺骗大型语言模型LLMs使其生成受限制的输出从而构成严重威胁。其中一种防御方法是使用另一个 LLM 作为 Judge裁判来评估...",
"published": "2025-03-04 17:37:00",
"source": "知道创宇404实验室"
},
{
"title": "模型序列化攻击",
"link": "https://paper.seebug.org/3298/",
"author": "",
"description": "译者知道创宇404实验室翻译组\n原文链接https://github.com/protectai/modelscan/blob/main/docs/model_serialization_attacks.md\n机器学习ML模型是基于机器学习的应用程序的核心资产。安全地存储和检索模型对成功至关重要。根据使用的机器学习库模型可以以多种常见格式保存。流行的选择包括Pickle、HDF5...",
"published": "2025-03-04 15:09:00",
"source": "知道创宇404实验室"
},
{
"title": "关于 Chat Template 注入方式的学习",
"link": "https://paper.seebug.org/3296/",
"author": "",
"description": "作者: dawu@知道创宇404实验室\n日期: 2025年2月28日 \n1. 前言\n伴随着年后 DeepSeek R1 模型的火热,号称能运行 DeepSeek R1 “满血版” 的 Ktransformers 框架也受到了大量关注。在使用该框架和阅读相关源码时,我发现框架在借助聊天模版(chat template) 将用户输入转化为输入模型的 token 列表的过程中,可能会存在类似于拼...",
"published": "2025-03-03 14:35:00",
"source": "知道创宇404实验室"
},
{
"title": "从零开始搭建:基于本地 DeepSeek 的 Web 蜜罐自动化识别",
"link": "https://paper.seebug.org/3295/",
"author": "",
"description": "作者wh0am1i@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\npocsuite3 框架可以通过 --dork 或 --dork-zoomeye 参数获取 ZoomEye 网络空间测绘平台的搜索引擎数据。但随着近几年网络空间领域的攻防对抗升级导致网络空间中存在大量的蜜罐。为了过滤掉这些蜜罐ZoomEye 中加入了自动标注蜜罐的识别算法, 同时 pocsuite3 ...",
"published": "2025-02-28 14:18:00",
"source": "知道创宇404实验室"
},
{
"title": "DeepSeek 启示:深度揭秘基于 PTX 的 GPU 底层优化技术",
"link": "https://paper.seebug.org/3294/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/FVVes7UIK_OORUk3fXy9mQ\n一、概述\n近日DeepSeek连续不断地开源了多个项目一时间引发了关于GPU底层优化的热潮这在如今国内算力被广泛打压的背景下给我国在现代高性能计算HPC和人工智能AI领域带来了希望其中尤其引人瞩目的是关于底层PTX优化技术引入这在一定程度...",
"published": "2025-02-27 15:24:00",
"source": "知道创宇404实验室"
},
{
"title": "银狐突袭DeepSeek本地化部署暗藏“致命陷阱”",
"link": "https://paper.seebug.org/3293/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/VUzwaR7eti2YoNebGFz80A\n一、前言\n近期国产大模型DeepSeek凭借其高效的推理能力、创新性的优化技术、低门槛本地化部署能力、灵活的开源商业授权等迅速成为开源生态中的“现象级选手”。然而技术普及的加速期往往伴随着网络安全攻防对抗的升级。当前大量政府、企业和个人开发者在基于D...",
"published": "2025-02-27 10:47:00",
"source": "知道创宇404实验室"
},
{
"title": "使用 DeepSeek-R1 在固件漏洞挖掘领域的新实践",
"link": "https://paper.seebug.org/3292/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/rZ4iGXs2O_xYD1yEOyu3CQ\n1. 前言\n在数字化时代固件是硬件设备的核心软件组件直接控制着硬件的运行状态和功能其安全性至关重要。一旦固件存在安全漏洞黑客即可利用来攻击设备的运行或者控制设备发起其它网络攻击典型有Mirai病毒利用设备固件漏洞发起大规模的分布式拒绝服务。因此挖...",
"published": "2025-02-26 15:20:00",
"source": "知道创宇404实验室"
},
{
"title": "Fuzz 工作流解析与 AI 引入方案分享",
"link": "https://paper.seebug.org/3291/",
"author": "",
"description": "作者ghost461@知道创宇404实验室\n时间2025年2月26日\n本文为知道创宇404实验室内部分享沙龙“404 Open Day”的议题内容作为目前团队AI安全研究系列的一部分分享出来与大家一同交流学习。\n1. 概述\n本文受 Google 安全博客的《Leveling Up Fuzzing: Finding more vulnerabilities with AI》启发结合自...",
"published": "2025-02-26 14:10:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最悲剧的后门",
"link": "https://paper.seebug.org/3290/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/BZtSTpTQbNiAY_KDhnqc8Q\n“看到了软件的源码就意味着没有后门吗”\n1983年的图灵奖颁奖仪式上Ken Thompson抛出了这个问题。作为历史上唯三在40岁以下获得图灵奖的传奇之一他在获奖演讲中向听众展示了如何通过在编译器中植入后门来骇入由无害源码编译得到的Unix系统。Ken...",
"published": "2025-02-25 17:17:00",
"source": "知道创宇404实验室"
},
{
"title": "AI 帮你高效构建代码安全策略【大模型应用实践系列四】",
"link": "https://security.tencent.com/index.php/blog/msg/213",
"author": "",
"description": "腾讯啄木鸟代码安全团队依托混元大模型的超强代码理解和安全分析能力在SQL注入威胁检测场景验证中新增识别上百个漏洞检测策略相比传统方法人效比提升3.8倍在Github高star项目上斩获10+0day漏洞。",
"published": "2025-01-08 10:26:57",
"source": "腾讯安全响应中心"
},
{
"title": "AI猎手我们用大模型挖到了0day漏洞【大模型应用实践系列三】",
"link": "https://security.tencent.com/index.php/blog/msg/212",
"author": "",
"description": "AI版“赏金猎人”登场基于混元大模型能力打造的自动漏洞挖掘工具7*24小时自动感知、追踪、挖橱0day。 AI猎人VS黑客的角逐战正式开始。",
"published": "2025-01-03 10:23:17",
"source": "腾讯安全响应中心"
},
{
"title": "AI助力明文密码泄漏无处遁形【大模型应用实践系列二】",
"link": "https://security.tencent.com/index.php/blog/msg/211",
"author": "",
"description": "本文聚焦于密钥硬编码的问题,分析了传统检测策略的缺陷,并详细介绍了大模型在该场景下的优势、检测实施方案和效果。我们将继续推出更多关于大模型在研发安全、网络安全、威胁情报等领域的应用探索与总结",
"published": "2024-12-05 17:14:13",
"source": "腾讯安全响应中心"
},
{
"title": "大模型应用实践AI助力Code Review安全漏洞发现",
"link": "https://security.tencent.com/index.php/blog/msg/210",
"author": "",
"description": "借助混元大模型腾讯啄木鸟代码安全团队在代码评审Code Review下文简称CR场景下的安全漏洞检出能力取得显著提升日均发现和阻断300+个代码安全风险,极大提升了公司核心数据资产安全性。",
"published": "2024-11-27 10:39:46",
"source": "腾讯安全响应中心"
},
{
"title": "警惕Hugging Face开源组件风险被利用于大模型供应链攻击",
"link": "https://security.tencent.com/index.php/blog/msg/209",
"author": "",
"description": "著名AI社区Hugging Face开源组件datasets存在不安全特性可引发供应链后门投毒攻击风险。",
"published": "2023-11-03 14:00:00",
"source": "腾讯安全响应中心"
},
{
"title": "虚拟货币挖矿检测与防御",
"link": "https://security.tencent.com/index.php/blog/msg/208",
"author": "",
"description": "从流量和主机层入手,分析挖矿木马的防御之策。",
"published": "2021-11-18 18:00:58",
"source": "腾讯安全响应中心"
},
{
"title": "安全通知NPM官方仓库遭遇coa等恶意包投毒攻击",
"link": "https://security.tencent.com/index.php/blog/msg/207",
"author": "",
"description": "腾讯洋葱入侵检测系统发现开源软件沙箱主机出现异常行为跟进发现npm官方仓库的coa、rc被投毒攻击已经在腾讯软件源紧急拦截相关版本。目前npm官方仓库已将相应版本的恶意包删除但由于国内开源镜像站均同步npm官方仓库且存在缓存所以恶意包还可能通过各个开源镜像站影响广大用户。",
"published": "2021-11-05 21:31:07",
"source": "腾讯安全响应中心"
},
{
"title": "云原生安全攻防使用eBPF逃逸容器技术分析与实践",
"link": "https://security.tencent.com/index.php/blog/msg/206",
"author": "",
"description": "在新版本容器运行时中适用的攻击手法,并使用新方式把“任意文件写”转化为“远程代码执行”。",
"published": "2021-11-03 18:56:37",
"source": "腾讯安全响应中心"
},
{
"title": "Ghostscript沙箱绕过(CVE-2021-3781)分析",
"link": "https://security.tencent.com/index.php/blog/msg/205",
"author": "",
"description": "完整分析从ImageMagick到Ghostscript的攻击利用链",
"published": "2021-10-29 18:40:35",
"source": "腾讯安全响应中心"
},
{
"title": "实时中文语音克隆——开源项目MockingBird体验",
"link": "https://security.tencent.com/index.php/blog/msg/204",
"author": "",
"description": "5秒内克隆生成任意声音以语音克隆开源项目MockingBird为例看AI项目面临的安全风险",
"published": "2021-10-27 22:06:51",
"source": "腾讯安全响应中心"
},
{
"title": "关于BGP那些事儿",
"link": "https://security.tencent.com/index.php/blog/msg/203",
"author": "",
"description": "这是Facebook创立以来最严重的一次网络访问事故在这起故障中我们又看到了BGP的身影",
"published": "2021-10-19 18:10:52",
"source": "腾讯安全响应中心"
},
{
"title": "红蓝对抗之隐蔽通信应用及防御",
"link": "https://security.tencent.com/index.php/blog/msg/202",
"author": "",
"description": "腾讯蓝军和红军十多年案例经验、总结沉淀",
"published": "2021-09-27 16:40:43",
"source": "腾讯安全响应中心"
},
{
"title": "Web应用组件自动化发现的探索",
"link": "https://security.tencent.com/index.php/blog/msg/201",
"author": "",
"description": "另一种方式的指纹识别",
"published": "2021-09-17 19:30:59",
"source": "腾讯安全响应中心"
},
{
"title": "云原生——容器和应用安全运营实践思考",
"link": "https://security.tencent.com/index.php/blog/msg/200",
"author": "",
"description": "从安全攻击面出发,以防御视角分享我们在云原生安全运营上的一些实践和思考",
"published": "2021-09-07 18:00:59",
"source": "腾讯安全响应中心"
},
{
"title": "自动化数据分析下的威胁发现",
"link": "https://security.tencent.com/index.php/blog/msg/199",
"author": "",
"description": "企业防御之安全运营数据分析",
"published": "2021-08-16 18:41:00",
"source": "腾讯安全响应中心"
},
{
"title": "可信安全网络 —— 安全左移之DDoS对抗",
"link": "https://security.tencent.com/index.php/blog/msg/198",
"author": "",
"description": "DDoS对抗新思路",
"published": "2021-07-28 18:13:13",
"source": "腾讯安全响应中心"
},
{
"title": "攻防启示Chromium组件风险剖析与收敛",
"link": "https://security.tencent.com/index.php/blog/msg/197",
"author": "",
"description": "Chromium内核的安全问题早已悄无声息地牵动着互联网生活方方面面。基于对实战经历的复盘本文将从Chromium架构及安全机制概况入手剖析Chromium组件在多场景下给企业带来的安全风险并一探收敛方案。",
"published": "2021-07-15 10:30:58",
"source": "腾讯安全响应中心"
},
{
"title": "腾讯 SOAR 的安全运营探索",
"link": "https://security.tencent.com/index.php/blog/msg/196",
"author": "",
"description": "与业界先行者相比,我们数据面板、剧本等平台功能方面仍有一些差距,未来也会持续建设",
"published": "2021-07-09 17:55:48",
"source": "腾讯安全响应中心"
},
{
"title": "警惕!这种新型挖矿可能盯上你主机",
"link": "https://security.tencent.com/index.php/blog/msg/195",
"author": "",
"description": "除了门罗币这种不消耗CPU资源的虚拟货币可能成为黑产的新宠儿提前预知方能不乱阵脚。",
"published": "2021-07-01 20:27:10",
"source": "腾讯安全响应中心"
},
{
"title": "腾讯自研HIDS「洋葱」后台上云架构演进实践",
"link": "https://security.tencent.com/index.php/blog/msg/194",
"author": "",
"description": "云计算时代,洋葱拥抱云原生方案实践,希望能为大家系统上云提供参考。",
"published": "2021-06-17 18:16:08",
"source": "腾讯安全响应中心"
},
{
"title": "荣誉 | 美团SRC2024年终奖励荣耀揭晓",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493717&idx=1&sn=fe94bf647a29fff908cc7ed29b70554c&chksm=ec180986db6f80904efbb237256479db8ebb60e2521763cbbb272c604f641c3549211606bcc5&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "向每一位守护者致敬!",
"published": "2025-01-17 18:01:00",
"source": "微信公众号"
},
{
"title": "美团SRC邀您领取新年礼盒啦",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493717&idx=2&sn=f317d3190e4e199c933d1b29fa2f2d94&chksm=ec180986db6f809093c190d72edcad5b3b289422052597427f2eeb42ea44a93a729aff84a87c&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "获取方式见文中。",
"published": "2025-01-17 18:01:00",
"source": "微信公众号"
},
{
"title": "鸿蒙应用签名实操及机制探究",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493695&idx=1&sn=89a37bdee61841877d1acf28b8a68cbf&chksm=ec1809ecdb6f80faccbf32d3be7076832bfb6b0d443881e05d93cac96cecaad3952bdf8fba50&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "本文对鸿蒙公开资料进行了深入分析和解读,梳理了鸿蒙单框架应用的签名机制,拆解每一步的实操过程和背后的实现原理,并对源码分析整理签名的校验机制。",
"published": "2024-12-31 10:01:00",
"source": "微信公众号"
},
{
"title": "白帽世界大会 | 美团SRC期待与您在澳门相见",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493590&idx=1&sn=0281d8d3faa07d26a91b338102cb7c61&chksm=ec180605db6f8f138853b493e0e34cf24d9ccc265a72fc721fba5cfbd25c0854f757b3cd0e16&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "HackProve World 2025用真正的技术验证数字世界的安全。",
"published": "2024-12-19 17:31:00",
"source": "微信公众号"
},
{
"title": "年末冲刺2024漏洞马拉松『美团站』正式启动",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493372&idx=1&sn=f8ed6cc9dc514805d164f9d47277e8f5&chksm=ec18072fdb6f8e39c609c95ac1b0aba49aa2e9f70246d4c7af7ce82ca6d40ee9caa7fef0e362&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间即日起至2024年12月15日。",
"published": "2024-12-03 18:30:00",
"source": "微信公众号"
},
{
"title": "活动|短视频激励系统专测开启!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493353&idx=1&sn=60d8aea7934fa17d1e2077e2b879d3ae&chksm=ec18073adb6f8e2cdb2c0881302bcad6094724119dd5f6d5e0ecccc18fc1e2323067d6d00593&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间11月25日-11月28日",
"published": "2024-11-25 10:00:00",
"source": "微信公众号"
},
{
"title": "活动美团SRC七周年多重惊喜派送中",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493342&idx=1&sn=5aadfd7e004ccab04ad3286741aeca6f&chksm=ec18070ddb6f8e1b739a0a4e922e09723ce21d5d296c78c97d8c69a515bcf67f4c84e27e7972&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间11月11日10: 00-11月18日0: 00",
"published": "2024-11-11 10:08:00",
"source": "微信公众号"
},
{
"title": "活动正式开启美团SRC邀您加入双11安全保卫战",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493302&idx=1&sn=38e8eb7b46ba68d83932055efcf06386&chksm=ec180765db6f8e73f7e8e9039563065a99de826daeafcb49ee5b0231e48816907e306d43fe1c&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "美团SRC活动时间2024.09.19-09.30",
"published": "2024-09-18 19:36:05",
"source": "微信公众号"
},
{
"title": "你的中秋福利已上线美团SRC预祝各位中秋佳节愉快",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493276&idx=1&sn=02f5b0a74938d0be8764ba9658a0c98e&chksm=ec18074fdb6f8e593725883103e1ae90af22dda6af3e178d008da8c28713a6d0ba252605396e&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "兑换时间9月5日18:00起。",
"published": "2024-09-05 11:42:42",
"source": "微信公众号"
},
{
"title": "美团安全25届秋招启动心动offer等你拿",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493276&idx=2&sn=ca4080f1e1607bb22730e538f02ea6a0&chksm=ec18074fdb6f8e5920d56d573dd6c838afb76315ebd36dc1f113f5a747fdf584302ecd8faf0b&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "网申时间即日起至2024年10月31日。",
"published": "2024-09-05 11:42:42",
"source": "微信公众号"
},
{
"title": "美团安全亮相KCon 2024分享RDI技术新视角",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493266&idx=1&sn=148ab2c53446796b415384e9fd0dbaf2&chksm=ec180741db6f8e572f536ff844ca8d39d378c9d8a24b6cdbaaad31101f21175ab9637b7f578d&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "RDI技术以其高效和隐蔽的特性在恶意代码开发中占据了不可替代的地位尤其是在现代C2架构中发挥着关键作用。",
"published": "2024-09-04 10:27:03",
"source": "微信公众号"
},
{
"title": "美团安全25届秋招启动心动offer等你拿",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493248&idx=1&sn=74436f59fe2d7b203814c0aa0c91800a&chksm=ec180753db6f8e45010393fcad6b673a46c7db73b98e93dbdff667495e798104c8ec3b8345b8&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "网申时间即日起至2024年10月31日。",
"published": "2024-08-28 10:27:44",
"source": "微信公众号"
},
{
"title": "美团安全团队在第五期移动互联网APP产品安全漏洞技术沙龙中分享移动应用自动化安全实践历程",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493233&idx=1&sn=fcbc3a07cee5cf64e3c6b24925e2bd46&chksm=ec1807a2db6f8eb4f9e072ab8c517a39542fe6943b282abfc2271cd3ac558ac504c019e15748&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-08-20 14:21:24",
"source": "微信公众号"
},
{
"title": "新机会,新挑战,新可能,美团信息安全部邀你加入~",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493119&idx=1&sn=ce5d6f489f9d802e5ff5075d90c1ca17&chksm=ec18042cdb6f8d3a4e15bdc3051d92275f75a65008e0b8ce8f0a67746aa967ad5e8cdd1be831&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "欢迎向我们投递简历或推荐身边朋友投递简历!",
"published": "2024-07-29 14:37:08",
"source": "微信公众号"
},
{
"title": "活动 | 开店宝专测已开启,邀你参加!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493104&idx=1&sn=3f5514acce114a1dfeb40fbba5738023&chksm=ec180423db6f8d356d65dc19e7934dca55a1fb1c9ff7b8428f7962b13e552a13af3920ba89b0&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间6月24日—6月30日",
"published": "2024-06-24 10:06:08",
"source": "微信公众号"
},
{
"title": "美团安全团队携议题亮相CSOP大会共探网络安全高效运营之道",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493090&idx=1&sn=8b1c7315ef4ae4b2331c0f75d181825e&chksm=ec180431db6f8d27893e8aa04f4f005c2dfa6ce34ad5d62215a6ce17fe070977e33e213ec309&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "议题聚焦于SOC平台的构建历程从概念的萌芽到实践的落地再到不断的优化升级各阶段进行深入探讨。",
"published": "2024-05-17 18:54:11",
"source": "微信公众号"
},
{
"title": "招聘 | 美团安全实习生招聘正在进行中",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493059&idx=1&sn=362fa696530db9493fa8c165e6f64e6b&chksm=ec180410db6f8d06d8e74196d9ef89d31c92ce0964c8fddc638fe17e2642ff0b9806086b55e5&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "一起成长一起BETTER",
"published": "2024-05-07 17:27:47",
"source": "微信公众号"
},
{
"title": "活动 | 优选专测,提供测试账号,速来!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493041&idx=1&sn=daf61012fec9f3aa6fd227dd1f39b828&chksm=ec180462db6f8d74fdff596bd8b60fab42607b31db7c8a820b9a1007af9036c59da29cc74151&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "4月23日至4月30日000邀你参与优选业务专测",
"published": "2024-04-23 09:56:55",
"source": "微信公众号"
},
{
"title": "特别漏洞奖励,祝你挖洞把把都超神~",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493024&idx=1&sn=c0b762ef29c35ece879f1fdb7560c710&chksm=ec180473db6f8d65ce15c48fdcd8ef0c2525421c8f95a70f6cb7f7d282ccc304faf03ac0c8a8&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-03-26 19:58:18",
"source": "微信公众号"
},
{
"title": "3倍活动戳这里",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493024&idx=2&sn=9ca5dd0591b7ffb8dd9cbd166d94826d&chksm=ec180473db6f8d65e4e4b185143fe292dc4aac665b4ae9e5607d14a79213d690aec68dce3daa&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-03-26 19:58:18",
"source": "微信公众号"
}
]

View File

Binary file not shown.

86
spider/uni.py Normal file
View File

@ -0,0 +1,86 @@
import feedparser
import json
from datetime import datetime, timezone, timedelta
from loguru import logger
import yaml
def fetch_rss_data(feed_urls, wechat_urls):
all_entries = []
# 处理通用 RSS 链接
for rss_url in feed_urls:
source, url = rss_url.split('|')
feed = feedparser.parse(url)
for entry in feed.entries:
entry_data = {
'title': entry.get('title', ''),
'link': entry.get('link', ''),
'author': entry.get('author', ''),
'description': entry.get('summary', ''),
'published': entry.get('published', ''),
'source': source.strip()
}
# 处理 published 字段
if entry_data['published']:
try:
# 尝试解析 published 字段
dt = datetime.strptime(entry_data['published'], '%a, %d %b %Y %H:%M:%S %z')
dt_china = dt.astimezone(timezone(timedelta(hours=8)))
entry_data['published'] = dt_china.strftime('%Y-%m-%d %H:%M:%S')
except ValueError:
# 如果解析失败,直接使用 published 字段
pass
all_entries.append(entry_data)
# 处理微信 RSS 链接
for wx_url in wechat_urls:
author, url = wx_url.split('|')
feed = feedparser.parse(url)
for entry in feed.entries:
entry_data = {
'title': entry.get('title', ''),
'link': entry.get('link', ''),
'author': author.strip(), # 使用 YAML 文件中指定的作者名
'description': entry.get('summary', ''),
'published': entry.get('published', ''),
'source': '微信公众号'
}
# 处理 published 字段
if entry_data['published']:
try:
# 尝试解析 published 字段
dt = datetime.strptime(entry_data['published'], '%a, %d %b %Y %H:%M:%S %z')
dt_china = dt.astimezone(timezone(timedelta(hours=8)))
entry_data['published'] = dt_china.strftime('%Y-%m-%d %H:%M:%S')
except ValueError:
# 如果解析失败,直接使用 published 字段
pass
all_entries.append(entry_data)
return all_entries
def save_to_json(data, filename):
with open(filename, 'w', encoding='utf-8') as f:
json.dump(data, f, ensure_ascii=False, indent=4)
logger.info(f"通用爬虫数据已保存到 {filename}")
def uni_spider():
# 读取 links.yaml 文件
with open('./config/uni_rss.yaml', 'r', encoding='utf-8') as f:
links = yaml.safe_load(f)
feed_urls = links.get('link', [])
wechat_urls = links.get('wechat', [])
# 获取 RSS 数据
rss_data = fetch_rss_data(feed_urls, wechat_urls)
# 保存到 JSON 文件
save_to_json(rss_data, './resources/JSON/uni_rss.json')
if __name__ == "__main__":
uni_spider()

13
test.py Normal file
View File

@ -0,0 +1,13 @@
import feedparser
feed_url = "https://security.tencent.com/index.php/feed/blog/0"
feed = feedparser.parse(feed_url)
for entry in feed.entries:
print(entry.title)
print(entry.link)
print(entry.id)
print(entry.summary)
print(entry.id)
# 打印所有属性,找出正确的日期字段名
# print(entry.keys())