添加洞见/安全客/嘶吼相关推送程序,程序初步可运行

This commit is contained in:
MasonLiu 2024-12-04 00:08:44 +08:00
parent b2305c8473
commit 4fd7341bcc
16 changed files with 359 additions and 64 deletions

35
Core.py
View File

@ -2,11 +2,27 @@ import signal
from datetime import datetime
import sys
import time
from SendBot import SendToFeishu
import yaml
# from SendBot import SendToFeishu
from media.common import run
from media.freebuf import freebuf_main
from media.xianzhi import xianzhi_main
from GotoSend_4hou import Src_4hou
from GotoSend_anquanke import Src_anquanke
from GotoSend_doonsec import Src_doonsec
# 加载参数
def get_params():
with open('./config.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file)
sleep_time = f"{config['sleep_time']}"
s_hour = int(f"{config['s_hour']}")
e_hour = int(f"{config['e_hour']}")
c_hour = int(f"{config['c_hour']}")
return sleep_time, s_hour, e_hour, c_hour
sleep_time, s_hour, e_hour, c_hour = get_params()
def crab_job():
print("正在启动各爬虫并获取资源中...")
@ -14,6 +30,11 @@ def crab_job():
xianzhi_main()
freebuf_main()
def send_job():
Src_4hou(s_hour, e_hour)
Src_anquanke(s_hour, e_hour)
Src_doonsec(s_hour, e_hour)
def signal_handler(sig, frame):
print("接收到退出信号,程序即将退出...")
sys.exit(0)
@ -28,16 +49,20 @@ def main_loop():
# 获取当前时间
now = datetime.now()
# 检查是否为特定时间点
if now.hour == 11 and now.minute == 5:
if now.hour == c_hour and now.minute == 5:
crab_job()
send_job()
print("执行完毕,等待下一次执行...")
else:
print("正在等待执行...")
time.sleep(35) # 每隔35秒执行一次
pass
# print("正在等待执行...")
# print("等待间隔:", int(sleep_time))
time.sleep(int(sleep_time)) # 每隔35秒执行一次
except Exception as e:
print(f"发生错误: {e} ,程序已暂停")
SendToFeishu(f"发生错误: {e} ,程序已退出", "报错信息")
# SendToFeishu(f"发生错误: {e} ,程序已退出", "报错信息")
exit()
if __name__ == "__main__":
print("程序正在运行当中。")
main_loop()

View File

@ -66,17 +66,15 @@ def get_4hou_json():
return total_data
def query_articles_within_time_range():
def query_articles_within_time_range(s_hour, e_hour):
conn = sqlite3.connect('./db/4hou.db')
cursor = conn.cursor()
# 获取当前日期和时间
now = datetime.now()
# 计算前一天11点的时间
start_time = datetime(now.year, now.month, now.day, 11) - timedelta(days=1)
start_time = datetime(now.year, now.month, now.day, s_hour) - timedelta(days=1)
# print(start_time)
# 计算当日11点的时间
end_time = datetime(now.year, now.month, now.day, 11)
end_time = datetime(now.year, now.month, now.day, e_hour)
# print(end_time)
# 查询指定时间段内的数据
@ -105,7 +103,7 @@ def get_filtered_articles(entries):
return result
def Src_4hou():
def Src_4hou(s_hour, e_hour):
if not os.path.exists('./db/4hou.db'):
# 创建数据库和表
create_database()
@ -120,7 +118,7 @@ def Src_4hou():
insert_data(M_4hou_data)
# 查询指定时间段内的数据
filtered_articles = query_articles_within_time_range()
filtered_articles = query_articles_within_time_range(s_hour, e_hour)
# print(filtered_articles)
if filtered_articles:
@ -133,4 +131,4 @@ def Src_4hou():
# print(results)
if __name__ == "__main__":
Src_4hou()
Src_4hou(11, 11)

127
GotoSend_anquanke.py Normal file
View File

@ -0,0 +1,127 @@
import json
import sqlite3
import os
from datetime import datetime, timedelta
from SendBot import SendToFeishu
def create_database():
conn = sqlite3.connect('./db/anquanke.db')
cursor = conn.cursor()
cursor.execute('''CREATE TABLE IF NOT EXISTS articles (
id INTEGER PRIMARY KEY AUTOINCREMENT,
title TEXT,
guid TEXT,
source TEXT,
description TEXT,
pubDate DATETIME,
author TEXT
)''')
conn.commit()
conn.close()
def insert_data(data):
conn = sqlite3.connect('./db/anquanke.db')
cursor = conn.cursor()
for entry in data:
cursor.execute('''
INSERT INTO articles (title, guid, source, description, pubDate, author)
VALUES (?, ?, ?, ?, ?, ?)
''', (entry['title'], entry['guid'], entry['source'], entry['description'], entry['pubDate'], entry['author']))
conn.commit()
conn.close()
def get_anquanke_json():
# 检查文件是否存在
if not os.path.exists('./JSON/anquanke.json'):
raise FileNotFoundError(f"anquanke.json文件不存在请检查程序是否运行正常")
# 打开并读取JSON文件
with open('./JSON/anquanke.json', 'r', encoding='utf-8') as file:
data = json.load(file)
# 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list):
raise ValueError("JSON文件格式错误请检查common.py是否异常")
# 提取所需字段并编号
total_data = []
for index, item in enumerate(data, start=1):
entry = {
"id": index,
"title": item.get("title", ""),
"guid": item.get("guid", ""),
"description": item.get("description", ""),
"pubDate": item.get("pubDate", ""),
"author": item.get("author", ""),
"source": item.get("source", "")
}
total_data.append(entry)
return total_data
def query_articles_within_time_range(s_hour, e_hour):
conn = sqlite3.connect('./db/anquanke.db')
cursor = conn.cursor()
# 获取当前日期和时间
now = datetime.now()
start_time = datetime(now.year, now.month, now.day, s_hour) - timedelta(days=1)
# print(start_time)
end_time = datetime(now.year, now.month, now.day, e_hour)
# print(end_time)
# 查询指定时间段内的数据
cursor.execute('''
SELECT * FROM articles
WHERE pubDate BETWEEN ? AND ?
''', (start_time.strftime('%Y-%m-%d %H:%M:%S'), end_time.strftime('%Y-%m-%d %H:%M:%S')))
results = cursor.fetchall()
conn.close()
return results
def clear_table():
conn = sqlite3.connect('./db/anquanke.db')
cursor = conn.cursor()
cursor.execute('DELETE FROM articles')
conn.commit()
conn.close()
def get_filtered_articles(entries):
result = ""
for entry in entries:
result += f"作者:{entry[6]}\t来源:{entry[3]}\t文章:{entry[1]}\n"
result += f"链接:{entry[2]}\t上传时间:{entry[5]}\n"
result += "-" * 40 + "\n" # 添加分隔线以便区分不同文章
return result
def Src_anquanke(s_hour, e_hour):
if not os.path.exists('./db/anquanke.db'):
# 创建数据库和表
create_database()
# 清空表
clear_table()
# 获取 JSON 数据
M_anquanke_data = get_anquanke_json()
# 插入数据到数据库
insert_data(M_anquanke_data)
# 查询指定时间段内的数据
filtered_articles = query_articles_within_time_range(s_hour, e_hour)
# print(filtered_articles)
if filtered_articles:
results = get_filtered_articles(filtered_articles)
SendToFeishu(results, "安全客资讯递送")
# print(results)
else:
# 如果为空,则跳过执行
print("安全客数据为空,跳过执行。")
# print(results)
if __name__ == "__main__":
Src_anquanke(11, 11)

135
GotoSend_doonsec.py Normal file
View File

@ -0,0 +1,135 @@
import json
import sqlite3
import os
from datetime import datetime, timedelta
from SendBot import SendToFeishu
def create_database():
conn = sqlite3.connect('./db/doonsec.db')
cursor = conn.cursor()
cursor.execute('''CREATE TABLE IF NOT EXISTS articles (
id INTEGER PRIMARY KEY AUTOINCREMENT,
title TEXT,
link TEXT,
description TEXT,
pubDate DATETIME,
author TEXT
)''')
conn.commit()
conn.close()
def insert_data(data):
conn = sqlite3.connect('./db/doonsec.db')
cursor = conn.cursor()
for entry in data:
try:
# 解析 pubDate 字符串为 datetime 对象
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%S')
# 格式化 pubDate 为所需的格式
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
except ValueError:
# 如果解析失败,使用原始 pubDate 字符串
formatted_pub_date = entry['pubDate']
cursor.execute('''
INSERT INTO articles (title, link, description, pubDate, author)
VALUES (?, ?, ?, ?, ?)
''', (entry['title'], entry['link'], entry['description'], formatted_pub_date, entry['author']))
conn.commit()
conn.close()
def get_doonsec_json():
# 检查文件是否存在
if not os.path.exists('./JSON/doonsec.json'):
raise FileNotFoundError(f"doonsec.json文件不存在请检查程序是否运行正常")
# 打开并读取JSON文件
with open('./JSON/doonsec.json', 'r', encoding='utf-8') as file:
data = json.load(file)
# 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list):
raise ValueError("JSON文件格式错误请检查common.py是否异常")
# 提取所需字段并编号
total_data = []
for index, item in enumerate(data, start=1):
entry = {
"id": index,
"title": item.get("title", ""),
"link": item.get("link", ""),
"description": item.get("description", ""),
"pubDate": item.get("pubDate", ""),
"author": item.get("author", ""),
}
total_data.append(entry)
return total_data
def query_articles_within_time_range(s_hour, e_hour):
conn = sqlite3.connect('./db/doonsec.db')
cursor = conn.cursor()
# 获取当前日期和时间
now = datetime.now()
start_time = datetime(now.year, now.month, now.day, s_hour) - timedelta(days=1)
# print(start_time)
end_time = datetime(now.year, now.month, now.day, e_hour)
# print(end_time)
# 查询指定时间段内的数据
cursor.execute('''
SELECT * FROM articles
WHERE pubDate BETWEEN ? AND ?
''', (start_time.strftime('%Y-%m-%d %H:%M:%S'), end_time.strftime('%Y-%m-%d %H:%M:%S')))
results = cursor.fetchall()
conn.close()
return results
def clear_table():
conn = sqlite3.connect('./db/doonsec.db')
cursor = conn.cursor()
cursor.execute('DELETE FROM articles')
conn.commit()
conn.close()
def get_filtered_articles(entries):
result = ""
for entry in entries:
result += f"作者:{entry[5]}\t文章:{entry[1]}\n"
result += f"链接:[点此访问]({entry[2]})\t上传时间:{entry[4]}\n"
result += f"简介:{entry[3]}\n"
result += "-" * 40 + "\n" # 添加分隔线以便区分不同文章
return result
def Src_doonsec(s_hour, e_hour):
if not os.path.exists('./db/doonsec.db'):
# 创建数据库和表
create_database()
# 清空表
clear_table()
# 获取 JSON 数据
M_doonsec_data = get_doonsec_json()
# 插入数据到数据库
insert_data(M_doonsec_data)
# 查询指定时间段内的数据
filtered_articles = query_articles_within_time_range(s_hour, e_hour)
# print(filtered_articles)
if filtered_articles:
results = get_filtered_articles(filtered_articles)
SendToFeishu(results, "洞见微信安全资讯递送")
# print(results)
else:
# 如果为空,则跳过执行
print("洞见数据为空,跳过执行。")
# print(results)
if __name__ == "__main__":
Src_doonsec(11, 11)

View File

@ -5,7 +5,7 @@
"description": "根据提示输入内容执行集成调用sqlmap\\\\x0d\\\\x0a泛微CheckServer-Sql注入检测漏洞存在后将payload字段下内容保存为req文件使用sqlmap模块构造参数",
"author": "星悦安全",
"category": "星悦安全",
"pubDate": "2024-12-02T16:58:07"
"pubDate": "2024-12-03T16:58:07"
},
{
"title": "Linux通用应急响应脚本",
@ -13,7 +13,7 @@
"description": "Linux通用应急响应脚本适用大多数情况目前在ubuntu、centos7、kali上均可以正常运行。",
"author": "Hack分享吧",
"category": "Hack分享吧",
"pubDate": "2024-12-02T16:56:30"
"pubDate": "2024-12-03T16:56:30"
},
{
"title": "JAVA安全-反序列化系列-CC6(无依赖链)分析",
@ -21,7 +21,7 @@
"description": "CC6这条链是基于CC1的基础上由于在CC1中使用到的AnnotationInvocationHandler类也就是入口点它的readObject()在java8u71版本后就进行了修改导致在jdk8u71后的版本cc1使用不了",
"author": "菜狗安全",
"category": "菜狗安全",
"pubDate": "2024-12-02T16:30:14"
"pubDate": "2024-12-03T16:30:14"
},
{
"title": "Palo Alto Networks PAN-OS身份认证绕过导致RCE漏洞(CVE-2024-0012)",
@ -29,7 +29,7 @@
"description": "Palo Alto Networks PAN-OS身份认证绕过导致RCE漏洞(CVE-2024-0012)",
"author": "nday POC",
"category": "nday POC",
"pubDate": "2024-12-02T15:43:29"
"pubDate": "2024-12-03T15:43:29"
},
{
"title": "一款快速等保核查、资产扫描工具",
@ -37,7 +37,7 @@
"description": "主要功能主机存活探测、漏洞扫描、子域名扫描、端口扫描、各类服务数据库爆破等~~",
"author": "安全帮",
"category": "安全帮",
"pubDate": "2024-12-02T15:13:26"
"pubDate": "2024-12-03T15:13:26"
},
{
"title": "Windows日志分析工具GUI版",
@ -45,7 +45,7 @@
"description": null,
"author": "信安404",
"category": "信安404",
"pubDate": "2024-12-02T14:50:25"
"pubDate": "2024-12-03T14:50:25"
},
{
"title": "Windows日志分析工具GUI版",
@ -53,7 +53,7 @@
"description": "骁佬终于把日志查询、内存检索、md5检索整合在一起了还开发了GUI有了自己公众号给榜一大佬点点关注。",
"author": "安服仔的救赎",
"category": "安服仔的救赎",
"pubDate": "2024-12-02T14:46:21"
"pubDate": "2024-12-03T14:46:21"
},
{
"title": "安卓逆向 -- 某app破解下载和高清功能",
@ -61,7 +61,7 @@
"description": null,
"author": "逆向有你",
"category": "逆向有你",
"pubDate": "2024-12-02T14:08:29"
"pubDate": "2024-12-03T14:08:29"
},
{
"title": "Windows 在新的网络钓鱼攻击中感染了后门 Linux 虚拟机",
@ -69,7 +69,7 @@
"description": "Securonix 研究人员发现的一项新活动是使用网络钓鱼电子邮件执行无人值守的 Linux 虚拟机安装,以破坏企业网络并获得持久性。",
"author": "嘶吼专业版",
"category": "嘶吼专业版",
"pubDate": "2024-12-02T14:00:24"
"pubDate": "2024-12-03T14:00:24"
},
{
"title": "最近邻居攻击X 罗斯 APT 如何利用附近的 Wi-Fi 网络进行隐秘访问",
@ -77,7 +77,7 @@
"description": null,
"author": "securitainment",
"category": "securitainment",
"pubDate": "2024-12-02T13:38:02"
"pubDate": "2024-12-03T13:38:02"
},
{
"title": "一次0Day漏洞Rce审计流程",
@ -85,7 +85,7 @@
"description": null,
"author": "钟毓安全",
"category": "钟毓安全",
"pubDate": "2024-12-02T13:28:36"
"pubDate": "2024-12-03T13:28:36"
},
{
"title": "关于缓存欺骗的小总结",
@ -93,7 +93,7 @@
"description": null,
"author": "白帽子左一",
"category": "白帽子左一",
"pubDate": "2024-12-02T12:01:48"
"pubDate": "2024-12-03T12:01:48"
},
{
"title": "记一次网上阅卷系统漏洞挖掘",
@ -101,7 +101,7 @@
"description": null,
"author": "掌控安全EDU",
"category": "掌控安全EDU",
"pubDate": "2024-12-02T12:00:13"
"pubDate": "2024-12-03T12:00:13"
},
{
"title": "干货|一文搞懂加密流量检测的解决方法和技术细节",
@ -109,7 +109,7 @@
"description": null,
"author": "e安在线",
"category": "e安在线",
"pubDate": "2024-12-02T10:34:52"
"pubDate": "2024-12-03T10:34:52"
},
{
"title": "混淆 API 补丁以绕过新的 Windows Defender 行为签名",
@ -117,7 +117,7 @@
"description": null,
"author": "securitainment",
"category": "securitainment",
"pubDate": "2024-12-02T10:24:00"
"pubDate": "2024-12-03T10:24:00"
},
{
"title": "二开哥斯拉-绕过cloudflare流量检测",
@ -125,7 +125,7 @@
"description": "WebShell\\\\x0d\\\\x0a\\\\x0d\\\\x0a上传了 但是遇到防火墙拦截了,哎,苦恼连接不上\\\\x0d\\\\x0a\\\\x0d\\\\x0a没办法经过测试发现是因为流量中的字段有敏感字段被拦截了找了好几个人要了二开过的哥斯拉发现都不行还是被检测被拦截无奈只能自己手搓一个二开了",
"author": "RongRui安全团队",
"category": "RongRui安全团队",
"pubDate": "2024-12-02T10:23:40"
"pubDate": "2024-12-03T10:23:40"
},
{
"title": "任子行网络安全审计系统 log_fw_ips_scan_jsondata SQL注入漏洞",
@ -133,7 +133,7 @@
"description": "任子行网络安全审计系统 log_fw_ips_scan_jsondata 接口存在SQL注入漏洞未经身份验证的远程攻击者除了可以利用xa0SQLxa0注入获取数据库中的信息之外甚至在高权限的情况可向服务器中写入木马进一步获取服务器系统权限。",
"author": "nday POC",
"category": "nday POC",
"pubDate": "2024-12-02T10:13:51"
"pubDate": "2024-12-03T10:13:51"
},
{
"title": "绕过CDN查找真实IP方法",
@ -141,7 +141,7 @@
"description": null,
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2024-12-02T10:08:31"
"pubDate": "2024-12-03T10:08:31"
},
{
"title": "一款内存马检测工具",
@ -149,7 +149,7 @@
"description": null,
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2024-12-02T10:08:31"
"pubDate": "2024-12-03T10:08:31"
},
{
"title": "Windows 自动登录配置指南",
@ -157,7 +157,7 @@
"description": null,
"author": "网络个人修炼",
"category": "网络个人修炼",
"pubDate": "2024-12-02T10:01:50"
"pubDate": "2024-12-03T10:01:50"
},
{
"title": "一次0Day漏洞Rce审计流程",
@ -165,7 +165,7 @@
"description": null,
"author": "Jie安全",
"category": "Jie安全",
"pubDate": "2024-12-02T10:00:35"
"pubDate": "2024-12-03T10:00:35"
},
{
"title": "二开哥斯拉-绕过cloudflare流量检测",
@ -173,7 +173,7 @@
"description": null,
"author": "RongRui安全团队",
"category": "RongRui安全团队",
"pubDate": "2024-12-02T09:57:03"
"pubDate": "2024-12-03T09:57:03"
},
{
"title": "应用内存中的后渗透利用-远程工具密码读取",
@ -181,7 +181,7 @@
"description": "新版本的todesk和向日葵已经无法从配置文件获取密码而且常规的替换手法也已经失效",
"author": "安全洞察知识图谱",
"category": "安全洞察知识图谱",
"pubDate": "2024-12-02T09:54:28"
"pubDate": "2024-12-03T09:54:28"
},
{
"title": "Windows常规应急",
@ -189,7 +189,7 @@
"description": "“A9 Team 甲方攻防团队,成员来自某证券、微步、青藤、长亭、安全狗等公司。",
"author": "A9 Team",
"category": "A9 Team",
"pubDate": "2024-12-02T09:44:45"
"pubDate": "2024-12-03T09:44:45"
},
{
"title": "蓝队应急响应-Linux日志分析及常用命令总结",
@ -197,7 +197,7 @@
"description": "蓝队应急响应-Linux日志分析及常用命令总结",
"author": "网络安全实验室",
"category": "网络安全实验室",
"pubDate": "2024-12-02T09:37:05"
"pubDate": "2024-12-03T09:37:05"
},
{
"title": "实战!一次超简单的网站后门利用体验",
@ -205,7 +205,7 @@
"description": null,
"author": "中国电信安全",
"category": "中国电信安全",
"pubDate": "2024-12-02T09:26:04"
"pubDate": "2024-12-03T09:26:04"
},
{
"title": "【新增PHP类型】蚁剑 | 哥斯拉免杀 过雷池、D盾、安全狗的 XlByPassWAF v1.1已更新!",
@ -213,7 +213,7 @@
"description": "新增PHP免杀Webshell\\\\x0d\\\\x0a过雷池、D盾、安全狗等WAF \\\\x0d\\\\x0a蚁剑 | 哥斯拉免杀",
"author": "威零安全实验室",
"category": "威零安全实验室",
"pubDate": "2024-12-02T09:15:21"
"pubDate": "2024-12-03T09:15:21"
},
{
"title": "【新增PHP类型】蚁剑 | 哥斯拉免杀 过雷池、D盾、安全狗的 XlByPassWAF v1.1已更新!",
@ -221,7 +221,7 @@
"description": "新增PHP免杀Webshell\\\\x0d\\\\x0a过雷池、D盾、安全狗等WAF \\\\x0d\\\\x0a蚁剑 | 哥斯拉免杀",
"author": "爱喝酒烫头的曹操",
"category": "爱喝酒烫头的曹操",
"pubDate": "2024-12-02T09:14:56"
"pubDate": "2024-12-03T09:14:56"
},
{
"title": "【漏洞复现】OfficeWeb365 SaveDraw 任意文件上传getshell漏洞",
@ -229,7 +229,7 @@
"description": "【漏洞复现】OfficeWeb365 SaveDraw 任意文件上传getshell漏洞",
"author": "白帽攻防",
"category": "白帽攻防",
"pubDate": "2024-12-02T09:10:26"
"pubDate": "2024-12-03T09:10:26"
},
{
"title": "新型网络钓鱼活动利用损坏的 Word 文档来逃避安全保护",
@ -237,7 +237,7 @@
"description": "攻击者利用损坏的Word文档钓鱼",
"author": "军哥网络安全读报",
"category": "军哥网络安全读报",
"pubDate": "2024-12-02T09:01:01"
"pubDate": "2024-12-03T09:01:01"
},
{
"title": "一次0Day漏洞Rce审计流程",
@ -245,7 +245,7 @@
"description": null,
"author": "进击安全",
"category": "进击安全",
"pubDate": "2024-12-02T09:00:59"
"pubDate": "2024-12-03T09:00:59"
},
{
"title": "JS逆向系列12-深入Js Hook",
@ -253,7 +253,7 @@
"description": null,
"author": "Spade sec",
"category": "Spade sec",
"pubDate": "2024-12-02T09:00:48"
"pubDate": "2024-12-03T09:00:48"
},
{
"title": "vulnhub之Matrix-2的实践",
@ -261,7 +261,7 @@
"description": null,
"author": "云计算和网络安全技术实践",
"category": "云计算和网络安全技术实践",
"pubDate": "2024-12-02T08:57:56"
"pubDate": "2024-12-03T08:57:56"
},
{
"title": "针对【中文】和越南语【用户】的新型【恶意软件】“CleverSoar”",
@ -269,7 +269,7 @@
"description": null,
"author": "安小圈",
"category": "安小圈",
"pubDate": "2024-12-02T08:45:48"
"pubDate": "2024-12-03T08:45:48"
},
{
"title": "【漏洞复现】Apache OFBiz远程代码执行漏洞(CVE-2024-45195)",
@ -277,7 +277,7 @@
"description": "星标公众号,及时接收推文消息",
"author": "Z0安全",
"category": "Z0安全",
"pubDate": "2024-12-02T08:42:15"
"pubDate": "2024-12-03T08:42:15"
},
{
"title": "针对银狐一些最新攻击样本加载过程的调试分析",
@ -285,7 +285,7 @@
"description": "针对银狐一些最新攻击样本加载过程的调试分析",
"author": "安全分析与研究",
"category": "安全分析与研究",
"pubDate": "2024-12-02T08:40:42"
"pubDate": "2024-12-03T08:40:42"
},
{
"title": "开源的Webshell管理器--游魂",
@ -293,7 +293,7 @@
"description": null,
"author": "菜鸟学信安",
"category": "菜鸟学信安",
"pubDate": "2024-12-02T08:30:43"
"pubDate": "2024-12-03T08:30:43"
},
{
"title": "某通用系统0day审计过程",
@ -301,7 +301,7 @@
"description": null,
"author": "道一安全",
"category": "道一安全",
"pubDate": "2024-12-02T08:12:18"
"pubDate": "2024-12-03T08:12:18"
},
{
"title": "内存马检测工具",
@ -309,7 +309,7 @@
"description": null,
"author": "白帽学子",
"category": "白帽学子",
"pubDate": "2024-12-02T08:11:23"
"pubDate": "2024-12-03T08:11:23"
},
{
"title": "Wireshark & Packetdrill | TCP RST 之连接不存在的服务端口",
@ -317,7 +317,7 @@
"description": null,
"author": "Echo Reply",
"category": "Echo Reply",
"pubDate": "2024-12-02T08:08:50"
"pubDate": "2024-12-03T08:08:50"
},
{
"title": "Windows权限控制相关的防御与攻击技术",
@ -325,7 +325,7 @@
"description": null,
"author": "SecretTeam安全团队",
"category": "SecretTeam安全团队",
"pubDate": "2024-12-02T08:02:54"
"pubDate": "2024-12-03T08:02:54"
},
{
"title": "利用js挖掘漏洞",
@ -333,7 +333,7 @@
"description": "在漏洞挖掘中通过对js的挖掘可发现诸多安全问题此文章主要记录学习如何利用JS测试以及加密参数逆向相关的漏洞挖掘。",
"author": "李白你好",
"category": "李白你好",
"pubDate": "2024-12-02T08:02:42"
"pubDate": "2024-12-03T08:02:42"
},
{
"title": "LLVM Pass转储类或结构的内存布局",
@ -341,7 +341,7 @@
"description": "面向LLVM Pass小白提供完整可操作示例",
"author": "青衣十三楼飞花堂",
"category": "青衣十三楼飞花堂",
"pubDate": "2024-12-02T08:00:35"
"pubDate": "2024-12-03T08:00:35"
},
{
"title": "漏洞预警 | PAN-OS Web管理界面身份认证绕过漏洞",
@ -349,7 +349,7 @@
"description": "PAN-OS设备管理Web界面中存在身份认证绕过漏洞未经身份验证的远程攻击者可以通过网络访问管理Web界面从而进行后续活动包括修改设备配置、访问其他管理功能。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2024-12-02T08:00:13"
"pubDate": "2024-12-03T08:00:13"
},
{
"title": "AUTOSAR OS模块详解(二) Counter",
@ -357,7 +357,7 @@
"description": "本文主要介绍AUTOSAR OS的Counter并对基于英飞凌Aurix TC3XX系列芯片的Vector Microsar代码和配置进行部分讲解。",
"author": "汽车电子嵌入式",
"category": "汽车电子嵌入式",
"pubDate": "2024-12-02T07:40:28"
"pubDate": "2024-12-03T07:40:28"
},
{
"title": "DedeCMS v5.7 SP2后台SSTI到RCE再到GetShell",
@ -365,7 +365,7 @@
"description": "影响范围DedeCMS v5.7 SP2利用条件登陆后台(有点鸡肋但是可以结合DedeCMS的其他漏洞进行",
"author": "七芒星实验室",
"category": "七芒星实验室",
"pubDate": "2024-12-02T07:01:03"
"pubDate": "2024-12-03T07:01:03"
},
{
"title": "Windows钓鱼演练工具 -- xiao_fishing",
@ -373,7 +373,7 @@
"description": null,
"author": "Web安全工具库",
"category": "Web安全工具库",
"pubDate": "2024-12-02T06:44:33"
"pubDate": "2024-12-03T06:44:33"
},
{
"title": "文末获取 | 基于卡巴斯基虚拟化技术实现内核Hook",
@ -381,7 +381,7 @@
"description": null,
"author": "星落安全团队",
"category": "星落安全团队",
"pubDate": "2024-12-02T00:00:48"
"pubDate": "2024-12-03T00:00:48"
},
{
"title": "什么CNVD证书批量化挖掘 ",

View File

@ -1 +1,5 @@
## 持续更新中
## 持续更新中
RSS订阅链接来源https://github.com/zhengjim/Chinese-Security-RSS
使用python-json进行格式化然后使用飞书webhook机器人进行发送
config.yaml可指定大部分可能需要的参数

View File

@ -17,7 +17,7 @@ import yaml
# return sign
def gen_sign():
with open('./config.yaml', 'r') as file:
with open('./config.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file)
secret = f"{config['secret']}"
# print(secret)
@ -74,6 +74,7 @@ def SendToFeishu(body, header):
print("发送失败: 签名验证错误,请检查签名密钥是否正确!")
else:
print("发送失败: 其他错误,请检查请求参数是否正确!")
print(f"原因:{response_data.get('msg')}")
except json.JSONDecodeError as e:
print(f"JSON 解析错误: {e}")
# print(sign)

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -1,2 +1,7 @@
key: 22b68f21-def4-4bd5-96eb-71d78ee995f7
secret: 9gE9j1kT5bh9HvCyoPcIHc
secret: 9gE9j1kT5bh9HvCyoPcIHc
sleep_time: 35 # 秒数
# 结算时间范围
s_hour: 11 # 开始时间,前一天的*点
e_hour: 11 # 结束时间,当天的*点
c_hour: 11 # 程序运行时间,当天的*点建议与e_hour一致

Binary file not shown.

BIN
db/anquanke.db Normal file

Binary file not shown.

BIN
db/doonsec.db Normal file

Binary file not shown.