This commit is contained in:
MasonLiu 2025-01-06 17:06:15 +08:00
parent 2655151c24
commit 865c477066
20 changed files with 1195 additions and 730 deletions

View File

@ -102,7 +102,7 @@ def send_job_RSS(time_1):
result_4hou_long = Src_4hou(time_1, False) result_4hou_long = Src_4hou(time_1, False)
result_anquanke_long = Src_anquanke(time_1, False) result_anquanke_long = Src_anquanke(time_1, False)
result_doonsec_long = Src_doonsec(False, Doonsec_switch, Doonsec) result_doonsec_long = Src_doonsec(False, Doonsec_switch, Doonsec)
print(result_doonsec_long) # print(result_doonsec_long)
result_xianzhi_long = Src_xianzhi(time_1, False) result_xianzhi_long = Src_xianzhi(time_1, False)
result_freebuf_long = Src_freebuf(time_1, False) result_freebuf_long = Src_freebuf(time_1, False)
result_qianxin_long = Src_qianxin(time_1, False) result_qianxin_long = Src_qianxin(time_1, False)
@ -190,6 +190,7 @@ def main_job(e_hour):
send_job_SX() send_job_SX()
if 2 in choice: if 2 in choice:
send_job_github(e_hour) send_job_github(e_hour)
logger.info("单次运行结束,等待下一次运行...")
def main_loop(time_choice): def main_loop(time_choice):
if time_choice == 1: if time_choice == 1:

View File

@ -4,7 +4,7 @@ from loguru import logger
# 清除所有已有的日志记录器配置 # 清除所有已有的日志记录器配置
logger.remove() logger.remove()
logger.add("./log/core.log", logger.add("./resources/log/core.log",
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}", format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
rotation="100 MB", rotation="100 MB",
compression="zip", compression="zip",
@ -17,8 +17,8 @@ def get_core_config():
# 加载参数 # 加载参数
with open('./config/config.yaml', 'r', encoding="utf-8") as file: with open('./config/config.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file) config = yaml.safe_load(file)
debug = f"{config['debug']}" debug = config.get('debug', 'False') # 使用 get 方法提供默认值
if debug == "True": if str(debug).lower() == "true": # 统一转换为小写进行比较
logger.debug("Debug mode is on") logger.debug("Debug mode is on")
logger.debug(f"Loaded config: {config}") # 输出加载的配置 logger.debug(f"Loaded config: {config}") # 输出加载的配置

View File

@ -1,10 +1,8 @@
# 飞书相关配置信息 # 飞书相关配置信息
# fs_activate: True # fs_activate: True
# fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74 # 此处填写token记得冒号后空一格如aa04a02f-d7bf-4279-bd48-44c4f28c8f74
# fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥记得冒号后空一格如4tq65T4jm1MO2IlxvHxBWe
fs_activate: True fs_activate: True
fs_key: 202d7e51-9a46-422e-a035-863bc42bc459 # 此处填写token记得冒号后空一格如aa04a02f-d7bf-4279-bd48-44c4f28c8f74 fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74 # 此处填写token记得冒号后空一格如aa04a02f-d7bf-4279-bd48-44c4f28c8f74
fs_secret: eZaSCl5DSqtJyZ8QpJBDFh # 此处填写签名密钥记得冒号后空一格如4tq65T4jm1MO2IlxvHxBWe fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥记得冒号后空一格如4tq65T4jm1MO2IlxvHxBWe
# 企业微信相关配置信息 # 企业微信相关配置信息
wx_activate: False wx_activate: False
@ -26,7 +24,7 @@ sender: test@masonliu.com
receivers: ['2857911564@qq.com'] receivers: ['2857911564@qq.com']
# 结算时间范围 # 结算时间范围
e_hour: 4 # 程序运行时间间隔 e_hour: 4 # 程序运行时间间隔
time_mode: 1 time_mode: 0
# 0定时运行模式仅在指定时间运行参照Core.py中设置 # 0定时运行模式仅在指定时间运行参照Core.py中设置
# 1启用循环一定间隔时间后运行 # 1启用循环一定间隔时间后运行
mode: [0] # 运行模式,可多选 mode: [0] # 运行模式,可多选

View File

@ -1,4 +0,0 @@
2025-01-06 00:28:38 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:29:41 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:33:10 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:33:15 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}

View File

@ -1,4 +1,92 @@
[ [
{
"guid": "https://www.anquanke.com/post/id/303291",
"title": "2024年度十大网络安全热点事件盘点时代暗涌下的安全危机",
"author": " 安全客",
"description": null,
"source": "微信",
"pubDate": "2025-01-06 11:00:15"
},
{
"guid": "https://www.anquanke.com/post/id/303282",
"title": "关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断",
"author": " 安全客",
"description": null,
"source": "TheHackersNews",
"pubDate": "2025-01-06 10:52:56"
},
{
"guid": "https://www.anquanke.com/post/id/303279",
"title": "项目隔离: PyPI 抵御恶意软件的新防线",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:48:40"
},
{
"guid": "https://www.anquanke.com/post/id/303275",
"title": "CVE-2024-12912 & CVE-2024-13062 华硕路由器面临风险",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:37:22"
},
{
"guid": "https://www.anquanke.com/post/id/303270",
"title": "35+ 款 Chrome 浏览器扩展程序遭入侵250 万用户面临风险",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:21:36"
},
{
"guid": "https://www.anquanke.com/post/id/303267",
"title": "通过恶意 npm 软件包对以太坊开发人员进行供应链攻击",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:11:35"
},
{
"guid": "https://www.anquanke.com/post/id/303288",
"title": "每分钟就有 4,080 份记录在数据泄露事件中受损",
"author": " 安全客",
"description": null,
"source": "helpnetsecurity",
"pubDate": "2025-01-06 10:09:03"
},
{
"guid": "https://www.anquanke.com/post/id/303264",
"title": "SysBumps在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:02:40"
},
{
"guid": "https://www.anquanke.com/post/id/303285",
"title": "现代 CISO 是组织成功的基石",
"author": " 安全客",
"description": null,
"source": "helpnetsecurity",
"pubDate": "2025-01-06 10:01:09"
},
{
"guid": "https://www.anquanke.com/post/id/303259",
"title": "CVE-2025-22275 (CVSS 9.3)iTerm2 修补了暴露用户输入和输出的重大安全漏洞",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 09:55:57"
},
{
"guid": "https://www.anquanke.com/post/id/303256",
"title": "黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据",
"author": " 安全客",
"description": null,
"source": "therecord",
"pubDate": "2025-01-06 09:51:53"
},
{ {
"guid": "https://www.anquanke.com/post/id/303249", "guid": "https://www.anquanke.com/post/id/303249",
"title": "2025年数字安全十大趋势预测挑战、机遇、变革与战略布局", "title": "2025年数字安全十大趋势预测挑战、机遇、变革与战略布局",
@ -70,93 +158,5 @@
"description": null, "description": null,
"source": "hackread", "source": "hackread",
"pubDate": "2025-01-03 10:12:25" "pubDate": "2025-01-03 10:12:25"
},
{
"guid": "https://www.anquanke.com/post/id/303221",
"title": "官员警告:黑客泄露了罗德岛州勒索软件攻击的数据",
"author": " 安全客",
"description": null,
"source": "cybersecuritydive",
"pubDate": "2025-01-03 10:04:05"
},
{
"guid": "https://www.anquanke.com/post/id/303208",
"title": "2024年度盘点之漏洞威胁AI技术降低漏洞利用门槛网络边缘设备成重灾区",
"author": " 安全客",
"description": null,
"source": "微信",
"pubDate": "2025-01-02 16:51:55"
},
{
"guid": "https://www.anquanke.com/post/id/303205",
"title": "66,000 台 DrayTek 网关存在远程命令注入漏洞 (CVE-2024-12987),已发布 PoC",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-02 16:41:12"
},
{
"guid": "https://www.anquanke.com/post/id/303202",
"title": "D-Link 就易受僵尸网络攻击的报废路由器发出警告",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-02 16:35:11"
},
{
"guid": "https://www.anquanke.com/post/id/303199",
"title": "CVE-2024-12108 (CVSS 9.6) 及更高版本: Progress 为 WhatsUp Gold 网络监控软件发布关键补丁程序",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-02 16:27:46"
},
{
"guid": "https://www.anquanke.com/post/id/303196",
"title": "针对 Windows 零点击漏洞 CVE-2024-49112 发布 PoC 漏洞利用程序",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-02 16:20:29"
},
{
"guid": "https://www.anquanke.com/post/id/303193",
"title": "拟议更新HIPAA安全规则授权以在72小时内恢复某些相关电子信息系统和数据的丢失",
"author": " 安全客",
"description": null,
"source": "securityaffairs",
"pubDate": "2025-01-02 15:15:33"
},
{
"guid": "https://www.anquanke.com/post/id/303187",
"title": "新的 “双重点击劫持 ”漏洞绕过了主要网站的点击劫持保护措施",
"author": " 安全客",
"description": null,
"source": "TheHackersNews",
"pubDate": "2025-01-02 14:53:40"
},
{
"guid": "https://www.anquanke.com/post/id/303182",
"title": "新的 IOCONTROL 恶意软件用于关键基础设施攻击",
"author": " 安全客",
"description": null,
"source": "嘶吼",
"pubDate": "2025-01-02 14:44:44"
},
{
"guid": "https://www.anquanke.com/post/id/303179",
"title": "2025 年医疗保健网络监管和立法前景如何?",
"author": " 安全客",
"description": null,
"source": "govinfosecurity",
"pubDate": "2025-01-02 14:27:41"
},
{
"guid": "https://www.anquanke.com/post/id/303176",
"title": "FortiGuard Labs 将新的 EC2 Grouper 黑客与 AWS 凭证漏洞联系起来",
"author": " 安全客",
"description": null,
"source": "hackread",
"pubDate": "2025-01-02 14:19:55"
} }
] ]

View File

@ -1,4 +1,324 @@
[ [
{
"title": "CVE-2024-50379|条件竞争Tomcat RCE POC首发",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486408&idx=1&sn=ac34350ed2c25084cb78cec5ff40275e",
"description": "半通杀|Tomcat RCE无敌",
"author": "TtTeam",
"category": "TtTeam",
"pubDate": "2025-01-06T14:41:19"
},
{
"title": "【渗透利器】比proxifier更好用的代理神器可轻松配置代理--sunnynet",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0OTY3OTc5Mw==&mid=2247484914&idx=1&sn=ffcae701630227b7da949c2c63b66b04",
"description": null,
"author": "网安鲲为帝",
"category": "网安鲲为帝",
"pubDate": "2025-01-06T14:27:36"
},
{
"title": "实战攻防中的信息收集",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMjU2Nzc1Mg==&mid=2247484483&idx=1&sn=8f7983ac3a289460203b71969a365dbe",
"description": null,
"author": "LHACK安全",
"category": "LHACK安全",
"pubDate": "2025-01-06T14:00:57"
},
{
"title": "CVE-2024-43452针对 Windows 特权提升漏洞的 PoC 漏洞发布",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526837&idx=1&sn=bdc1792b20bbc0e3485123421c3c240c",
"description": null,
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2025-01-06T13:53:08"
},
{
"title": "CVE-2024-47575FortiManager FortiManager Cloud 缺少身份验证允许执行任意代码或命令",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526827&idx=1&sn=02106475443306b2005d8031e320d35f",
"description": null,
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2025-01-06T13:44:09"
},
{
"title": "ThievingFox——从密码管理器和 Windows 实用程序远程检索凭据",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526827&idx=2&sn=357dc695b40732b89fd8115f61111e9a",
"description": "ThievingFox 是一组后漏洞利用工具,用于在渗透测试和类似活动中从工作站和服务器收集凭据。它的工作原理是让目标应用程序加载恶意库,该库执行内存挂钩以收集凭据。",
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2025-01-06T13:44:09"
},
{
"title": "【成功复现】爱数AnyShare SMTP_GetConfig 信息泄露漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502853&idx=1&sn=6116493ef276d07ee2f6c5105fb25d62",
"description": "【成功复现】爱数AnyShare SMTP_GetConfig 信息泄露漏洞",
"author": "弥天安全实验室",
"category": "弥天安全实验室",
"pubDate": "2025-01-06T12:18:51"
},
{
"title": "工具集PotatoTool【1.3更新】集合解密、分析、扫描、溯源、免杀、提权等功能的网络安全综合工具",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247485088&idx=1&sn=dde3f7615d6d2e96776b49bce1762bea",
"description": null,
"author": "风铃Sec",
"category": "风铃Sec",
"pubDate": "2025-01-06T12:17:41"
},
{
"title": "JAVA XXE 学习总结",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247546440&idx=1&sn=1aafdd4bc381662ded1bedaacb7191f8",
"description": null,
"author": "掌控安全EDU",
"category": "掌控安全EDU",
"pubDate": "2025-01-06T12:02:15"
},
{
"title": "从js到高危垂直越权漏洞挖掘",
"link": "https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614973&idx=1&sn=0cb7f44aa7d6b3d7f0b82a6e1490a6cc",
"description": null,
"author": "白帽子左一",
"category": "白帽子左一",
"pubDate": "2025-01-06T12:01:05"
},
{
"title": "Java安全小记-FastJson反序列化",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0ODY1NzEwMA==&mid=2247485169&idx=1&sn=804880c5f2fad83f50d7217bbe3dfe60",
"description": null,
"author": "土拨鼠的安全屋",
"category": "土拨鼠的安全屋",
"pubDate": "2025-01-06T12:00:23"
},
{
"title": "浅析CTF中PWN题堆类型的ORW技术",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&mid=2651037243&idx=1&sn=6fcfd1790adc07489a7aa79613c56bfd",
"description": "浅析ctf中pwn题堆类型的orw",
"author": "SAINTSEC",
"category": "SAINTSEC",
"pubDate": "2025-01-06T11:52:08"
},
{
"title": "某华命令执行Rce原理分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMjM5NDM3NQ==&mid=2247486194&idx=1&sn=1edc0eb964a23d4ef1d95e0668354d48",
"description": null,
"author": "进击安全",
"category": "进击安全",
"pubDate": "2025-01-06T11:45:51"
},
{
"title": "[溯源]HuntBack(反击狩猎)用于攻防演练中防守方对恶意ip进行web指纹扫描与识别",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4NTgxNTc5Mg==&mid=2247486805&idx=1&sn=53ec3f82f35a73b14adc666c9ed0ca22",
"description": null,
"author": "W啥都学",
"category": "W啥都学",
"pubDate": "2025-01-06T11:41:44"
},
{
"title": "漏洞通告 | Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507635&idx=1&sn=3ed64fc475689a3cd2c08cc3a146a471",
"description": "立即查看漏洞详情",
"author": "微步在线研究响应中心",
"category": "微步在线研究响应中心",
"pubDate": "2025-01-06T10:50:43"
},
{
"title": "【介质取证】“隐藏”在日志文件里的行为痕迹",
"link": "https://mp.weixin.qq.com/s?__biz=MzI0OTEyMTk5OQ==&mid=2247494068&idx=1&sn=7903df1ae2f96b57d88bdccc88dbdb38",
"description": null,
"author": "平航科技",
"category": "平航科技",
"pubDate": "2025-01-06T10:01:02"
},
{
"title": "刷脸登录银行 App 现他人信息,银行回应称“网络抖动带来的极小概率事件”|Windows 曝9.8分漏洞已有PoC及利用情况",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650606244&idx=1&sn=8000e773da8fb2b362bc7283a912db76",
"description": null,
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2025-01-06T09:55:05"
},
{
"title": "针对 PostgreSQL 数据库的攻击研究",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247499743&idx=1&sn=f6f99cdd5962403d8c00657ceaa708a5",
"description": null,
"author": "信安之路",
"category": "信安之路",
"pubDate": "2025-01-06T09:37:29"
},
{
"title": "【漏洞文章】大华智能物联综合管理平台远程代码执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMTY1NDc2OA==&mid=2247487256&idx=1&sn=5f02d951d459a7c2ef37977afc806005",
"description": null,
"author": "小羊安全屋",
"category": "小羊安全屋",
"pubDate": "2025-01-06T09:13:34"
},
{
"title": "【漏洞复现】快云服务器助手GetDetail接口文件任意文件读取漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzI1NTE2NzQ3NQ==&mid=2247485521&idx=2&sn=21fccb1beac3a0dcc9a565a36fcfa9a7",
"description": null,
"author": "网络安全007",
"category": "网络安全007",
"pubDate": "2025-01-06T09:01:03"
},
{
"title": "【Nday漏洞分析】ProjectSend 身份认证绕过漏洞(CVE-2024-11680)",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247486903&idx=1&sn=0a066aff4189674338d0ffe68e405275",
"description": null,
"author": "神农Sec",
"category": "神农Sec",
"pubDate": "2025-01-06T09:00:39"
},
{
"title": "vulnhub之unknowndevice2的实践",
"link": "https://mp.weixin.qq.com/s?__biz=MzA3MjM5MDc2Nw==&mid=2650748903&idx=1&sn=f3265733267791c930270b071e833d0e",
"description": null,
"author": "云计算和网络安全技术实践",
"category": "云计算和网络安全技术实践",
"pubDate": "2025-01-06T08:46:59"
},
{
"title": "内网渗透之ADCS权限维持",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494683&idx=1&sn=ff1e934c2bb0dee6e9959d04e96218c0",
"description": "文章前言本篇文章主要介绍如何通过证书服务来实现权限维持的目的基本原理在微软的文档里有一段话\\\\x26quot;当使用PKCA时",
"author": "七芒星实验室",
"category": "七芒星实验室",
"pubDate": "2025-01-06T08:46:33"
},
{
"title": "企业安全建设之蜜罐搭建与使用",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494683&idx=2&sn=2fb0376ca472b4a0a1eff27d319df088",
"description": "基本介绍HFish是一款基于Golang开发的跨平台多功能主动诱导型开源国产蜜罐框架系统它从内网失陷检测、",
"author": "七芒星实验室",
"category": "七芒星实验室",
"pubDate": "2025-01-06T08:46:33"
},
{
"title": "W&Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NzkxOTQ0OA==&mid=2247484492&idx=1&sn=7da5690238bdb790765079470195bd8e",
"description": "W\\\\x26amp;Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞",
"author": "菜鸟学渗透",
"category": "菜鸟学渗透",
"pubDate": "2025-01-06T08:30:31"
},
{
"title": "【实用工具】Windows应急响应上机排查工具",
"link": "https://mp.weixin.qq.com/s?__biz=MzIxOTk0ODY0NQ==&mid=2247485387&idx=1&sn=59722752cf6054be5cf5ff0645012d04",
"description": "在上机排查过程中,通过“事件查看器”逐个查看系统日志太过繁琐。这样的话,我们可以通过此工具一键对系统日志进行分类核查,有效提高上机研判、处置能力。",
"author": "如棠安全",
"category": "如棠安全",
"pubDate": "2025-01-06T08:15:40"
},
{
"title": "免杀系列 - 无法让管理员找到你的木马进程",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487937&idx=1&sn=f424ff0e311911b564ad87924e90b994",
"description": null,
"author": "SecretTeam安全团队",
"category": "SecretTeam安全团队",
"pubDate": "2025-01-06T08:08:29"
},
{
"title": "【神兵利器】GRS内网穿透工具",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247504721&idx=1&sn=e25858d7e5772aa1d94b191a42a49d49",
"description": null,
"author": "菜鸟学信安",
"category": "菜鸟学信安",
"pubDate": "2025-01-06T08:03:20"
},
{
"title": "记一次某道CMS审计过程",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247510233&idx=1&sn=0159324632f603442a3a7b5d5bec845c",
"description": null,
"author": "李白你好",
"category": "李白你好",
"pubDate": "2025-01-06T08:01:49"
},
{
"title": "Hacking Scanner 一键渗透扫描器",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247493163&idx=1&sn=cd8f69d7ecc43e8bc09da662d0094ede",
"description": null,
"author": "夜组安全",
"category": "夜组安全",
"pubDate": "2025-01-06T08:01:01"
},
{
"title": "X-Ways Forensics 包含报告表/标签的使用",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3NTU3NTY0Nw==&mid=2247489479&idx=1&sn=a196e28523a7438789bb56901d775f8d",
"description": "关于包含报告表/标签功能,笔者也是在一次偶然之中领悟到了其强大之处,因为之前一直都认为报告表功能并无大用。现在,标签列是我分析页面中 的常驻列,并且往往处在较为靠前的位置。笔者希望能通过本文介绍包含报告表/标签的强大之处和高效用法。",
"author": "网络安全与取证研究",
"category": "网络安全与取证研究",
"pubDate": "2025-01-06T08:00:57"
},
{
"title": "漏洞预警 | WordPress Plugin Tutor SQL注入漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=1&sn=fbd0590c31f7e295b5743345888e231c",
"description": "WordPress插件Tutor LMS的/wp-admin/admin-ajax.php接口存在SQL注入漏洞未经身份验证的攻击者可以通过该漏洞获取数据库敏感信息。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-01-06T08:00:30"
},
{
"title": "漏洞预警 | 友数聚CPAS审计管理系统SQL注入和任意文件读取漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=2&sn=1e67ec9b7cddeda507a7d80598525961",
"description": "友数聚CPAS审计管理系统存在SQL注入和任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞获取敏感信息建议相关用户及时更新。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-01-06T08:00:30"
},
{
"title": "工具 | Hfish",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=4&sn=22a306b858e629b4d99395f890731306",
"description": "HFish是一款社区型免费蜜罐。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2025-01-06T08:00:30"
},
{
"title": "Ember Bear APT 攻击模拟",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504432&idx=1&sn=89ec75cbd0580342d7cde65855139ace",
"description": "这是对 Ember Bear APT 组织针对乌克兰能源组织的攻击的模拟,攻击活动于 2021 年 4 月活跃,攻击链开",
"author": "安全狗的自我修养",
"category": "安全狗的自我修养",
"pubDate": "2025-01-06T07:09:53"
},
{
"title": "浅谈密码相关原理及代码实现",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518163&idx=1&sn=e2b7200747c06902d53e3556d78d9c31",
"description": null,
"author": "船山信安",
"category": "船山信安",
"pubDate": "2025-01-06T00:12:23"
},
{
"title": "安卓逆向2025 -- Frida学习之环境搭建",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037473&idx=1&sn=fc63b8d78a7113b33bc9630af30dce5b",
"description": null,
"author": "逆向有你",
"category": "逆向有你",
"pubDate": "2025-01-06T00:00:29"
},
{
"title": "Windows 11 BitLocker被绕过来提取卷加密密钥",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498072&idx=2&sn=d5947fa42d47876f2c6a88dfd33a2479",
"description": null,
"author": "河南等级保护测评",
"category": "河南等级保护测评",
"pubDate": "2025-01-06T00:00:20"
},
{
"title": "黑客利用 DoS 漏洞禁用 Palo Alto Networks 防火墙",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3ODY0NTczMA==&mid=2247491876&idx=1&sn=1ffb723d73f1a24290998ff19c4f929e",
"description": null,
"author": "犀牛安全",
"category": "犀牛安全",
"pubDate": "2025-01-06T00:00:00"
},
{
"title": "记两次内网入侵溯源",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NDYwMDA1NA==&mid=2247543401&idx=1&sn=529638018a2a223edc0be924bf6d9d30",
"description": null,
"author": "Hacking黑白红",
"category": "Hacking黑白红",
"pubDate": "2025-01-05T23:26:58"
},
{ {
"title": "国外红队大佬内核+系统级后门维持骚姿势【附代码】", "title": "国外红队大佬内核+系统级后门维持骚姿势【附代码】",
"link": "https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5", "link": "https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5",
@ -23,6 +343,14 @@
"category": "安全初心", "category": "安全初心",
"pubDate": "2025-01-05T22:32:13" "pubDate": "2025-01-05T22:32:13"
}, },
{
"title": "研究人员发布针对 Windows LDAP 漏洞的 PoC 漏洞利用程序",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505530&idx=4&sn=d74d0d52adbd4477bc0279d88f92f1e3",
"description": null,
"author": "网络研究观",
"category": "网络研究观",
"pubDate": "2025-01-05T21:27:48"
},
{ {
"title": "Windows 曝9.8分漏洞已有PoC及利用情况", "title": "Windows 曝9.8分漏洞已有PoC及利用情况",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6", "link": "https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6",
@ -47,6 +375,54 @@
"category": "芳华绝代安全团队", "category": "芳华绝代安全团队",
"pubDate": "2025-01-05T18:53:58" "pubDate": "2025-01-05T18:53:58"
}, },
{
"title": "【漏洞复现】内训宝 SCORM 模块存在任意文件上传漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzI1NTE2NzQ3NQ==&mid=2247485511&idx=1&sn=24c216754ea9f84396bd3159a2ec4b0f",
"description": "内训宝 SCORM 模块存在任意文件上传漏洞|附复现过程!",
"author": "网络安全007",
"category": "网络安全007",
"pubDate": "2025-01-05T16:26:41"
},
{
"title": "【渗透 Tips】解决Edge的IE模式下无法抓包情况",
"link": "https://mp.weixin.qq.com/s?__biz=MzIzNDU5Mzk2OQ==&mid=2247486346&idx=1&sn=abef247f01a77843ed143f35d85ae810",
"description": null,
"author": "阿呆攻防",
"category": "阿呆攻防",
"pubDate": "2025-01-05T16:07:40"
},
{
"title": "JS逆向系列17-Hook_cookie v0.2脚本原理解析",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNTcwOTgxMQ==&mid=2247485234&idx=1&sn=3948bce9c853c43f96632533b5ef236a",
"description": null,
"author": "Spade sec",
"category": "Spade sec",
"pubDate": "2025-01-05T15:47:51"
},
{
"title": "2024 数证杯流量分析WP",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518156&idx=1&sn=6b52ea6ce0a870f4a425c6cdbc325f5e",
"description": null,
"author": "船山信安",
"category": "船山信安",
"pubDate": "2025-01-05T10:45:23"
},
{
"title": "针对潜在危险的 Windows LDAP 漏洞的利用代码已发布",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498048&idx=2&sn=76a1a1db4b128f834fc607a9518b2f8d",
"description": null,
"author": "河南等级保护测评",
"category": "河南等级保护测评",
"pubDate": "2025-01-05T00:12:58"
},
{
"title": "安卓逆向 -- 某TV抓包和jce响应解析",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037449&idx=1&sn=37bae8ad1d88fb2fe194256e6326e768",
"description": null,
"author": "逆向有你",
"category": "逆向有你",
"pubDate": "2025-01-05T00:01:26"
},
{ {
"title": "(滥用) ClickOnce 实现可信任意代码执行", "title": "(滥用) ClickOnce 实现可信任意代码执行",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770", "link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770",
@ -55,6 +431,22 @@
"category": "securitainment", "category": "securitainment",
"pubDate": "2025-01-04T23:04:05" "pubDate": "2025-01-04T23:04:05"
}, },
{
"title": "网络抓包神器Tcpdump实用技巧与案例解析",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247569384&idx=1&sn=3dda4be3d2a2361e8de95a139536e7b4",
"description": null,
"author": "马哥网络安全",
"category": "马哥网络安全",
"pubDate": "2025-01-04T17:01:47"
},
{
"title": "【成功复现】大华智能物联综合管理平台远程代码执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502826&idx=1&sn=59edd406e818caad16fece8fe8cb6fc0",
"description": "【成功复现】大华智能物联综合管理平台远程代码执行漏洞",
"author": "弥天安全实验室",
"category": "弥天安全实验室",
"pubDate": "2025-01-04T16:06:44"
},
{ {
"title": "Steam假入库深入解析", "title": "Steam假入库深入解析",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5", "link": "https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5",
@ -1206,397 +1598,5 @@
"author": "白帽子左一", "author": "白帽子左一",
"category": "白帽子左一", "category": "白帽子左一",
"pubDate": "2024-12-31T12:01:31" "pubDate": "2024-12-31T12:01:31"
},
{
"title": "记一次护网通过外网弱口令一路到内网",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247546389&idx=1&sn=15e113a1110bf9fa380626975cd8f0d4",
"description": "记一次护网通过外网弱口令一路到内网",
"author": "掌控安全EDU",
"category": "掌控安全EDU",
"pubDate": "2024-12-31T12:01:11"
},
{
"title": "CVE-2024-52046 Apache MINA反序列化漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NzczNTM1MQ==&mid=2247485113&idx=1&sn=50df90ad4a66b95ba4c48d29d449b8b0",
"description": null,
"author": "云梦安全",
"category": "云梦安全",
"pubDate": "2024-12-31T11:52:13"
},
{
"title": "CVE-2024-12856 四信Four-Faith路由器存在命令注入漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NzczNTM1MQ==&mid=2247485113&idx=2&sn=45c7416f428ce01ae543c22d001b2eaa",
"description": null,
"author": "云梦安全",
"category": "云梦安全",
"pubDate": "2024-12-31T11:52:13"
},
{
"title": "Burp Suite 插件 BurpGPT可执行额外的被动扫描以发现高度定制的漏洞并可以运行任何类型的基于流量的分析。",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247493117&idx=1&sn=5cbf11851c6bc22bb2af1ea69009af0a",
"description": null,
"author": "夜组安全",
"category": "夜组安全",
"pubDate": "2024-12-31T11:30:21"
},
{
"title": "免杀基础-shellcode注入详解",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MDg3OTc0OA==&mid=2247489219&idx=1&sn=ab08d440a570716aea2c25f3b733a19d",
"description": null,
"author": "Relay学安全",
"category": "Relay学安全",
"pubDate": "2024-12-31T10:17:35"
},
{
"title": "【漏洞通告】Apache Traffic Control SQL注入漏洞安全风险通告",
"link": "https://mp.weixin.qq.com/s?__biz=MzU4NjY4MDAyNQ==&mid=2247496908&idx=1&sn=352ac8e21fec342905ad73d02a58e740",
"description": "近日嘉诚安全监测到Apache Traffic Control中存在一个SQL注入漏洞鉴于漏洞危害较大嘉诚安全提醒相关用户尽快更新至安全版本避免引发漏洞相关的网络安全事件。",
"author": "嘉诚安全",
"category": "嘉诚安全",
"pubDate": "2024-12-31T09:31:25"
},
{
"title": "2024年挖洞记录",
"link": "https://mp.weixin.qq.com/s?__biz=MzI4MjI2NDI1Ng==&mid=2247484781&idx=1&sn=725693ce15070d359938fdf8d8150f59",
"description": "回顾下2024年挖的一些洞",
"author": "安全艺术",
"category": "安全艺术",
"pubDate": "2024-12-31T09:15:34"
},
{
"title": "Word宏样本分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487882&idx=1&sn=4d675bac7378edc520bf2fa1c78f07e2",
"description": null,
"author": "SecretTeam安全团队",
"category": "SecretTeam安全团队",
"pubDate": "2024-12-31T09:14:08"
},
{
"title": "日志分析——被入侵的 WordPress",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMjcxNzE2MQ==&mid=2247484530&idx=1&sn=a72d1b6359f2f7027e778942fe23eae2",
"description": "日志分析——被入侵的 WordPress",
"author": "白帽攻防",
"category": "白帽攻防",
"pubDate": "2024-12-31T09:06:01"
},
{
"title": "应急研判|原创最详细Windows应急响应研判思路讲解",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMDE5OTQyNQ==&mid=2247488222&idx=1&sn=89431823197e067fe4cc9e210ca5ebca",
"description": "本次视频学习以下内容Windows主机排查、WEB日志研研判分析、综合流量分析主要知识点利用任何可利用的工具进行快速应急研判不限于命令行视频讲的比较细所以时长较长请沉浸式观看",
"author": "州弟学安全",
"category": "州弟学安全",
"pubDate": "2024-12-31T09:03:19"
},
{
"title": "攻击者正在利用 Four-Faith 工业路由器中的命令注入漏洞来部署反向 shell",
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NzAwOTg4NQ==&mid=2649793690&idx=3&sn=6545990d8d094c2f6b2efa2c79bf0e8a",
"description": "对工业路由器的攻击行动。",
"author": "军哥网络安全读报",
"category": "军哥网络安全读报",
"pubDate": "2024-12-31T09:00:40"
},
{
"title": "利用云服务实现分布式信息收集&&新插件",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMDY5OTA3OA==&mid=2247483755&idx=1&sn=c64fc33dc9fed3035c74effb79a4319e",
"description": null,
"author": "SecSentry",
"category": "SecSentry",
"pubDate": "2024-12-31T08:30:48"
},
{
"title": "Weblogic 8.x早期版本后台部署war包获取shell方法与坑点总结",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyMDM4NDM5Ng==&mid=2247490003&idx=1&sn=0bedacadfd73ce1b8527185f53972a86",
"description": "过去几年在内网中多次遇到weblogic 8.x与10.x及后续版本相比早期版本的weblogic后台获取shell的过程会比较复杂",
"author": "安全洞察知识图谱",
"category": "安全洞察知识图谱",
"pubDate": "2024-12-31T08:30:31"
},
{
"title": "漏洞预警 | GeoServer远程代码执行漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491934&idx=1&sn=c056c4384930ffec5352c63b06b11434",
"description": "GeoServer的/geoserver/wfs接口存在远程代码执行漏洞如果应用程序使用某些GeoTools功能来评估用户输入提供的XPath表达式则未经身份验证的攻击者可以通过该漏洞远程执行任意代码从而控制目标服务器。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2024-12-31T08:03:53"
},
{
"title": "漏洞预警 | Sophos Firewall SQL注入、弱凭证和代码注入漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491934&idx=3&sn=d94a3dfc31a0ad8f9e870fdff248dc44",
"description": "Sophos Firewall存在多个安全漏洞攻击者可通过漏洞获取敏感信息、特权访问、执行任意代码等建议相关用户及时更新。",
"author": "浅安安全",
"category": "浅安安全",
"pubDate": "2024-12-31T08:03:53"
},
{
"title": "MuMu模拟器Frida 逆向某颜色APP实战",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MzMzNTUzMA==&mid=2247485990&idx=1&sn=e53fd4c06aa08935844f4aeabb00ee50",
"description": "免责声明由于传播、利用本公众号SSP安全研究所提供的信息而造成的任何直接或者间接的后果及损失均由使用者本人",
"author": "SSP安全研究",
"category": "SSP安全研究",
"pubDate": "2024-12-31T08:00:31"
},
{
"title": "警惕!锐捷网络云平台曝严重漏洞,全球约 5 万台设备或遭远程控制!",
"link": "https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899889&idx=1&sn=6060673f25972e58339a5a40ae67e4be",
"description": "近日,网络安全研究人员发现锐捷网络开发的云管理平台存在多个安全漏洞,攻击者可以利用这些漏洞控制接入该平台的网络设备。",
"author": "技术修道场",
"category": "技术修道场",
"pubDate": "2024-12-31T08:00:11"
},
{
"title": "【神兵利器】基于PE Patch后渗透免杀工具",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494392&idx=1&sn=e8f6de1032f93d1fe80ea8c5bfce5ce4",
"description": null,
"author": "七芒星实验室",
"category": "七芒星实验室",
"pubDate": "2024-12-31T07:00:13"
},
{
"title": "Kerberos协议之AS_REQ&AS_REP",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494392&idx=2&sn=d2c5e1af4cc775d8403dc1d43c17166c",
"description": null,
"author": "七芒星实验室",
"category": "七芒星实验室",
"pubDate": "2024-12-31T07:00:13"
},
{
"title": "CVE-2024-42327Zabbix SQL注入漏洞分析漏洞分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247517945&idx=1&sn=866df104f09aad13fccf1e26c6c78bc8",
"description": null,
"author": "船山信安",
"category": "船山信安",
"pubDate": "2024-12-31T02:00:20"
},
{
"title": "Four-Faith 路由器pre-auth 命令注入漏洞CVE-2024-12856",
"link": "https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247494831&idx=1&sn=5aaadb7d61edb505bc39101bbd83d4b9",
"description": "此漏洞允许远程攻击者通过 /apply.cgi 接口的 adj_time_year 参数在修改设备系统时间submit_type=adjust_sys_time时注入恶意命令。",
"author": "锋刃科技",
"category": "锋刃科技",
"pubDate": "2024-12-31T00:15:42"
},
{
"title": "利用白加黑静/动态逃逸杀软",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwNjczOTQwOA==&mid=2247493760&idx=1&sn=6d4d7227c23451c32bddd0f938a694d3",
"description": null,
"author": "星落安全团队",
"category": "星落安全团队",
"pubDate": "2024-12-31T00:00:44"
},
{
"title": "记一次某红蓝演练经历",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486396&idx=1&sn=1c3899153360d0cf36bd7469b356fccb",
"description": null,
"author": "TtTeam",
"category": "TtTeam",
"pubDate": "2024-12-31T00:00:14"
},
{
"title": "【漏洞预警】Craft CMS register_argc_argv 致模板注入代码执行漏洞CVE-2024-56145",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489376&idx=1&sn=c143a56e17c582e5f043c8486dacb182",
"description": null,
"author": "飓风网络安全",
"category": "飓风网络安全",
"pubDate": "2024-12-30T22:54:39"
},
{
"title": "【免杀实战】 - 低权限kill火绒让火绒6.0内存扫描形同虚设",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNDUzNjk4MQ==&mid=2247484809&idx=1&sn=e6b27e3ceffc6692ee50c8ee813cb39b",
"description": "火绒正在绞尽脑子的保护你的电脑!!!",
"author": "零攻防",
"category": "零攻防",
"pubDate": "2024-12-30T21:57:19"
},
{
"title": "CVE-2024-21182 - Oracle Weblogic Server 漏洞利用 PoC 发布",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526526&idx=1&sn=b40e4e0b3bfdf287bdb7d6d93a01a914",
"description": null,
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2024-12-30T20:19:59"
},
{
"title": "Krueger 是一种概念验证 (PoC) .NET 后利用工具",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526526&idx=2&sn=cef20dd8649aac66ad56c7106ed00265",
"description": null,
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2024-12-30T20:19:59"
},
{
"title": "近期 Apache Struts 2 严重漏洞开始被利用",
"link": "https://mp.weixin.qq.com/s?__biz=MzU1NjczNjA0Nw==&mid=2247486138&idx=1&sn=ea815812a6b145f0e3cff283fef7d86e",
"description": "研究人员警告称,恶意攻击利用 Apache Struts 2 中最近修补的严重漏洞,导致远程代码执行 (RCE)。",
"author": "三沐数安",
"category": "三沐数安",
"pubDate": "2024-12-30T19:53:51"
},
{
"title": "webshell取证工具 - webshell-decryptor",
"link": "https://mp.weixin.qq.com/s?__biz=MzIzNTE0Mzc0OA==&mid=2247486017&idx=1&sn=f782c6501d8c4529267e674e968698ff",
"description": null,
"author": "GSDK安全团队",
"category": "GSDK安全团队",
"pubDate": "2024-12-30T19:48:03"
},
{
"title": "复测 Apache Tomcat 远程代码执行漏洞(CVE-2024-50379)",
"link": "https://mp.weixin.qq.com/s?__biz=MzU4NDY3MTk2NQ==&mid=2247491006&idx=1&sn=ae1eb85988018523b6fede2de404e828",
"description": "1、可以跨目录进行上传文件除了../和./ ,必须知道目录,不然报错\\\\x0d\\\\x0a\\\\x0d\\\\x0a2、功能点如果只是读取文件不落地该漏洞不会有影响\\\\x0d\\\\x0a\\\\x0d\\\\x0a3、全版本存在漏洞",
"author": "网安守护",
"category": "网安守护",
"pubDate": "2024-12-30T19:05:52"
},
{
"title": "安全卫士 | 魔方安全漏洞周报",
"link": "https://mp.weixin.qq.com/s?__biz=MzI3NzA5NDc0MA==&mid=2649291998&idx=1&sn=36120636ca1c352ce916cebd14212209",
"description": "成事在微,筑防于先。魔方安全提醒您:注意企业网络空间资产安全!",
"author": "魔方安全",
"category": "魔方安全",
"pubDate": "2024-12-30T18:31:00"
},
{
"title": "Palo Alto 修复已遭利用的严重PAN-OS DoS 漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247521932&idx=1&sn=518332fa38f3263ee23df7a70c1187d3",
"description": "速修复",
"author": "代码卫士",
"category": "代码卫士",
"pubDate": "2024-12-30T18:12:31"
},
{
"title": "细说软件保护",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458587900&idx=1&sn=c8d213caf6ea7d09c475c09634b099a5",
"description": "看雪论坛作者IDPayne-Wu",
"author": "看雪学苑",
"category": "看雪学苑",
"pubDate": "2024-12-30T17:59:30"
},
{
"title": "CS免杀姿势",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNTIwNTkyNg==&mid=2247552839&idx=1&sn=c7854ed5aca05663f752275799218405",
"description": null,
"author": "蚁景网络安全",
"category": "蚁景网络安全",
"pubDate": "2024-12-30T17:36:33"
},
{
"title": "资产收集常用工具以及思路总结",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247569252&idx=1&sn=e54c1fa0bea69d42456678ba88583486",
"description": null,
"author": "马哥网络安全",
"category": "马哥网络安全",
"pubDate": "2024-12-30T17:03:21"
},
{
"title": "某小型CMS漏洞复现审计",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNTY3Nzc3Mg==&mid=2247488005&idx=1&sn=62d81de1aeddc3b12a7c5e00acfa04cb",
"description": "记录一次CMS的漏洞复现过程。",
"author": "蚁景网安",
"category": "蚁景网安",
"pubDate": "2024-12-30T16:30:19"
},
{
"title": "2024年网鼎杯初赛和半决赛部分题解--PWN",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxNTc1MzQyNw==&mid=2247488717&idx=1&sn=6650a89222f154da3605f27cf7fa1c21",
"description": null,
"author": "Undefin3d安全团队",
"category": "Undefin3d安全团队",
"pubDate": "2024-12-30T14:29:08"
},
{
"title": "【工具分享】SpringBootVul-GUI 半自动图形化打点工具",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4MTkwMTI5Mw==&mid=2247488486&idx=1&sn=8447ecb599d814fcfe6e6e317e3fa092",
"description": "本着简单到极致的原则开发了这么一款半自动化工具PS这个工具所包含多个漏洞开发不易)",
"author": "星悦安全",
"category": "星悦安全",
"pubDate": "2024-12-30T12:11:16"
},
{
"title": "漏洞分析 | Apache SkyWalking SQL注入漏洞分析",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5Njg5ODM0OQ==&mid=2247485970&idx=1&sn=9b76a2caa9f387177dd7ead1489c5aad",
"description": "当SkyWalking使用H2、MySQL或者TiDB作为存储方案时攻击者可通过默认未授权的GraphQL接口构造恶意请求从而获取敏感数据。",
"author": "杂七杂八聊安全",
"category": "杂七杂八聊安全",
"pubDate": "2024-12-30T11:36:29"
},
{
"title": "免杀基础-DLL注入详解学不会你打我",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg5MDg3OTc0OA==&mid=2247489203&idx=1&sn=5d24620f587994655eff662e827dc137",
"description": null,
"author": "Relay学安全",
"category": "Relay学安全",
"pubDate": "2024-12-30T11:35:19"
},
{
"title": "记一次某红蓝演练经历",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzMjIxNjExNg==&mid=2247486094&idx=1&sn=e704a94ef7316948bf0aaeec785f2c29",
"description": null,
"author": "沃克学安全",
"category": "沃克学安全",
"pubDate": "2024-12-30T11:24:51"
},
{
"title": "【技术分享】微信小程序AppSecret秘钥利用方式",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMTY1MTIzOA==&mid=2247484459&idx=1&sn=8f70d6d283f4aa7949b14a75ac65dc85",
"description": "AppID与AppSecret可以调用接口获取临时登录凭证access_token用于在开发过程中验证用户身份。通过获取到的access_token可以在微信开发平台调式工具调用接口进行调式可以理解为接管接口提供的一系列服务。",
"author": "剁椒Muyou鱼头",
"category": "剁椒Muyou鱼头",
"pubDate": "2024-12-30T10:22:15"
},
{
"title": "记一次某红蓝实战演练的经历",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486390&idx=1&sn=c3cde76e6b3df4698e512f60e9c0cdec",
"description": null,
"author": "TtTeam",
"category": "TtTeam",
"pubDate": "2024-12-30T10:20:24"
},
{
"title": "记一次某红蓝实战演练的经历",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605966&idx=3&sn=a520a4b214874df858c7956733b8373d",
"description": null,
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2024-12-30T10:15:16"
},
{
"title": "APP客户端安全问题扫描工具",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650605966&idx=4&sn=7001edcbe19c8e314026639aaa2f362a",
"description": null,
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2024-12-30T10:15:16"
},
{
"title": "急需升级D-Link 路由器漏洞被僵尸网络广泛用于 DDoS 攻击",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg3NTY0MjIwNg==&mid=2247485293&idx=1&sn=1138242da1a830b127c4b00f230940f8",
"description": "Mirai 和 Keksec 僵尸网络变体正在利用 D-Link 路由器中的关键漏洞",
"author": "星尘安全",
"category": "星尘安全",
"pubDate": "2024-12-30T10:00:55"
},
{
"title": "16 款 Chrome 插件被黑60W+用户面临数据被盗风险",
"link": "https://mp.weixin.qq.com/s?__biz=MjM5Mzc4MzUzMQ==&mid=2650260337&idx=1&sn=854e45d4bb0f235f913a467c9a9b5896",
"description": null,
"author": "骨哥说事",
"category": "骨哥说事",
"pubDate": "2024-12-30T09:55:02"
},
{
"title": "初探免杀与持久化",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNzI2Mzc0Ng==&mid=2247486374&idx=1&sn=ac6969783db2c7d82ff98224ed21ba0f",
"description": "“A9 Team 甲方攻防团队,成员来自某证券、微步、青藤、长亭、安全狗等公司。",
"author": "A9 Team",
"category": "A9 Team",
"pubDate": "2024-12-30T09:47:32"
},
{
"title": "记一次某红蓝演练经历",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0MTIzNTgzMQ==&mid=2247518973&idx=1&sn=666b20eacb63dbb1b7b2e4f76c06feab",
"description": null,
"author": "亿人安全",
"category": "亿人安全",
"pubDate": "2024-12-30T09:45:01"
} }
] ]

View File

@ -1,4 +1,44 @@
[ [
{
"title": "恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户",
"link": "https://www.freebuf.com/news/419140.html",
"description": "一种名为PLAYFULGHOST的新恶意软件具有多种信息收集功能例如键盘记录、屏幕捕获、音频捕获、远程 shell 以及文件传输/执行。",
"body": "<p>网络安全研究人员发现一种名为PLAYFULGHOST的新恶意软件它具有多种信息收集功能例如键盘记录、屏幕捕获、音频捕获、远程 shell 以及文件传输/执行。</p><p>据谷歌安全团队称该后门与一种名为Gh0st RAT 的已知远程管理工具在功能上存在重叠,后者的源代码于 2008 年被公开泄露。</p><p>PLAYFULGHOST 的初始访问途径包括使用带有行为准则相关诱饵的网络",
"category": "资讯",
"pubDate": "Mon, 06 Jan 2025 13:42:35 +0800"
},
{
"title": "LegionLoader滥用Chrome扩展传播多种恶意软件",
"link": "https://www.freebuf.com/news/419136.html",
"description": "据gbhackers消息名为LegionLoader 的恶意软件正通过Chrome 扩展分发窃密软件,包括对受害者实施电子邮件操纵、跟踪浏览,甚至将受感染的浏览器转变为攻击者的代理服务器,使其能够使用受害者的凭证浏览网页。自 2024 年 8 月以来研究人员观察到LegionLoader 通过 Chrome 扩展程序分发各种窃取程序,包括 LummaC2、Rhadamanthys 和 Stea",
"body": "<p>据gbhackers消息名为LegionLoader 的恶意软件正通过Chrome 扩展分发窃密软件,包括对受害者实施电子邮件操纵、跟踪浏览,甚至将受感染的浏览器转变为攻击者的代理服务器,使其能够使用受害者的凭证浏览网页。<img src=\"https://image.3001.net/images/20250106/1736134823_677b50a71ce2410384ecc.jpg",
"category": "资讯",
"pubDate": "Mon, 06 Jan 2025 11:38:08 +0800"
},
{
"title": "大量恶意npm包盯上了开发者",
"link": "https://www.freebuf.com/news/419131.html",
"description": "研究人员发现有大量的恶意npm软件包冒充以太坊开发者使用的Hardhat开发环境正在窃取私钥和其他敏感数据。",
"body": "<p>近日研究人员发现有大量的恶意npm软件包它们冒充以太坊开发者使用的Hardhat开发环境正在窃取私钥和其他敏感数据。研究人员称这些恶意软件包总共被下载了一千多次。</p><p><img src=\"https://image.3001.net/images/20250106/1736132495_677b478f1af59302ff596.png!small\" alt=\"\" /></",
"category": "资讯",
"pubDate": "Mon, 06 Jan 2025 10:58:21 +0800"
},
{
"title": "【情报】大型泄密库搜索引擎-libraryofleaks",
"link": "https://www.freebuf.com/news/419128.html",
"description": "这个平台允许用户搜索数百万份来自数十起泄密事件的文件,而且每天都会添加更多的数据。",
"body": "<p><code>libraryofleaks</code>是由分布式拒绝秘密组织(<code>Distributed Denial of Secrets</code>,简称<code>DDoSecrets</code>)推出的一个公共搜索引擎,被称为“泄密库”(<code>Library of Leaks</code>),这个平台允许用户搜索数百万份来自数十起泄密事件的文件,而且每天都会添加更多",
"category": "资讯",
"pubDate": "Mon, 06 Jan 2025 10:43:48 +0800"
},
{
"title": "知名化工巨头被勒索攻击泄露761.8GB数据",
"link": "https://www.freebuf.com/news/419127.html",
"description": "此次攻击涉及对其部分服务器上的电子数据进行加密而勒索软件组织Hunters International声称对此事负责。",
"body": "<p>Nikki - Universal有限公司是一家知名的化学制造商近期沦为一起复杂勒索软件攻击的受害者。该公司于2024年12月27日证实了这一事件此次攻击涉及对其部分服务器上的电子数据进行加密而勒索软件组织Hunters International声称对此事负责。</p><p><img src=\"https://image.3001.net/images/20250106/173613",
"category": "资讯",
"pubDate": "Mon, 06 Jan 2025 10:41:31 +0800"
},
{ {
"title": "【全球首发】【6w$赏金】微软身份漏洞-未授权强制解绑任意微软账户邮箱", "title": "【全球首发】【6w$赏金】微软身份漏洞-未授权强制解绑任意微软账户邮箱",
"link": "https://www.freebuf.com/vuls/419097.html", "link": "https://www.freebuf.com/vuls/419097.html",
@ -23,6 +63,22 @@
"category": "观点", "category": "观点",
"pubDate": "Sat, 04 Jan 2025 14:01:04 +0800" "pubDate": "Sat, 04 Jan 2025 14:01:04 +0800"
}, },
{
"title": "FreeBuf早报 | 华硕路由器漏洞允许任意代码执行用户集体起诉Siri“偷听”",
"link": "https://www.freebuf.com/news/419064.html",
"description": "这些漏洞可能允许经过身份验证的攻击者通过华硕路由器的 AiCloud 功能触发命令执行。",
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 超过300万台未加密的邮件服务器暴露</h3><p>目前超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上容易受到网络嗅探攻击。【外刊-<a href=\"https://www.bleepingcomputer.com/news/security/over-3-million-mail-se",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 20:35:15 +0800"
},
{
"title": "Threatcl一款威胁模型记录与归档工具",
"link": "https://www.freebuf.com/sectool/419060.html",
"description": "Threatcl是一款功能强大的威胁记录模型可以帮助广大研究人员更加清楚地记录威胁并推动安全态势的提升。",
"body": "<h2 id=\"h2-1\">关于Threatcl</h2><p>Threatcl是一款功能强大的威胁记录模型可以帮助广大研究人员更加清楚地记录威胁并推动安全态势的提升。</p><p><img src=\"https://image.3001.net/images/20250103/1735901406_6777c0deeaae638d26c6a.png!small\" width=\"690\" he",
"category": "工具",
"pubDate": "Fri, 03 Jan 2025 18:53:44 +0800"
},
{ {
"title": "一周网安优质PDF资源推荐丨FreeBuf知识大陆", "title": "一周网安优质PDF资源推荐丨FreeBuf知识大陆",
"link": "https://www.freebuf.com/articles/419042.html", "link": "https://www.freebuf.com/articles/419042.html",
@ -95,67 +151,11 @@
"pubDate": "Thu, 02 Jan 2025 23:16:05 +0800" "pubDate": "Thu, 02 Jan 2025 23:16:05 +0800"
}, },
{ {
"title": "shiro-core 框架分析", "title": "漏洞分析 | Wordress Tutor LMS SQL注入漏洞(CVE-2024-10400)",
"link": "https://www.freebuf.com/articles/web/413356.html", "link": "https://www.freebuf.com/vuls/418348.html",
"description": "shiro-core 框架分析", "description": "Tutor LMS Pro是一个智能、简单且可扩展的WordPress LMS插件它配备了革命性的拖放系统来创建丰富的课程。",
"body": "<h1>shiro-core</h1><p>本篇文章只阐述最核心内容从整体描述shiro-core目的是能在研究shiro的漏洞时有一个全局观因此不可能涉及全部细节。</p><ul><li><p><a href=\"https://shiro.apache.org/introduction.html\">Introduction to Apache Shiro | Apache Shiro</a", "body": "<h2 id=\"h2-1\">插件介绍:</h2><p>Tutor LMS Pro是一个智能、简单且可扩展的WordPress LMS插件它配备了革命性的拖放系统来创建丰富的课程丰富而简单。Tutor LMS*不仅让你能够在线传播您的知识,也可以帮助你通过在线销售课程赚钱。它提供了对发生的交易的进行完全控制的设施。</p><h2 id=\"h2-2\">漏洞概述:</h2><p>由于对用户提供的参数",
"category": "Web安全",
"pubDate": "Thu, 02 Jan 2025 20:40:16 +0800"
},
{
"title": "FreeBuf早报 | 作者辟谣7-Zip存零日漏洞法国多地网站遭遇黑客攻击",
"link": "https://www.freebuf.com/news/418936.html",
"description": "12月31日法国多个城镇和省份的网站无法访问。此前一个黑客团体声称发动网络攻击以报复法国支持乌克兰。",
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 美财政部称遭到“中国政府支持的黑客”攻击,中方回应</h3><p>中方一贯反对各种形式的黑客攻击,更反对出于政治目的散布针对中国的虚假信息。 【<a href=\"http://usa.people.com.cn/n1/2025/0102/c241376-40394097.html\"><u>阅读原文</u></a>】</",
"category": "资讯",
"pubDate": "Thu, 02 Jan 2025 15:45:09 +0800"
},
{
"title": "分享OAuth2.0原理及漏洞挖掘技巧案例分析",
"link": "https://www.freebuf.com/vuls/418923.html",
"description": "这篇文章主要是从一个简单的案例来开头然后后面讲OAuth2.0原理以及相关的一些相关知识。",
"body": "<h2 id=\"h2-1\">0x1 前言</h2><h3 id=\"h3-1\">一、浅谈</h3><p>不知道师傅们平常有没有碰到就是在登录比如说百度时,登录页面有需要使用一段第三方社交媒体的账户(QQ、微博、微信)登录的情况而这种大多数都是使用OAuth 2.0框架构建的。</p><p>然而再挖掘SRC的过程中在听别的师傅讲课听到关于这方面的只是这次特地来学习OAuth2.0原理及漏洞挖掘技",
"category": "漏洞", "category": "漏洞",
"pubDate": "Thu, 02 Jan 2025 13:40:21 +0800" "pubDate": "Thu, 02 Jan 2025 20:44:33 +0800"
},
{
"title": "新的“DoubleClickjacking”漏洞可绕过网站的劫持保护",
"link": "https://www.freebuf.com/news/418913.html",
"description": "该漏洞通过利用双击操作来推动点击劫持攻击及账户接管,几乎波及所有大型网站。",
"body": "<p>安全专家揭示了一种新型的“普遍存在的基于时间的漏洞”该漏洞通过利用双击操作来推动点击劫持攻击及账户接管几乎波及所有大型网站。这一技术已被安全研究员Paulos Yibelo命名为“DoubleClickjacking”。</p><p><img src=\"https://image.3001.net/images/20250102/1735789931_67760d6b5512ab30e8",
"category": "资讯",
"pubDate": "Thu, 02 Jan 2025 11:46:14 +0800"
},
{
"title": "至少35个Chrome扩展被劫持新细节揭示了黑客的攻击手法",
"link": "https://www.freebuf.com/news/418912.html",
"description": "近期黑客针对多个Chrome扩展程序进行了攻击数十万用户受到影响。随着调查的深入一些攻击活动细节也得到了披露。",
"body": "<p>据BleepingComputer消息近期黑客针对多个Chrome扩展程序进行了攻击数十万用户受到影响。随着调查的深入一些攻击活动细节也得到了披露。</p><p>根据最新调查,攻击导致至少 35 个扩展程序被植入数据窃取代码,较之前的初步怀疑数量直接翻倍,其中包括来自网络安全公司 Cyberhaven 的扩展。尽管最初的报道集中在 Cyberhaven 的安全扩展上,但随后的调查显示",
"category": "资讯",
"pubDate": "Thu, 02 Jan 2025 11:41:04 +0800"
},
{
"title": "Windows 曝9.8分漏洞已有PoC及利用情况",
"link": "https://www.freebuf.com/news/418909.html",
"description": "CVE - 2024 - 49112属于远程代码执行RCE漏洞会对包括域控制器DC在内的Windows服务器产生影响。",
"body": "<p>SafeBreach Labs的研究人员发布了关于Windows轻量级目录访问协议LDAP的一个关键漏洞的概念验证PoC和漏洞利用方法该漏洞编号为CVE - 2024 - 49112。微软在2024年12月10日的补丁星期二更新中披露了此漏洞其CVSS严重性评分高达9.8。</p><p>CVE - 2024 - 49112属于远程代码执行RCE漏洞会对包括域控制器DC在",
"category": "资讯",
"pubDate": "Thu, 02 Jan 2025 11:29:58 +0800"
},
{
"title": "记一次CNVD证书的挖掘方式",
"link": "https://www.freebuf.com/articles/web/418887.html",
"description": "越权漏洞,用户能够修改或访问其他用户(包括管理员)的数据或权限。",
"body": "<h2 id=\"h2-1\">漏洞挖掘背景</h2><p>在Fofa上随便逛逛 突然看到了某某系统 好奇就点了进去</p><h2 id=\"h2-2\">漏洞发现与利用步骤</h2><p><img src=\"https://image.3001.net/images/20250101/1735726269_677514bde6b4ee044cf72.png!small?1735726271056\" al",
"category": "Web安全",
"pubDate": "Wed, 01 Jan 2025 18:33:17 +0800"
},
{
"title": "漏洞分析 | Apache Struts文件上传漏洞CVE-2024-53677",
"link": "https://www.freebuf.com/vuls/418881.html",
"description": "目前该漏洞POC状态已在互联网公开",
"body": "<h2 id=\"h2-1\">漏洞概述</h2><p>Apache Struts是美国阿帕奇Apache基金会的一个开源项目是一套用于创建企业级Java Web应用的开源MVC框架。</p><p>近期网宿安全演武实验室监测到Apache Struts在特定条件下存在文件上传漏洞网宿评分高危、CVSS 3.0 评分8.1</p><p>攻击者可以操纵文件上传参数来实现路径遍历,在某些",
"category": "漏洞",
"pubDate": "Tue, 31 Dec 2024 19:47:46 +0800"
} }
] ]

View File

@ -1,4 +1,18 @@
[ [
{
"guid": "https://forum.butian.net/share/4011",
"title": "结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践",
"description": "本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具特别是“通义灵码”帮助发现了多个高危漏洞包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证并分享了使用“通义灵码”的心得和体验。最后作者总结了AI在代码审计中的优势和不足并展望了未来的发展方向。",
"source": "subject",
"pubDate": "2025-01-06 10:00:00"
},
{
"guid": "https://forum.butian.net/share/4002",
"title": "Windows进程",
"description": "进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。",
"source": "subject",
"pubDate": "2025-01-06 09:00:02"
},
{ {
"guid": "https://forum.butian.net/share/3992", "guid": "https://forum.butian.net/share/3992",
"title": "一次窃取程序的恶意样本分析", "title": "一次窃取程序的恶意样本分析",
@ -54,19 +68,5 @@
"description": "样本\r\nIOC\r\nMD5749dfc8bf52422ce77ed59a60c2f395e\r\nSHA1d0593187a473a19564a67819050023c9144b30c2\r\nSHA256 5c205cffc83f7be274773fb1c3aa356b29d97e4d62a83e79c5fd52eadc3ed695\r\n概述\r\n语言C...", "description": "样本\r\nIOC\r\nMD5749dfc8bf52422ce77ed59a60c2f395e\r\nSHA1d0593187a473a19564a67819050023c9144b30c2\r\nSHA256 5c205cffc83f7be274773fb1c3aa356b29d97e4d62a83e79c5fd52eadc3ed695\r\n概述\r\n语言C...",
"source": "subject", "source": "subject",
"pubDate": "2024-12-30 09:00:01" "pubDate": "2024-12-30 09:00:01"
},
{
"guid": "https://forum.butian.net/share/4013",
"title": "Vulnserver.exe漏洞分析及利用",
"description": "本章为笔者在学习二进制安全过程中的学习记录vulnserver为公开的二进制漏洞的练习程序本章节的内容为vulnserver.exe的漏洞分析及复现主要通过windbg和ida结合进行分析。因为vulnserver存在多种调试漏洞本文主要使用trun参数进行漏洞分析及利用。",
"source": "subject",
"pubDate": "2024-12-27 10:00:01"
},
{
"guid": "https://forum.butian.net/share/3954",
"title": "ios下某浏览器小说去广告分析与Hook",
"description": "支持正版,从我做起,仅供学习!!",
"source": "subject",
"pubDate": "2024-12-27 09:00:02"
} }
] ]

122
resources/JSON/seebug.json Normal file
View File

@ -0,0 +1,122 @@
[
{
"title": "基于差分隐私的检索增强生成\n",
"link": "https://paper.seebug.org/3265/",
"description": "作者Nicolas Grislain\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2412.19291v1#Sx4\n摘要\n检索增强生成Retrieval-Augmented Generation, RAG已成为为大型语言模型Large Language Models, LLM提供最新且相关上下文的主流技术。这一技术可以缓解模型生成不准确...\n",
"pubDate": "Thu, 02 Jan 2025 07:44:00 +0000",
"guid": "https://paper.seebug.org/3265/",
"category": "AI安全"
},
{
"title": "Qemu重入漏洞梳理 & CVE-2024-3446分析\n",
"link": "https://paper.seebug.org/3264/",
"description": "作者:华为安全应急响应中心\n原文链接https://mp.weixin.qq.com/s/gWK5JwzLz8qdfG4VUJqVhA\n1 简介\n主要是分析CVE-2024-3446漏洞的成因和漏洞的补丁以及之前的补丁为何失效顺便对Qemu历史重入漏洞进行了分析梳理\n2 时间线\n\n\n2020/07/21 e1000e重入导致的UAF还没归为重入问题\n\n\n2021/08/23 重入漏...\n",
"pubDate": "Mon, 30 Dec 2024 07:35:00 +0000",
"guid": "https://paper.seebug.org/3264/",
"category": "漏洞分析"
},
{
"title": "使用开源大语言模型将安全通告与易受攻击的函数配对\n",
"link": "https://paper.seebug.org/3263/",
"description": "作者Trevor Dunlap, John Speed Meyers, Bradley Reaves, and William Enck.\n译者知道创宇404实验室翻译组\n原文链接https://www.enck.org/pubs/dunlap-dimva24.pdf\n摘要\n随着对开源软件依赖性的需求不断增加管理这些依赖中的安全漏洞变得愈加复杂。当前最先进的工业工具通过代码的可达性分...\n",
"pubDate": "Mon, 30 Dec 2024 06:34:00 +0000",
"guid": "https://paper.seebug.org/3263/",
"category": "AI安全"
},
{
"title": "假 Zoom 会议钓鱼分析\n",
"link": "https://paper.seebug.org/3262/",
"description": "作者Reborn, Lisa@慢雾安全团队\n原文链接https://mp.weixin.qq.com/s/bPGbEdTCKaM9uJhaRXlO6A\n背景\n近期X 上多位用户报告了一种伪装成 Zoom 会议链接的钓鱼攻击手法,其中一受害者在点击恶意 Zoom 会议链接后安装了恶意软件,导致加密资产被盗,损失规模达百万美元。在此背景下,慢雾安全团队对这类钓鱼事件和攻击手法展开分析,并追...\n",
"pubDate": "Fri, 27 Dec 2024 07:08:00 +0000",
"guid": "https://paper.seebug.org/3262/",
"category": "情报分析"
},
{
"title": "[Agent]WKM在智能代理中注入世界知识\n",
"link": "https://paper.seebug.org/3261/",
"description": "作者:简单的机器学习\n原文链接https://mp.weixin.qq.com/s/2pn3QGLWWbG5yW-G2Ap9Yg\n在面对特定任务时人们往往会首先利用丰富的先验知识在大脑中简要演练整个过程然后再执行无意识的动作。称这种知识为全局任务知识也称为环境/任务常识)。此外,在任务过程中,心智世界知识模型会不断维持一种局部状态知识,代表人类对当前世界状态的认知。例如,想象你在一个...\n",
"pubDate": "Thu, 26 Dec 2024 07:28:00 +0000",
"guid": "https://paper.seebug.org/3261/",
"category": "AI安全"
},
{
"title": "卡巴斯基禁令之后的影响\n",
"link": "https://paper.seebug.org/3260/",
"description": "作者Pedro Umbelino, Jake Olcott\n译者知道创宇404实验室翻译组\n原文链接https://www.bitsight.com/blog/aftermath-kaspersky-ban\n在2024年春全球对供应链风险的担忧日益加剧对技术供应商的信任和可靠性问题也愈发凸显。在这样的背景下美国对俄罗斯的杀毒软件巨头卡巴斯基实验室下了禁令禁止其产品进入美国市场。...\n",
"pubDate": "Wed, 25 Dec 2024 02:52:00 +0000",
"guid": "https://paper.seebug.org/3260/",
"category": "情报分析"
},
{
"title": "以大模型为目标的威胁攻击与安全思考\n",
"link": "https://paper.seebug.org/3259/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/YL37d_PjiFJkarEjcrTdiA\n一、概 述\n自2023年以来以ChatGPT为代表的大语言模型LLM向人们展现出了人工智能所具有的无限潜力为各行业带来了全新的发展模式和生产力提升。以大语言模型为基础的智能平台及系统也逐渐成为国家和企业的一种重要的基础设施面对这样一种全新的基础设施...\n",
"pubDate": "Mon, 23 Dec 2024 08:21:00 +0000",
"guid": "https://paper.seebug.org/3259/",
"category": "AI安全"
},
{
"title": "趋利避害的大模型行为:伪对齐\n",
"link": "https://paper.seebug.org/3258/",
"description": "作者Ryan Greenblatt, Carson Denison等\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/abs/2412.14093v1\n摘要\n我们在此呈现了一项关于大型语言模型在训练过程中进行“对齐伪装”行为的演示该模型有选择地遵从其训练目标以防止其行为在训练之外被改变。具体来说我们首先向Claude 3 Opus模型提供了一个系统提示...\n",
"pubDate": "Mon, 23 Dec 2024 03:06:00 +0000",
"guid": "https://paper.seebug.org/3258/",
"category": "AI安全"
},
{
"title": "找出披着羊皮的狼:通过文本摘要技术破解对抗性文本到图像提示\n",
"link": "https://paper.seebug.org/3257/",
"description": "作者Portia Cooper, Harshita Narnoli, Mihai Surdeanu\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/pdf/2412.12212\n摘要\n文本到图像模型常常遭受一种称为“分而治之攻击”DACA的逐步攻击该攻击通过大型语言模型将敏感文本包装在看似无害的叙述中以隐藏不当内容。为了有效抵御这种逐步DACA攻击...\n",
"pubDate": "Fri, 20 Dec 2024 07:43:00 +0000",
"guid": "https://paper.seebug.org/3257/",
"category": "AI安全"
},
{
"title": "探索 AI 驱动的网络安全框架深度学习技术、GPU 支持和未来增强\n",
"link": "https://paper.seebug.org/3255/",
"description": "作者Tobias Becher, Simon Torka\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/pdf/2412.12648\n摘要\n传统的基于规则的网络安全系统在防御已知恶意软件方面表现出色但面对新型威胁它们却显得力不从心。为应对这一挑战新一代网络安全系统开始融合人工智能技术尤其是深度学习算法以提升其识别事件、分析警报和响应安全事件的能力...\n",
"pubDate": "Fri, 20 Dec 2024 01:14:00 +0000",
"guid": "https://paper.seebug.org/3255/",
"category": "AI安全"
},
{
"title": "Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)\n",
"link": "https://paper.seebug.org/3256/",
"description": "作者y4tacker\n原文链接https://y4tacker.github.io/2024/12/16/year/2024/12/Apache-Struts2-文件上传逻辑绕过-CVE-2024-53677-S2-067/\n前言\nApache官方公告又更新了一个Struts2的漏洞考虑到很久没有发无密码的博客了再加上漏洞的影响并不严重因此公开分享利用的思路。\n分析\n影响版本\nSt...\n",
"pubDate": "Thu, 19 Dec 2024 08:37:00 +0000",
"guid": "https://paper.seebug.org/3256/",
"category": "漏洞分析"
},
{
"title": "越狱破解马斯克最新AI-Grok2揭秘特朗普赢得大选背后AI的推波助澜\n",
"link": "https://paper.seebug.org/3254/",
"description": "作者洺熙米斯特Ai安全组核心成员\n原文链接https://mp.weixin.qq.com/s/thSJwKA7RbEueQ7iYsThFQ\n序言\n你可曾想过马斯克的Ai Grok2大脑里究竟藏着什么秘密\n本文将带你潜入X平台最新AI模型Grok2的“大脑”通过对其核心指令——系统Prompt的深度解码揭开马斯克打造的这款AI的神秘面纱\n我们将一起探索\n\n从越狱谷歌Gemi...\n",
"pubDate": "Wed, 18 Dec 2024 06:02:00 +0000",
"guid": "https://paper.seebug.org/3254/",
"category": "AI安全"
},
{
"title": "AI 作为新型黑客:开发进攻性安全代理\n",
"link": "https://paper.seebug.org/3253/",
"description": "作者Leroy Jacob Valencia\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/pdf/2406.07561\n摘要\n在网络安全这一宏大领域内由防御性措施向主动防御的转变对于守护数字基础设施的安全至关重要。本文深入探讨了AI在主动防御网络安全中的角色尤其是通过研发一个名为ReaperAI的独立AI代理该代理被设计来模拟和实施网络攻击。借助于...\n",
"pubDate": "Fri, 13 Dec 2024 07:50:00 +0000",
"guid": "https://paper.seebug.org/3253/",
"category": "AI安全"
},
{
"title": "Qwen2.5-Coder 技术报告\n",
"link": "https://paper.seebug.org/3252/",
"description": "公众号:简单的机器学习\n原文链接https://mp.weixin.qq.com/s/EiV7x403sVqVcABo_qd2kg\n引言\nQwen2.5-Coder 系列是阿里巴巴团队推出的一款重要的代码生成模型,相比其前代 CodeQwen1.5该系列在多个方面进行了显著的升级。Qwen2.5-Coder 系列包括两个模型Qwen2.5-Coder-1.5B 和 Qwen2.5-Co...\n",
"pubDate": "Wed, 11 Dec 2024 16:46:00 +0000",
"guid": "https://paper.seebug.org/3252/",
"category": "经验心得"
},
{
"title": "Qwen2 源码阅读——核心代码跟读\n",
"link": "https://paper.seebug.org/3251/",
"description": "公众号:简单的机器学习\n原文链接https://mp.weixin.qq.com/s/PVSPNfv0I8_cxgPTmOes5w\n我们继续使用上一节使用的样例文本\n[&amp;quot;你好啊&amp;quot;, &amp;quot;简单的机器学习是为了让机器学习变得更简单而存在的&amp;quot;]\n\n\n这个样例产生的tokens结果为\n{&#39;input_ids&#39;: tensor([[108386, 10392...\n",
"pubDate": "Wed, 11 Dec 2024 16:45:00 +0000",
"guid": "https://paper.seebug.org/3251/",
"category": "经验心得"
}
]

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

View File

@ -0,0 +1,182 @@
#### 文章:[恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户](https://www.freebuf.com/news/419140.html)
**类型**:资讯
**上传时间**2025-01-06 13:42:35
----------------------------------------
#### 文章:[LegionLoader滥用Chrome扩展传播多种恶意软件](https://www.freebuf.com/news/419136.html)
**类型**:资讯
**上传时间**2025-01-06 11:38:08
----------------------------------------
#### 文章:[大量恶意npm包盯上了开发者](https://www.freebuf.com/news/419131.html)
**类型**:资讯
**上传时间**2025-01-06 10:58:21
----------------------------------------
#### 文章:[【情报】大型泄密库搜索引擎-libraryofleaks](https://www.freebuf.com/news/419128.html)
**类型**:资讯
**上传时间**2025-01-06 10:43:48
----------------------------------------
#### 文章:[知名化工巨头被勒索攻击泄露761.8GB数据](https://www.freebuf.com/news/419127.html)
**类型**:资讯
**上传时间**2025-01-06 10:41:31
----------------------------------------
#### 文章:[2024年度十大网络安全热点事件盘点时代暗涌下的安全危机](https://www.anquanke.com/post/id/303291)
**作者** 安全客
**来源**:微信
**上传时间**2025-01-06 11:00:15
----------------------------------------
#### 文章:[关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断](https://www.anquanke.com/post/id/303282)
**作者** 安全客
**来源**TheHackersNews
**上传时间**2025-01-06 10:52:56
----------------------------------------
#### 文章:[项目隔离: PyPI 抵御恶意软件的新防线](https://www.anquanke.com/post/id/303279)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:48:40
----------------------------------------
#### 文章:[CVE-2024-12912 & CVE-2024-13062 华硕路由器面临风险](https://www.anquanke.com/post/id/303275)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:37:22
----------------------------------------
#### 文章:[35+ 款 Chrome 浏览器扩展程序遭入侵250 万用户面临风险](https://www.anquanke.com/post/id/303270)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:21:36
----------------------------------------
#### 文章:[通过恶意 npm 软件包对以太坊开发人员进行供应链攻击](https://www.anquanke.com/post/id/303267)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:11:35
----------------------------------------
#### 文章:[每分钟就有 4,080 份记录在数据泄露事件中受损](https://www.anquanke.com/post/id/303288)
**作者** 安全客
**来源**helpnetsecurity
**上传时间**2025-01-06 10:09:03
----------------------------------------
#### 文章:[SysBumps在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化](https://www.anquanke.com/post/id/303264)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:02:40
----------------------------------------
#### 文章:[现代 CISO 是组织成功的基石](https://www.anquanke.com/post/id/303285)
**作者** 安全客
**来源**helpnetsecurity
**上传时间**2025-01-06 10:01:09
----------------------------------------
#### 文章:[CVE-2025-22275 (CVSS 9.3)iTerm2 修补了暴露用户输入和输出的重大安全漏洞](https://www.anquanke.com/post/id/303259)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 09:55:57
----------------------------------------
#### 文章:[黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据](https://www.anquanke.com/post/id/303256)
**作者** 安全客
**来源**therecord
**上传时间**2025-01-06 09:51:53
----------------------------------------
#### 文章:[恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户](https://www.freebuf.com/news/419140.html)
**类型**:资讯
**上传时间**2025-01-06 13:42:35
----------------------------------------
#### 文章:[LegionLoader滥用Chrome扩展传播多种恶意软件](https://www.freebuf.com/news/419136.html)
**类型**:资讯
**上传时间**2025-01-06 11:38:08
----------------------------------------
#### 文章:[大量恶意npm包盯上了开发者](https://www.freebuf.com/news/419131.html)
**类型**:资讯
**上传时间**2025-01-06 10:58:21
----------------------------------------
#### 文章:[【情报】大型泄密库搜索引擎-libraryofleaks](https://www.freebuf.com/news/419128.html)
**类型**:资讯
**上传时间**2025-01-06 10:43:48
----------------------------------------
#### 文章:[知名化工巨头被勒索攻击泄露761.8GB数据](https://www.freebuf.com/news/419127.html)
**类型**:资讯
**上传时间**2025-01-06 10:41:31
----------------------------------------
#### 文章:[2024年度十大网络安全热点事件盘点时代暗涌下的安全危机](https://www.anquanke.com/post/id/303291)
**作者** 安全客
**来源**:微信
**上传时间**2025-01-06 11:00:15
----------------------------------------
#### 文章:[关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断](https://www.anquanke.com/post/id/303282)
**作者** 安全客
**来源**TheHackersNews
**上传时间**2025-01-06 10:52:56
----------------------------------------
#### 文章:[项目隔离: PyPI 抵御恶意软件的新防线](https://www.anquanke.com/post/id/303279)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:48:40
----------------------------------------
#### 文章:[CVE-2024-12912 & CVE-2024-13062 华硕路由器面临风险](https://www.anquanke.com/post/id/303275)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:37:22
----------------------------------------
#### 文章:[35+ 款 Chrome 浏览器扩展程序遭入侵250 万用户面临风险](https://www.anquanke.com/post/id/303270)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:21:36
----------------------------------------
#### 文章:[通过恶意 npm 软件包对以太坊开发人员进行供应链攻击](https://www.anquanke.com/post/id/303267)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:11:35
----------------------------------------
#### 文章:[每分钟就有 4,080 份记录在数据泄露事件中受损](https://www.anquanke.com/post/id/303288)
**作者** 安全客
**来源**helpnetsecurity
**上传时间**2025-01-06 10:09:03
----------------------------------------
#### 文章:[SysBumps在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化](https://www.anquanke.com/post/id/303264)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 10:02:40
----------------------------------------
#### 文章:[现代 CISO 是组织成功的基石](https://www.anquanke.com/post/id/303285)
**作者** 安全客
**来源**helpnetsecurity
**上传时间**2025-01-06 10:01:09
----------------------------------------
#### 文章:[CVE-2025-22275 (CVSS 9.3)iTerm2 修补了暴露用户输入和输出的重大安全漏洞](https://www.anquanke.com/post/id/303259)
**作者** 安全客
**来源**securityonline
**上传时间**2025-01-06 09:55:57
----------------------------------------
#### 文章:[黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据](https://www.anquanke.com/post/id/303256)
**作者** 安全客
**来源**therecord
**上传时间**2025-01-06 09:51:53
----------------------------------------

View File

@ -1,3 +1,309 @@
#### 文章:[结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践](https://forum.butian.net/share/4011)
**来源**subject
**上传时间**2025-01-06 10:00:00
**描述**本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具特别是“通义灵码”帮助发现了多个高危漏洞包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证并分享了使用“通义灵码”的心得和体验。最后作者总结了AI在代码审计中的优势和不足并展望了未来的发展方向。
----------------------------------------
#### 文章:[Windows进程](https://forum.butian.net/share/4002)
**来源**subject
**上传时间**2025-01-06 09:00:02
**描述**:进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。
----------------------------------------
#### 文章:[结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践](https://forum.butian.net/share/4011)
**来源**subject
**上传时间**2025-01-06 10:00:00
**描述**本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具特别是“通义灵码”帮助发现了多个高危漏洞包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证并分享了使用“通义灵码”的心得和体验。最后作者总结了AI在代码审计中的优势和不足并展望了未来的发展方向。
----------------------------------------
#### 文章:[Windows进程](https://forum.butian.net/share/4002)
**来源**subject
**上传时间**2025-01-06 09:00:02
**描述**:进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。
----------------------------------------
#### 文章:[CVE-2024-50379|条件竞争Tomcat RCE POC首发](https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486408&idx=1&sn=ac34350ed2c25084cb78cec5ff40275e)
**作者**TtTeam
**上传时间**2025-01-06 14:41:19
**简介**:半通杀|Tomcat RCE无敌
----------------------------------------
#### 文章:[【渗透利器】比proxifier更好用的代理神器可轻松配置代理--sunnynet](https://mp.weixin.qq.com/s?__biz=Mzk0OTY3OTc5Mw==&mid=2247484914&idx=1&sn=ffcae701630227b7da949c2c63b66b04)
**作者**:网安鲲为帝
**上传时间**2025-01-06 14:27:36
**简介**None
----------------------------------------
#### 文章:[实战攻防中的信息收集](https://mp.weixin.qq.com/s?__biz=MzkyMjU2Nzc1Mg==&mid=2247484483&idx=1&sn=8f7983ac3a289460203b71969a365dbe)
**作者**LHACK安全
**上传时间**2025-01-06 14:00:57
**简介**None
----------------------------------------
#### 文章:[CVE-2024-43452针对 Windows 特权提升漏洞的 PoC 漏洞发布](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526837&idx=1&sn=bdc1792b20bbc0e3485123421c3c240c)
**作者**Ots安全
**上传时间**2025-01-06 13:53:08
**简介**None
----------------------------------------
#### 文章:[CVE-2024-47575FortiManager FortiManager Cloud 缺少身份验证允许执行任意代码或命令](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526827&idx=1&sn=02106475443306b2005d8031e320d35f)
**作者**Ots安全
**上传时间**2025-01-06 13:44:09
**简介**None
----------------------------------------
#### 文章:[ThievingFox——从密码管理器和 Windows 实用程序远程检索凭据](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526827&idx=2&sn=357dc695b40732b89fd8115f61111e9a)
**作者**Ots安全
**上传时间**2025-01-06 13:44:09
**简介**ThievingFox 是一组后漏洞利用工具,用于在渗透测试和类似活动中从工作站和服务器收集凭据。它的工作原理是让目标应用程序加载恶意库,该库执行内存挂钩以收集凭据。
----------------------------------------
#### 文章:[【成功复现】爱数AnyShare SMTP_GetConfig 信息泄露漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502853&idx=1&sn=6116493ef276d07ee2f6c5105fb25d62)
**作者**:弥天安全实验室
**上传时间**2025-01-06 12:18:51
**简介**【成功复现】爱数AnyShare SMTP_GetConfig 信息泄露漏洞
----------------------------------------
#### 文章:[工具集PotatoTool【1.3更新】集合解密、分析、扫描、溯源、免杀、提权等功能的网络安全综合工具](https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247485088&idx=1&sn=dde3f7615d6d2e96776b49bce1762bea)
**作者**风铃Sec
**上传时间**2025-01-06 12:17:41
**简介**None
----------------------------------------
#### 文章:[JAVA XXE 学习总结](https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247546440&idx=1&sn=1aafdd4bc381662ded1bedaacb7191f8)
**作者**掌控安全EDU
**上传时间**2025-01-06 12:02:15
**简介**None
----------------------------------------
#### 文章:[从js到高危垂直越权漏洞挖掘](https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614973&idx=1&sn=0cb7f44aa7d6b3d7f0b82a6e1490a6cc)
**作者**:白帽子左一
**上传时间**2025-01-06 12:01:05
**简介**None
----------------------------------------
#### 文章:[Java安全小记-FastJson反序列化](https://mp.weixin.qq.com/s?__biz=Mzk0ODY1NzEwMA==&mid=2247485169&idx=1&sn=804880c5f2fad83f50d7217bbe3dfe60)
**作者**:土拨鼠的安全屋
**上传时间**2025-01-06 12:00:23
**简介**None
----------------------------------------
#### 文章:[浅析CTF中PWN题堆类型的ORW技术](https://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&mid=2651037243&idx=1&sn=6fcfd1790adc07489a7aa79613c56bfd)
**作者**SAINTSEC
**上传时间**2025-01-06 11:52:08
**简介**浅析ctf中pwn题堆类型的orw
----------------------------------------
#### 文章:[某华命令执行Rce原理分析](https://mp.weixin.qq.com/s?__biz=MzkyMjM5NDM3NQ==&mid=2247486194&idx=1&sn=1edc0eb964a23d4ef1d95e0668354d48)
**作者**:进击安全
**上传时间**2025-01-06 11:45:51
**简介**None
----------------------------------------
#### 文章:[[溯源]HuntBack(反击狩猎)用于攻防演练中防守方对恶意ip进行web指纹扫描与识别](https://mp.weixin.qq.com/s?__biz=Mzg4NTgxNTc5Mg==&mid=2247486805&idx=1&sn=53ec3f82f35a73b14adc666c9ed0ca22)
**作者**W啥都学
**上传时间**2025-01-06 11:41:44
**简介**None
----------------------------------------
#### 文章:[漏洞通告 | Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞](https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507635&idx=1&sn=3ed64fc475689a3cd2c08cc3a146a471)
**作者**:微步在线研究响应中心
**上传时间**2025-01-06 10:50:43
**简介**:立即查看漏洞详情
----------------------------------------
#### 文章:[【介质取证】“隐藏”在日志文件里的行为痕迹](https://mp.weixin.qq.com/s?__biz=MzI0OTEyMTk5OQ==&mid=2247494068&idx=1&sn=7903df1ae2f96b57d88bdccc88dbdb38)
**作者**:平航科技
**上传时间**2025-01-06 10:01:02
**简介**None
----------------------------------------
#### 文章:[刷脸登录银行 App 现他人信息,银行回应称“网络抖动带来的极小概率事件”|Windows 曝9.8分漏洞已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650606244&idx=1&sn=8000e773da8fb2b362bc7283a912db76)
**作者**:黑白之道
**上传时间**2025-01-06 09:55:05
**简介**None
----------------------------------------
#### 文章:[针对 PostgreSQL 数据库的攻击研究](https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247499743&idx=1&sn=f6f99cdd5962403d8c00657ceaa708a5)
**作者**:信安之路
**上传时间**2025-01-06 09:37:29
**简介**None
----------------------------------------
#### 文章:[【漏洞复现】快云服务器助手GetDetail接口文件任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzI1NTE2NzQ3NQ==&mid=2247485521&idx=2&sn=21fccb1beac3a0dcc9a565a36fcfa9a7)
**作者**网络安全007
**上传时间**2025-01-06 09:01:03
**简介**None
----------------------------------------
#### 文章:[【Nday漏洞分析】ProjectSend 身份认证绕过漏洞(CVE-2024-11680)](https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247486903&idx=1&sn=0a066aff4189674338d0ffe68e405275)
**作者**神农Sec
**上传时间**2025-01-06 09:00:39
**简介**None
----------------------------------------
#### 文章:[vulnhub之unknowndevice2的实践](https://mp.weixin.qq.com/s?__biz=MzA3MjM5MDc2Nw==&mid=2650748903&idx=1&sn=f3265733267791c930270b071e833d0e)
**作者**:云计算和网络安全技术实践
**上传时间**2025-01-06 08:46:59
**简介**None
----------------------------------------
#### 文章:[内网渗透之ADCS权限维持](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494683&idx=1&sn=ff1e934c2bb0dee6e9959d04e96218c0)
**作者**:七芒星实验室
**上传时间**2025-01-06 08:46:33
**简介**:文章前言本篇文章主要介绍如何通过证书服务来实现权限维持的目的基本原理在微软的文档里有一段话\\x26quot;当使用PKCA时
----------------------------------------
#### 文章:[企业安全建设之蜜罐搭建与使用](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494683&idx=2&sn=2fb0376ca472b4a0a1eff27d319df088)
**作者**:七芒星实验室
**上传时间**2025-01-06 08:46:33
**简介**基本介绍HFish是一款基于Golang开发的跨平台多功能主动诱导型开源国产蜜罐框架系统它从内网失陷检测、
----------------------------------------
#### 文章:[W&Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=Mzg2NzkxOTQ0OA==&mid=2247484492&idx=1&sn=7da5690238bdb790765079470195bd8e)
**作者**:菜鸟学渗透
**上传时间**2025-01-06 08:30:31
**简介**W\\x26amp;Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞
----------------------------------------
#### 文章:[【实用工具】Windows应急响应上机排查工具](https://mp.weixin.qq.com/s?__biz=MzIxOTk0ODY0NQ==&mid=2247485387&idx=1&sn=59722752cf6054be5cf5ff0645012d04)
**作者**:如棠安全
**上传时间**2025-01-06 08:15:40
**简介**:在上机排查过程中,通过“事件查看器”逐个查看系统日志太过繁琐。这样的话,我们可以通过此工具一键对系统日志进行分类核查,有效提高上机研判、处置能力。
----------------------------------------
#### 文章:[免杀系列 - 无法让管理员找到你的木马进程](https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487937&idx=1&sn=f424ff0e311911b564ad87924e90b994)
**作者**SecretTeam安全团队
**上传时间**2025-01-06 08:08:29
**简介**None
----------------------------------------
#### 文章:[【神兵利器】GRS内网穿透工具](https://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247504721&idx=1&sn=e25858d7e5772aa1d94b191a42a49d49)
**作者**:菜鸟学信安
**上传时间**2025-01-06 08:03:20
**简介**None
----------------------------------------
#### 文章:[记一次某道CMS审计过程](https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247510233&idx=1&sn=0159324632f603442a3a7b5d5bec845c)
**作者**:李白你好
**上传时间**2025-01-06 08:01:49
**简介**None
----------------------------------------
#### 文章:[Hacking Scanner 一键渗透扫描器](https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247493163&idx=1&sn=cd8f69d7ecc43e8bc09da662d0094ede)
**作者**:夜组安全
**上传时间**2025-01-06 08:01:01
**简介**None
----------------------------------------
#### 文章:[X-Ways Forensics 包含报告表/标签的使用](https://mp.weixin.qq.com/s?__biz=Mzg3NTU3NTY0Nw==&mid=2247489479&idx=1&sn=a196e28523a7438789bb56901d775f8d)
**作者**:网络安全与取证研究
**上传时间**2025-01-06 08:00:57
**简介**:关于包含报告表/标签功能,笔者也是在一次偶然之中领悟到了其强大之处,因为之前一直都认为报告表功能并无大用。现在,标签列是我分析页面中 的常驻列,并且往往处在较为靠前的位置。笔者希望能通过本文介绍包含报告表/标签的强大之处和高效用法。
----------------------------------------
#### 文章:[漏洞预警 | WordPress Plugin Tutor SQL注入漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=1&sn=fbd0590c31f7e295b5743345888e231c)
**作者**:浅安安全
**上传时间**2025-01-06 08:00:30
**简介**WordPress插件Tutor LMS的/wp-admin/admin-ajax.php接口存在SQL注入漏洞未经身份验证的攻击者可以通过该漏洞获取数据库敏感信息。
----------------------------------------
#### 文章:[漏洞预警 | 友数聚CPAS审计管理系统SQL注入和任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=2&sn=1e67ec9b7cddeda507a7d80598525961)
**作者**:浅安安全
**上传时间**2025-01-06 08:00:30
**简介**友数聚CPAS审计管理系统存在SQL注入和任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞获取敏感信息建议相关用户及时更新。
----------------------------------------
#### 文章:[工具 | Hfish](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=4&sn=22a306b858e629b4d99395f890731306)
**作者**:浅安安全
**上传时间**2025-01-06 08:00:30
**简介**HFish是一款社区型免费蜜罐。
----------------------------------------
#### 文章:[Ember Bear APT 攻击模拟](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504432&idx=1&sn=89ec75cbd0580342d7cde65855139ace)
**作者**:安全狗的自我修养
**上传时间**2025-01-06 07:09:53
**简介**:这是对 Ember Bear APT 组织针对乌克兰能源组织的攻击的模拟,攻击活动于 2021 年 4 月活跃,攻击链开
----------------------------------------
#### 文章:[浅谈密码相关原理及代码实现](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518163&idx=1&sn=e2b7200747c06902d53e3556d78d9c31)
**作者**:船山信安
**上传时间**2025-01-06 00:12:23
**简介**None
----------------------------------------
#### 文章:[安卓逆向2025 -- Frida学习之环境搭建](https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037473&idx=1&sn=fc63b8d78a7113b33bc9630af30dce5b)
**作者**:逆向有你
**上传时间**2025-01-06 00:00:29
**简介**None
----------------------------------------
#### 文章:[Windows 11 BitLocker被绕过来提取卷加密密钥](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498072&idx=2&sn=d5947fa42d47876f2c6a88dfd33a2479)
**作者**:河南等级保护测评
**上传时间**2025-01-06 00:00:20
**简介**None
----------------------------------------
#### 文章:[黑客利用 DoS 漏洞禁用 Palo Alto Networks 防火墙](https://mp.weixin.qq.com/s?__biz=Mzg3ODY0NTczMA==&mid=2247491876&idx=1&sn=1ffb723d73f1a24290998ff19c4f929e)
**作者**:犀牛安全
**上传时间**2025-01-06 00:00:00
**简介**None
----------------------------------------
#### 文章:[记两次内网入侵溯源](https://mp.weixin.qq.com/s?__biz=Mzg2NDYwMDA1NA==&mid=2247543401&idx=1&sn=529638018a2a223edc0be924bf6d9d30)
**作者**Hacking黑白红
**上传时间**2025-01-05 23:26:58
**简介**None
----------------------------------------
#### 文章:[研究人员发布针对 Windows LDAP 漏洞的 PoC 漏洞利用程序](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505530&idx=4&sn=d74d0d52adbd4477bc0279d88f92f1e3)
**作者**:网络研究观
**上传时间**2025-01-05 21:27:48
**简介**None
----------------------------------------
#### 文章:[【漏洞复现】内训宝 SCORM 模块存在任意文件上传漏洞](https://mp.weixin.qq.com/s?__biz=MzI1NTE2NzQ3NQ==&mid=2247485511&idx=1&sn=24c216754ea9f84396bd3159a2ec4b0f)
**作者**网络安全007
**上传时间**2025-01-05 16:26:41
**简介**:内训宝 SCORM 模块存在任意文件上传漏洞|附复现过程!
----------------------------------------
#### 文章:[【渗透 Tips】解决Edge的IE模式下无法抓包情况](https://mp.weixin.qq.com/s?__biz=MzIzNDU5Mzk2OQ==&mid=2247486346&idx=1&sn=abef247f01a77843ed143f35d85ae810)
**作者**:阿呆攻防
**上传时间**2025-01-05 16:07:40
**简介**None
----------------------------------------
#### 文章:[JS逆向系列17-Hook_cookie v0.2脚本原理解析](https://mp.weixin.qq.com/s?__biz=MzkzNTcwOTgxMQ==&mid=2247485234&idx=1&sn=3948bce9c853c43f96632533b5ef236a)
**作者**Spade sec
**上传时间**2025-01-05 15:47:51
**简介**None
----------------------------------------
#### 文章:[2024 数证杯流量分析WP](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518156&idx=1&sn=6b52ea6ce0a870f4a425c6cdbc325f5e)
**作者**:船山信安
**上传时间**2025-01-05 10:45:23
**简介**None
----------------------------------------
#### 文章:[针对潜在危险的 Windows LDAP 漏洞的利用代码已发布](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498048&idx=2&sn=76a1a1db4b128f834fc607a9518b2f8d)
**作者**:河南等级保护测评
**上传时间**2025-01-05 00:12:58
**简介**None
----------------------------------------
#### 文章:[安卓逆向 -- 某TV抓包和jce响应解析](https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037449&idx=1&sn=37bae8ad1d88fb2fe194256e6326e768)
**作者**:逆向有你
**上传时间**2025-01-05 00:01:26
**简介**None
----------------------------------------
#### 文章:[网络抓包神器Tcpdump实用技巧与案例解析](https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247569384&idx=1&sn=3dda4be3d2a2361e8de95a139536e7b4)
**作者**:马哥网络安全
**上传时间**2025-01-04 17:01:47
**简介**None
----------------------------------------
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5) #### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
**作者**:教父爱分享 **作者**:教父爱分享
**上传时间**2025-01-05 23:19:42 **上传时间**2025-01-05 23:19:42

View File

@ -1,162 +1,22 @@
2025-01-05 23:09:45 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [1, 2], 'url': 'https://info.masonliu.com/', 'debug': True} 2025-01-06 16:48:36 - INFO - __main__:<module>:252 - 程序正在运行当中。
2025-01-05 23:09:45 - INFO - __main__:<module>:249 - 程序正在运行当中。 2025-01-06 16:48:46 - INFO - __main__:send_first_message:232 - 飞书发送 程序信息 成功
2025-01-05 23:09:55 - INFO - __main__:main_job:182 - 发送程序启动当前时间为2025-01-05 23:09:55 2025-01-06 16:48:46 - INFO - __main__:send_first_message:235 - 飞书发送 RSS源状态 成功
2025-01-05 23:09:55 - INFO - __main__:main_job:183 - 正在启动各爬虫并获取资源中... 2025-01-06 16:48:47 - INFO - __main__:send_first_message:237 - 飞书发送 首次运行提醒 成功
2025-01-05 23:09:55 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【银行测试】的微信公众号-Sogou搜索内容保存成功。 2025-01-06 16:48:47 - INFO - __main__:main_job:185 - 发送程序启动当前时间为2025-01-06 16:48:47
2025-01-05 23:10:01 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【APP逆向】的微信公众号-Sogou搜索内容保存成功。 2025-01-06 16:48:47 - INFO - __main__:main_job:186 - 正在启动各爬虫并获取资源中...
2025-01-05 23:10:06 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【渗透测试】的微信公众号-Sogou搜索内容保存成功。 2025-01-06 16:48:48 - INFO - spider.common:seebug_main:76 - 数据已保存到 ./resources/JSON/seebug.json
2025-01-05 23:10:11 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【手机银行漏洞】的微信公众号-Sogou搜索内容保存成功。 2025-01-06 16:48:48 - INFO - spider.common:anquanke_main:112 - 数据已保存到 ./resources/JSON/anquanke.json
2025-01-05 23:10:17 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【银行漏洞】的微信公众号-Sogou搜索内容保存成功。 2025-01-06 16:48:49 - INFO - spider.common:huawei_main:148 - 数据已保存到 ./resources/JSON/huawei.json
2025-01-05 23:10:22 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【支付漏洞】的微信公众号-Sogou搜索内容保存成功。 2025-01-06 16:48:49 - INFO - spider.common:doonsec_main:166 - 数据已保存到 ./resources/JSON/doonsec.json
2025-01-05 23:10:27 - INFO - __main__:check_avaliable:65 - 飞书发送 微信公众号关键词相关内容 成功 2025-01-06 16:48:49 - INFO - spider.common:qianxin_main:184 - 数据已保存到 ./resources/JSON/qianxin.json
2025-01-05 23:10:42 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【sql注入】获取开始。 2025-01-06 16:48:49 - INFO - spider.freebuf:freebuf_main:69 - 数据已保存到 ./resources/JSON/freebuf.json
2025-01-05 23:10:48 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【cnvd】获取开始。 2025-01-06 16:48:51 - INFO - spider.xianzhi:xianzhi_main:67 - 数据已保存到 ./resources/JSON/xianzhi.json
2025-01-05 23:10:54 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【未授权】获取开始。 2025-01-06 16:48:51 - INFO - spider.common:M_4hou_main:94 - 数据已保存到 ./resources/JSON/4hou.json
2025-01-05 23:11:01 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【漏洞POC】获取开始。 2025-01-06 16:48:51 - INFO - __main__:check_avaliable:86 - 嘶吼资讯数据为空,跳过执行。
2025-01-05 23:11:07 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【RCE】获取开始。 2025-01-06 16:48:52 - INFO - __main__:check_avaliable:63 - 飞书发送 安全客资讯 成功
2025-01-05 23:11:13 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【渗透测试】获取开始。 2025-01-06 16:49:08 - INFO - __main__:check_avaliable:63 - 飞书发送 洞见微信安全资讯 成功
2025-01-05 23:11:19 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【反序列化】获取开始。 2025-01-06 16:49:23 - INFO - __main__:check_avaliable:86 - 先知社区资讯数据为空,跳过执行。
2025-01-05 23:11:27 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【攻防】获取开始。 2025-01-06 16:49:23 - INFO - __main__:check_avaliable:63 - 飞书发送 FreeBuf资讯 成功
2025-01-05 23:11:35 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【webshell】获取开始。 2025-01-06 16:49:39 - INFO - __main__:check_avaliable:63 - 飞书发送 奇安信攻防社区资讯 成功
2025-01-05 23:11:41 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【红队】获取开始。 2025-01-06 16:49:54 - INFO - __main__:check_avaliable:86 - Seebug社区资讯数据为空跳过执行。
2025-01-05 23:11:48 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【redteam】获取开始。 2025-01-06 16:51:59 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-05 23:11:54 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【信息收集】获取开始。
2025-01-05 23:12:00 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【绕过】获取开始。
2025-01-05 23:12:06 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【bypass av】获取开始。
2025-01-05 23:12:12 - INFO - spider.github:github_main_repo:99 - github_repo:项目【BeichenDream/Godzilla】更新情况获取开始。
2025-01-05 23:12:17 - INFO - spider.github:github_main_repo:99 - github_repo:项目【rebeyond/Behinder】更新情况获取开始。
2025-01-05 23:12:23 - INFO - spider.github:github_main_repo:99 - github_repo:项目【AntSwordProject/antSword】更新情况获取开始。
2025-01-05 23:12:29 - INFO - spider.github:github_main_repo:99 - github_repo:项目【j1anFen/shiro_attack】更新情况获取开始。
2025-01-05 23:12:29 - ERROR - spider.github:fetch_rss:38 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1
2025-01-05 23:12:34 - INFO - spider.github:github_main_repo:99 - github_repo:项目【yhy0/github-cve-monitor】更新情况获取开始。
2025-01-05 23:12:40 - INFO - spider.github:github_main_repo:99 - github_repo:项目【gentilkiwi/mimikatz】更新情况获取开始。
2025-01-05 23:12:46 - INFO - spider.github:github_main_repo:99 - github_repo:项目【ehang-io/nps】更新情况获取开始。
2025-01-05 23:12:51 - INFO - spider.github:github_main_repo:99 - github_repo:项目【chaitin/xray】更新情况获取开始。
2025-01-05 23:12:57 - INFO - spider.github:github_main_repo:99 - github_repo:项目【FunnyWolf/pystinger】更新情况获取开始。
2025-01-05 23:13:03 - INFO - spider.github:github_main_repo:99 - github_repo:项目【L-codes/Neo-reGeorg】更新情况获取开始。
2025-01-05 23:13:08 - INFO - spider.github:github_main_repo:99 - github_repo:项目【shadow1ng/fscan】更新情况获取开始。
2025-01-05 23:13:14 - INFO - spider.github:github_main_repo:99 - github_repo:项目【SafeGroceryStore/MDUT】更新情况获取开始。
2025-01-05 23:13:21 - INFO - spider.github:github_main_repo:99 - github_repo:项目【EdgeSecurityTeam/Vulnerability】更新情况获取开始。
2025-01-05 23:13:22 - ERROR - spider.github:fetch_rss:38 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1
2025-01-05 23:13:27 - INFO - spider.github:github_main_repo:99 - github_repo:项目【Vme18000yuan/FreePOC】更新情况获取开始。
2025-01-05 23:13:33 - INFO - spider.github:github_main_repo:99 - github_repo:项目【wy876/POC】更新情况获取开始。
2025-01-05 23:13:39 - INFO - spider.github:github_main_release:144 - github_repo:项目【BeichenDream/Godzilla】发版情况获取开始。
2025-01-05 23:13:45 - INFO - spider.github:github_main_release:144 - github_repo:项目【rebeyond/Behinder】发版情况获取开始。
2025-01-05 23:13:50 - INFO - spider.github:github_main_release:144 - github_repo:项目【AntSwordProject/antSword】发版情况获取开始。
2025-01-05 23:13:56 - INFO - spider.github:github_main_release:144 - github_repo:项目【j1anFen/shiro_attack】发版情况获取开始。
2025-01-05 23:13:57 - ERROR - spider.github:fetch_rss:38 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1
2025-01-05 23:14:02 - INFO - spider.github:github_main_release:144 - github_repo:项目【yhy0/github-cve-monitor】发版情况获取开始。
2025-01-05 23:14:02 - WARNING - spider.github:github_main_release:151 - github_repo:项目【yhy0/github-cve-monitor】不存在版本发布情况。
2025-01-05 23:14:07 - INFO - spider.github:github_main_release:144 - github_repo:项目【gentilkiwi/mimikatz】发版情况获取开始。
2025-01-05 23:14:13 - INFO - spider.github:github_main_release:144 - github_repo:项目【ehang-io/nps】发版情况获取开始。
2025-01-05 23:14:19 - INFO - spider.github:github_main_release:144 - github_repo:项目【chaitin/xray】发版情况获取开始。
2025-01-05 23:14:25 - INFO - spider.github:github_main_release:144 - github_repo:项目【FunnyWolf/pystinger】发版情况获取开始。
2025-01-05 23:14:30 - INFO - spider.github:github_main_release:144 - github_repo:项目【L-codes/Neo-reGeorg】发版情况获取开始。
2025-01-05 23:14:36 - INFO - spider.github:github_main_release:144 - github_repo:项目【shadow1ng/fscan】发版情况获取开始。
2025-01-05 23:14:42 - INFO - spider.github:github_main_release:144 - github_repo:项目【SafeGroceryStore/MDUT】发版情况获取开始。
2025-01-05 23:14:47 - INFO - spider.github:github_main_release:144 - github_repo:项目【EdgeSecurityTeam/Vulnerability】发版情况获取开始。
2025-01-05 23:14:48 - ERROR - spider.github:fetch_rss:38 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1
2025-01-05 23:14:53 - INFO - spider.github:github_main_release:144 - github_repo:项目【Vme18000yuan/FreePOC】发版情况获取开始。
2025-01-05 23:14:54 - WARNING - spider.github:github_main_release:151 - github_repo:项目【Vme18000yuan/FreePOC】不存在版本发布情况。
2025-01-05 23:14:59 - INFO - spider.github:github_main_release:144 - github_repo:项目【wy876/POC】发版情况获取开始。
2025-01-05 23:15:04 - INFO - spider.github:github_main_user:179 - github_user:作者【su18】更新情况获取开始。
2025-01-05 23:15:10 - INFO - spider.github:github_main_user:179 - github_user:作者【BeichenDream】更新情况获取开始。
2025-01-05 23:15:16 - INFO - spider.github:github_main_user:179 - github_user:作者【phith0n】更新情况获取开始。
2025-01-05 23:15:21 - INFO - spider.github:github_main_user:179 - github_user:作者【zhzyker】更新情况获取开始。
2025-01-05 23:15:27 - INFO - spider.github:github_main_user:179 - github_user:作者【lijiejie】更新情况获取开始。
2025-01-05 23:15:34 - INFO - spider.github:github_main_user:179 - github_user:作者【projectdiscovery】更新情况获取开始。
2025-01-05 23:15:39 - INFO - spider.github:github_main_user:179 - github_user:作者【HavocFramework】更新情况获取开始。
2025-01-05 23:15:45 - INFO - __main__:check_avaliable:88 - Github项目监控-关键词监控数据为空,跳过执行。
2025-01-05 23:15:45 - INFO - __main__:check_avaliable:88 - Github项目监控-项目更新情况数据为空,跳过执行。
2025-01-05 23:15:46 - INFO - __main__:check_avaliable:65 - 飞书发送 Github项目监控-大佬工具 成功
2025-01-05 23:16:01 - INFO - __main__:check_avaliable:88 - Github项目监控-项目版本发布监测数据为空,跳过执行。
2025-01-05 23:18:32 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-05 23:18:36 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-05 23:18:36 - INFO - __main__:<module>:249 - 程序正在运行当中。
2025-01-05 23:18:45 - INFO - __main__:send_first_message:229 - 飞书发送 程序信息 成功
2025-01-05 23:18:46 - INFO - __main__:send_first_message:232 - 飞书发送 RSS源状态 成功
2025-01-05 23:18:46 - INFO - __main__:send_first_message:234 - 飞书发送 首次运行提醒 成功
2025-01-05 23:18:46 - INFO - __main__:main_job:182 - 发送程序启动当前时间为2025-01-05 23:18:46
2025-01-05 23:18:46 - INFO - __main__:main_job:183 - 正在启动各爬虫并获取资源中...
2025-01-05 23:18:46 - ERROR - spider.common:fetch_rss:47 - 请求 https://paper.seebug.org/rss/ 时发生错误: 521 Server Error: for url: https://paper.seebug.org/rss/
2025-01-05 23:18:46 - WARNING - spider.common:seebug_main:70 - 无法获取Seebug社区RSS内容跳过保存操作。
2025-01-05 23:18:47 - INFO - spider.common:anquanke_main:116 - 数据已保存到 ./resources/JSON/anquanke.json
2025-01-05 23:18:47 - INFO - spider.common:huawei_main:152 - 数据已保存到 ./resources/JSON/huawei.json
2025-01-05 23:18:47 - INFO - spider.common:doonsec_main:170 - 数据已保存到 ./resources/JSON/doonsec.json
2025-01-05 23:18:47 - INFO - spider.common:qianxin_main:188 - 数据已保存到 ./resources/JSON/qianxin.json
2025-01-05 23:18:48 - INFO - spider.freebuf:freebuf_main:69 - 数据已保存到 ./resources/JSON/freebuf.json
2025-01-05 23:18:49 - INFO - spider.xianzhi:xianzhi_main:67 - 数据已保存到 ./resources/JSON/xianzhi.json
2025-01-05 23:18:49 - INFO - spider.common:M_4hou_main:98 - 数据已保存到 ./resources/JSON/4hou.json
2025-01-05 23:18:49 - ERROR - __main__:main_loop:200 - 发生错误: seebug.json文件不存在请检查程序是否运行正常, 程序已暂停
2025-01-05 23:43:11 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-05 23:43:11 - INFO - __main__:<module>:249 - 程序正在运行当中。
2025-01-05 23:43:24 - INFO - __main__:send_first_message:229 - 飞书发送 程序信息 成功
2025-01-05 23:43:25 - INFO - __main__:send_first_message:232 - 飞书发送 RSS源状态 成功
2025-01-05 23:43:25 - INFO - __main__:send_first_message:234 - 飞书发送 首次运行提醒 成功
2025-01-05 23:43:25 - INFO - __main__:main_job:182 - 发送程序启动当前时间为2025-01-05 23:43:25
2025-01-05 23:43:25 - INFO - __main__:main_job:183 - 正在启动各爬虫并获取资源中...
2025-01-05 23:43:25 - WARNING - spider.common:fetch_rss:47 - 请求 https://paper.seebug.org/rss/ 时发生错误: 521 Server Error: for url: https://paper.seebug.org/rss/
2025-01-05 23:43:25 - WARNING - spider.common:seebug_main:70 - 无法获取Seebug社区RSS内容跳过保存操作。
2025-01-05 23:43:26 - INFO - spider.common:anquanke_main:116 - 数据已保存到 ./resources/JSON/anquanke.json
2025-01-05 23:43:26 - INFO - spider.common:huawei_main:152 - 数据已保存到 ./resources/JSON/huawei.json
2025-01-05 23:43:26 - INFO - spider.common:doonsec_main:170 - 数据已保存到 ./resources/JSON/doonsec.json
2025-01-05 23:43:26 - INFO - spider.common:qianxin_main:188 - 数据已保存到 ./resources/JSON/qianxin.json
2025-01-05 23:43:28 - INFO - spider.freebuf:freebuf_main:69 - 数据已保存到 ./resources/JSON/freebuf.json
2025-01-05 23:43:29 - INFO - spider.xianzhi:xianzhi_main:67 - 数据已保存到 ./resources/JSON/xianzhi.json
2025-01-05 23:43:29 - INFO - spider.common:M_4hou_main:98 - 数据已保存到 ./resources/JSON/4hou.json
2025-01-05 23:43:29 - ERROR - __main__:main_loop:200 - 发生错误: seebug.json文件不存在请检查程序是否运行正常, 程序已暂停
2025-01-06 00:04:38 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:04:38 - INFO - __main__:<module>:249 - 程序正在运行当中。
2025-01-06 00:04:43 - INFO - __main__:main_job:182 - 发送程序启动当前时间为2025-01-06 00:04:43
2025-01-06 00:04:43 - INFO - __main__:main_job:183 - 正在启动各爬虫并获取资源中...
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:04:58 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-06 00:08:39 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:08:39 - INFO - __main__:<module>:250 - 程序正在运行当中。
2025-01-06 00:08:44 - INFO - __main__:main_job:183 - 发送程序启动当前时间为2025-01-06 00:08:44
2025-01-06 00:08:44 - INFO - __main__:main_job:184 - 正在启动各爬虫并获取资源中...
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:08:53 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-06 00:24:00 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:24:00 - INFO - __main__:<module>:251 - 程序正在运行当中。
2025-01-06 00:24:05 - INFO - __main__:main_job:184 - 发送程序启动当前时间为2025-01-06 00:24:05
2025-01-06 00:24:05 - INFO - __main__:main_job:185 - 正在启动各爬虫并获取资源中...
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:25:27 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-06 00:25:30 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:25:30 - INFO - __main__:<module>:251 - 程序正在运行当中。
2025-01-06 00:25:35 - INFO - __main__:main_job:184 - 发送程序启动当前时间为2025-01-06 00:25:35
2025-01-06 00:25:35 - INFO - __main__:main_job:185 - 正在启动各爬虫并获取资源中...
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:25:38 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-06 00:26:59 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:26:59 - INFO - __main__:<module>:251 - 程序正在运行当中。
2025-01-06 00:27:04 - INFO - __main__:main_job:184 - 发送程序启动当前时间为2025-01-06 00:27:04
2025-01-06 00:27:04 - INFO - __main__:main_job:185 - 正在启动各爬虫并获取资源中...
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:28:35 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...