diff --git a/GotoSend/github.py b/GotoSend/github.py index b9f069c..4837e42 100644 --- a/GotoSend/github.py +++ b/GotoSend/github.py @@ -103,9 +103,8 @@ def insert_data(): "language": item.get("language", "") } try: - # 解析 pubDate 字符串为 datetime 对象 pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ') - # 格式化 pubDate 为所需的格式 + pub_date += timedelta(hours=8) formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S') except ValueError: # 如果解析失败,使用原始 pubDate 字符串 @@ -128,7 +127,7 @@ def insert_data(): entry = { "id": index, "title": item.get("name", ""), - "link": item.get("link", ""), + "link": f"https://github.com/{item.get('keyword', '')}", "description": item.get("description", ""), "pubDate": item.get("updated_at", ""), "author": item.get("author", ""), @@ -136,9 +135,8 @@ def insert_data(): "link2": item.get("link_2", "") } try: - # 解析 pubDate 字符串为 datetime 对象 pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ') - # 格式化 pubDate 为所需的格式 + pub_date += timedelta(hours=8) formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S') except ValueError: # 如果解析失败,使用原始 pubDate 字符串 @@ -158,9 +156,8 @@ def insert_data(): "keyword": item.get("keyword", "") } try: - # 解析 pubDate 字符串为 datetime 对象 pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ') - # 格式化 pubDate 为所需的格式 + pub_date += timedelta(hours=8) formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S') except ValueError: # 如果解析失败,使用原始 pubDate 字符串 @@ -185,9 +182,8 @@ def insert_data(): "language": item.get("language", "") } try: - # 解析 pubDate 字符串为 datetime 对象 pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ') - # 格式化 pubDate 为所需的格式 + pub_date += timedelta(hours=8) formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S') except ValueError: # 如果解析失败,使用原始 pubDate 字符串 @@ -316,7 +312,7 @@ def get_filtered_articles(entries, Is_short, choice): result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n" result += f"更新描述:{entry[3]}\n" result += f"更新时间:{entry[4]}\n" - result += f"提交者:{entry[5]},[点此查看提交详情]({entry[2]})\n" + result += f"提交者:{entry[5]},[点此查看提交详情]({entry[6]})\n" result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 elif choice == 3: result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n" @@ -337,7 +333,7 @@ def get_filtered_articles(entries, Is_short, choice): result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n" result += f"更新描述:{entry[3]}\n" result += f"更新时间:{entry[4]}\n" - result += f"提交者:{entry[5]},[点此查看提交详情]({entry[2]})\n" + result += f"提交者:{entry[5]},[点此查看提交详情]({entry[6]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 elif choice == 3: result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n" @@ -359,7 +355,7 @@ def get_filtered_articles(entries, Is_short, choice): record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n" record += f"**更新描述**:{entry[3]}\n" record += f"**更新时间**:{entry[4]}\n" - record += f"**提交者**:{entry[5]},[点此查看提交详情]({entry[2]})\n" + record += f"**提交者**:{entry[5]},[点此查看提交详情]({entry[6]})\n" record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 elif choice == 3: record += f"#### 大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n" diff --git a/UpdateLOG.md b/UpdateLOG.md index 211188e..a47636f 100644 --- a/UpdateLOG.md +++ b/UpdateLOG.md @@ -37,4 +37,5 @@ - 2025年01月02日:更新并上线了Github项目监测功能,readme后续更新中
- 2025年01月02日晚:再次优化了文件结构,提高可读性
- 2025年01月05日晚:修复了doonsec相关配置的bug,程序现已可正常运行
-- 2025年01月06日:更新了配置信息自动获取的逻辑,添加关键词等现可在运行时添加,重要配置信息(config.yaml)仍需暂停重新运行
\ No newline at end of file +- 2025年01月06日:更新了配置信息自动获取的逻辑,添加关键词等现可在运行时添加,重要配置信息(config.yaml)仍需暂停重新运行
+- 2025年01月10日:修复了github推送的问题(时区,消息配置错误等)
\ No newline at end of file diff --git a/baidu开发文档.md b/baidu开发文档.md new file mode 100644 index 0000000..0721f06 --- /dev/null +++ b/baidu开发文档.md @@ -0,0 +1,19 @@ +### 设计思路 +前情提要:百度搜索的爬取处理逻辑和搜狗-微信公众号的逻辑基本一致,但是百度搜索杂系数太大,存在大量不相关内容,所以使用百度的一个参数进行调整。 +api地址: +www.baidu.com/s?wd={关键词}&cl=3&pn=1&ie=utf-8&rn=20&tn=baidurt +- wd={关键词}:设置查询关键词 +- cl=3:查询类型,3为网页,2为图片,默认为3 +- pn=1:指定查询页数 +- rn=20:每页显示数量 +- ie=utf-8:指定查询编码格式 +- tn=baidurt:设置为简化格式,爬虫友好化 + +### 速率限制 +建议设置高每页数量,减小搜索次数以规避反爬虫措施。 + +### 使用技术 +- python-bs4网页解析 +- python-sqlite联动 +- python-request爬虫 +- sqlite筛选 \ No newline at end of file diff --git a/config/__pycache__/check_config.cpython-312.pyc b/config/__pycache__/check_config.cpython-312.pyc index e5e191a..98279d0 100644 Binary files a/config/__pycache__/check_config.cpython-312.pyc and b/config/__pycache__/check_config.cpython-312.pyc differ diff --git a/config/config.yaml b/config/config.yaml index 0baa056..02cd007 100644 --- a/config/config.yaml +++ b/config/config.yaml @@ -24,10 +24,10 @@ sender: test@masonliu.com receivers: ['2857911564@qq.com'] # 结算时间范围 e_hour: 4 # 程序运行时间间隔 -time_mode: 0 +time_mode: 1 # 0:定时运行模式,仅在指定时间运行(参照Core.py中设置) # 1:启用循环,一定间隔时间后运行 -mode: [0] # 运行模式,可多选 +mode: [1, 2] # 运行模式,可多选 # 0:启用RSS抓取模式 # 1:启用搜狗-微信公众号文章监测 # 2:启用github项目监测 diff --git a/github开发文档.md b/github开发文档.md index 8dbd0d8..d6cdc62 100644 --- a/github开发文档.md +++ b/github开发文档.md @@ -1,30 +1,30 @@ -### 设计思路 -前情提要:GitHub的API接口为json格式,极其方便于使用python进行提取分析 -api地址: -获取关键词下更新的最新仓库源:https://api.github.com/search/repositories?q={Keyword}&sort=updated&per_page=30 -- sort=updated:按更新时间排序 -- per_page=30:查询数量,建议设置为30 -- page=1:指定查询页数 -获取指定用户的仓库更新情况:https://api.github.com/users/{user}/repos -获取指定仓库commit情况:https://api.github.com/repos/{user}/{repo} +### 设计思路 +前情提要:GitHub的API接口为json格式,极其方便于使用python进行提取分析 +api地址: +获取关键词下更新的最新仓库源:https://api.github.com/search/repositories?q={Keyword}&sort=updated&per_page=30 +- sort=updated:按更新时间排序 +- per_page=30:查询数量,建议设置为30 +- page=1:指定查询页数 +获取指定用户的仓库更新情况:https://api.github.com/users/{user}/repos +获取指定仓库commit情况:https://api.github.com/repos/{user}/{repo} + +### 速率限制 +headers ={ "Authorization": " token OAUTH-TOKEN"} +OAUTH-TOKEN:github个人账号设置->开发者设置->个人token。创建一个新token时,可以选择具体的权限,创建成功时一定要复制到本地哪里保存,只会让你看见一次,如果忘记的话就需要重新生成。 -### 速率限制 -headers ={ "Authorization": " token OAUTH-TOKEN"} -OAUTH-TOKEN:github个人账号设置->开发者设置->个人token。创建一个新token时,可以选择具体的权限,创建成功时一定要复制到本地哪里保存,只会让你看见一次,如果忘记的话就需要重新生成。 +### 使用技术 +- python-json解析 +- python-sqlite联动 +- python-request爬虫 +- sqlite筛选 -### 使用技术 -- python-json解析 -- python-sqlite联动 -- python-request爬虫 -- sqlite筛选 - -### 参考Json源格式 -所需部分: -- html_url -- created_at:仓库创建时间 -- updated_at:仓库最近更新时间 -- pushed_at:仓库最近推送时间(参考此元素进行设计) -- description:仓库描述 +### 参考Json源格式 +所需部分: +- html_url +- created_at:仓库创建时间 +- updated_at:仓库最近更新时间 +- pushed_at:仓库最近推送时间(参考此元素进行设计) +- description:仓库描述 { "id": 511095846, @@ -137,7 +137,7 @@ OAUTH-TOKEN:github个人账号设置->开发者设置->个人token。创建一 "score": 1.0 } -### 参考代码 -year = datetime.datetime.now().year -api = "https://api.github.com/search/repositories?q=CVE-{}&sort=updated".format(year) -json_str = requests.get(api, headers=github_headers, timeout=10).json() \ No newline at end of file +### 参考代码 +year = datetime.datetime.now().year +api = "https://api.github.com/search/repositories?q=CVE-{}&sort=updated".format(year) +json_str = requests.get(api, headers=github_headers, timeout=10).json() \ No newline at end of file diff --git a/resources/JSON/github_keyword.json b/resources/JSON/github_keyword.json index 7327220..5b1433f 100644 --- a/resources/JSON/github_keyword.json +++ b/resources/JSON/github_keyword.json @@ -1,4 +1,13 @@ [ + { + "link": "https://github.com/zlt2000/microservices-platform", + "name": "microservices-platform", + "created_at": "2019-03-07T07:13:37Z", + "description": "基于SpringBoot2.x、SpringCloud和SpringCloudAlibaba并采用前后端分离的企业级微服务多租户系统架构。并引入组件化的思想实现高内聚低耦合,项目代码简洁注释丰富上手容易,适合学习和企业中使用。真正实现了基于RBAC、jwt和oauth2的...", + "author": "zlt2000", + "language": "Java", + "keyword": "sql注入" + }, { "link": "https://github.com/saoshao/DetSql", "name": "DetSql", @@ -170,15 +179,6 @@ "language": null, "keyword": "sql注入" }, - { - "link": "https://github.com/woshirenji/SQL-", - "name": "SQL-", - "created_at": "2024-12-21T03:27:47Z", - "description": "DocCMS keyword SQL注入漏洞", - "author": "woshirenji", - "language": null, - "keyword": "sql注入" - }, { "link": "https://github.com/20142995/wxvl", "name": "wxvl", @@ -197,6 +197,15 @@ "language": "Python", "keyword": "cnvd" }, + { + "link": "https://github.com/jmtruffa/cnvDownloader", + "name": "cnvDownloader", + "created_at": "2024-08-13T12:57:34Z", + "description": "Downloader de data de CAFCI y parser de mails de FIMA", + "author": "jmtruffa", + "language": "Python", + "keyword": "cnvd" + }, { "link": "https://github.com/j8agent/CNVD-2024-15077--AJ-Report-RCE--", "name": "CNVD-2024-15077--AJ-Report-RCE--", @@ -260,15 +269,6 @@ "language": "Python", "keyword": "cnvd" }, - { - "link": "https://github.com/jmtruffa/cnvDownloader", - "name": "cnvDownloader", - "created_at": "2024-08-13T12:57:34Z", - "description": "Downloader de data de CAFCI y parser de mails de FIMA", - "author": "jmtruffa", - "language": "Python", - "keyword": "cnvd" - }, { "link": "https://github.com/leonooo13/CNVD-2020-10487-Tomcat-Ajp-lfi", "name": "CNVD-2020-10487-Tomcat-Ajp-lfi", @@ -512,15 +512,6 @@ "language": null, "keyword": "未授权" }, - { - "link": "https://github.com/adysec/nuclei_poc", - "name": "nuclei_poc", - "created_at": "2024-05-07T03:03:34Z", - "description": "Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有14wPOC,已校验有效性并去重)", - "author": "adysec", - "language": "Python", - "keyword": "漏洞POC" - }, { "link": "https://github.com/20142995/wxvl", "name": "wxvl", @@ -530,6 +521,15 @@ "language": "Python", "keyword": "漏洞POC" }, + { + "link": "https://github.com/wy876/POC", + "name": "POC", + "created_at": "2023-08-19T12:08:53Z", + "description": "收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1400多个poc/exp,长期更新。", + "author": "wy876", + "language": null, + "keyword": "漏洞POC" + }, { "link": "https://github.com/126789t/poc_everyday", "name": "poc_everyday", @@ -540,12 +540,21 @@ "keyword": "漏洞POC" }, { - "link": "https://github.com/wy876/POC", - "name": "POC", - "created_at": "2023-08-19T12:08:53Z", - "description": "收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1400多个poc/exp,长期更新。", - "author": "wy876", - "language": null, + "link": "https://github.com/adysec/nuclei_poc", + "name": "nuclei_poc", + "created_at": "2024-05-07T03:03:34Z", + "description": "Nuclei POC,每日更新 | 自动整合全网Nuclei的漏洞POC,实时同步更新最新POC,保存已被删除的POC。通过批量克隆Github项目,获取Nuclei POC,并将POC按类别分类存放,使用Github Action实现(已有14wPOC,已校验有效性并去重)", + "author": "adysec", + "language": "Python", + "keyword": "漏洞POC" + }, + { + "link": "https://github.com/perlh/hscan", + "name": "hscan", + "created_at": "2023-08-17T21:03:50Z", + "description": "hscan 网络资产收集与漏洞扫描探活 服务扫描(常规 & 非常规端口)、 poc探测( xray v2 & nuclei 格式) 、数据库等弱口令爆破 、内网常见漏洞利用", + "author": "perlh", + "language": "Go", "keyword": "漏洞POC" }, { @@ -657,41 +666,14 @@ "keyword": "漏洞POC" }, { - "link": "https://github.com/Shelter1234/VulneraLab", - "name": "VulneraLab", - "created_at": "2024-02-26T14:14:29Z", - "description": "该项目收集了很多厂商产品CMS的漏洞环境,以web为主。漏洞环境主要以Dockerfile的文件形式呈现,用户只需一键启动相应漏斗环境,使用项目文章中提供的poc,便可进行复现。", - "author": "Shelter1234", - "language": "PLpgSQL", - "keyword": "漏洞POC" - }, - { - "link": "https://github.com/anamor13/RCeCumPrincipal", - "name": "RCeCumPrincipal", - "created_at": "2025-01-05T14:32:56Z", - "description": "Tópico curso Screenmatch Alura", - "author": "anamor13", - "language": "Java", - "keyword": "RCE" - }, - { - "link": "https://github.com/D3Ext/LimeSurvey-RCE", - "name": "LimeSurvey-RCE", - "created_at": "2025-01-05T13:12:07Z", - "description": "POC exploit for CVE-2021-44967", - "author": "D3Ext", + "link": "https://github.com/LIR794/TG_BOT_RCE", + "name": "TG_BOT_RCE", + "created_at": "2024-11-24T19:24:37Z", + "description": null, + "author": "LIR794", "language": "Python", "keyword": "RCE" }, - { - "link": "https://github.com/Mr-xn/Penetration_Testing_POC", - "name": "Penetration_Testing_POC", - "created_at": "2019-07-24T03:37:55Z", - "description": "渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms", - "author": "Mr-xn", - "language": "HTML", - "keyword": "RCE" - }, { "link": "https://github.com/cultureelerfgoed/rce-thesauri-backup", "name": "rce-thesauri-backup", @@ -702,32 +684,32 @@ "keyword": "RCE" }, { - "link": "https://github.com/XiaomingX/proxy-pool", - "name": "proxy-pool", - "created_at": "2024-11-26T12:57:48Z", - "description": "Python ProxyPool for web spider", - "author": "XiaomingX", + "link": "https://github.com/BOl1o/CVE-2024-49112-PoC", + "name": "CVE-2024-49112-PoC", + "created_at": "2024-12-25T02:06:53Z", + "description": "CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module", + "author": "BOl1o", + "language": null, + "keyword": "RCE" + }, + { + "link": "https://github.com/happymimimix/Git-Auto-Updater", + "name": "Git-Auto-Updater", + "created_at": "2025-01-07T03:44:08Z", + "description": "A magical repository that can upgrade your Git from 2.45.0 to 2.45.1 automatically with the Git RCE glitch. ", + "author": "happymimimix", + "language": null, + "keyword": "RCE" + }, + { + "link": "https://github.com/AleksaZatezalo/managedEngineRCE", + "name": "managedEngineRCE", + "created_at": "2024-12-02T03:04:47Z", + "description": null, + "author": "AleksaZatezalo", "language": "Python", "keyword": "RCE" }, - { - "link": "https://github.com/faysalhassantorjo/RCE", - "name": "RCE", - "created_at": "2024-10-15T04:37:34Z", - "description": null, - "author": "faysalhassantorjo", - "language": "HTML", - "keyword": "RCE" - }, - { - "link": "https://github.com/lambert-chan/rcefc-english-ministry", - "name": "rcefc-english-ministry", - "created_at": "2020-12-30T03:06:24Z", - "description": null, - "author": "lambert-chan", - "language": "JavaScript", - "keyword": "RCE" - }, { "link": "https://github.com/GhostTroops/TOP", "name": "TOP", @@ -747,102 +729,120 @@ "keyword": "RCE" }, { - "link": "https://github.com/AleksaZatezalo/managedEngineRCE", - "name": "managedEngineRCE", - "created_at": "2024-12-02T03:04:47Z", - "description": null, - "author": "AleksaZatezalo", + "link": "https://github.com/XiaomingX/proxy-pool", + "name": "proxy-pool", + "created_at": "2024-11-26T12:57:48Z", + "description": "Python ProxyPool for web spider", + "author": "XiaomingX", "language": "Python", "keyword": "RCE" }, { - "link": "https://github.com/LIR794/TG_BOT_RCE", - "name": "TG_BOT_RCE", - "created_at": "2024-11-24T19:24:37Z", + "link": "https://github.com/gh202503/poc-cve-2020-35489", + "name": "poc-cve-2020-35489", + "created_at": "2025-01-06T20:45:48Z", + "description": "poc-CVE-2020-35489", + "author": "gh202503", + "language": "Shell", + "keyword": "RCE" + }, + { + "link": "https://github.com/tencentcloud-sdk-php/rce", + "name": "rce", + "created_at": "2021-02-20T09:13:31Z", "description": null, - "author": "LIR794", - "language": "Python", - "keyword": "RCE" - }, - { - "link": "https://github.com/vandavey/DotnetCat", - "name": "DotnetCat", - "created_at": "2020-08-01T23:28:56Z", - "description": "Remote command shell application written in C# targeting the .NET 9.0 runtime.", - "author": "vandavey", - "language": "C#", - "keyword": "RCE" - }, - { - "link": "https://github.com/Bug-Hunter-X/PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c", - "name": "PHP-Unserialization-Vulnerability--Potential-RCE-3mt9c", - "created_at": "2025-01-04T21:34:07Z", - "description": "PHP unserialization vulnerability leading to potential remote code execution (RCE) if tainted data is processed.", - "author": "Bug-Hunter-X", + "author": "tencentcloud-sdk-php", "language": "PHP", "keyword": "RCE" }, { - "link": "https://github.com/Fear2o/ShellKill", - "name": "ShellKill", - "created_at": "2024-11-11T16:25:25Z", - "description": "an advanced python-based web shell uploader", - "author": "Fear2o", + "link": "https://github.com/cbween/rcerda", + "name": "rcerda", + "created_at": "2024-12-24T18:00:09Z", + "description": null, + "author": "cbween", + "language": "Ruby", + "keyword": "RCE" + }, + { + "link": "https://github.com/grantdadams/Rceattle_MSE", + "name": "Rceattle_MSE", + "created_at": "2021-10-29T19:44:07Z", + "description": null, + "author": "grantdadams", + "language": "R", + "keyword": "RCE" + }, + { + "link": "https://github.com/brightio/penelope", + "name": "penelope", + "created_at": "2021-06-05T20:32:27Z", + "description": "Penelope Shell Handler", + "author": "brightio", "language": "Python", "keyword": "RCE" }, { - "link": "https://github.com/grantdadams/Rceattle-models", - "name": "Rceattle-models", - "created_at": "2019-01-23T20:51:40Z", + "link": "https://github.com/faysalhassantorjo/RCE", + "name": "RCE", + "created_at": "2024-10-15T04:37:34Z", "description": null, - "author": "grantdadams", - "language": "Smarty", - "keyword": "RCE" - }, - { - "link": "https://github.com/shelldivers/Just1RCe", - "name": "Just1RCe", - "created_at": "2024-11-12T11:05:01Z", - "description": "irc", - "author": "shelldivers", - "language": "C++", - "keyword": "RCE" - }, - { - "link": "https://github.com/MalcomChumchouaPenda/rcemp-dial", - "name": "rcemp-dial", - "created_at": "2024-10-26T14:34:22Z", - "description": "Multi-Agent Based Scheduling Algorithm for Dialysis", - "author": "MalcomChumchouaPenda", - "language": "Jupyter Notebook", - "keyword": "RCE" - }, - { - "link": "https://github.com/rcelo-software/rcelo-software.github.io", - "name": "rcelo-software.github.io", - "created_at": "2024-02-02T21:56:51Z", - "description": null, - "author": "rcelo-software", + "author": "faysalhassantorjo", "language": "HTML", "keyword": "RCE" }, { - "link": "https://github.com/rcellas/rcellas", - "name": "rcellas", - "created_at": "2023-05-14T17:10:14Z", + "link": "https://github.com/josephgodwinkimani/cyberpanel-2.3.4-file-upload-RCE", + "name": "cyberpanel-2.3.4-file-upload-RCE", + "created_at": "2024-12-30T13:36:07Z", "description": null, - "author": "rcellas", + "author": "josephgodwinkimani", + "language": "Python", + "keyword": "RCE" + }, + { + "link": "https://github.com/Zuk4r1/VulnKit", + "name": "VulnKit", + "created_at": "2024-11-28T22:06:20Z", + "description": "VulnKit es una herramienta de auditoría de seguridad que busca vulnerabilidades críticas como inyección SQL, RCE, SSRF, deserialización insegura y XSS. Escanea encabezados de seguridad y ejecuta exploits personalizados para evaluar sistemas de forma ética, siempre con los permisos adecuados", + "author": "Zuk4r1", + "language": "Python", + "keyword": "RCE" + }, + { + "link": "https://github.com/tongshuang2022/dahua_GetClassValue_rce", + "name": "dahua_GetClassValue_rce", + "created_at": "2025-01-07T05:47:03Z", + "description": null, + "author": "tongshuang2022", "language": null, "keyword": "RCE" }, { - "link": "https://github.com/francoeromero/rcestudio", - "name": "rcestudio", - "created_at": "2024-12-30T23:00:46Z", + "link": "https://github.com/omair2084/biotime-rce-8.5.5", + "name": "biotime-rce-8.5.5", + "created_at": "2024-03-28T20:44:56Z", + "description": "The exploit covers several vulnerabilities in BioTime which lead to Remote Code Execution or atleast directory traversal.", + "author": "omair2084", + "language": "Python", + "keyword": "RCE" + }, + { + "link": "https://github.com/m4rcel-lol/m4rcel-lol", + "name": "m4rcel-lol", + "created_at": "2024-11-10T13:22:36Z", + "description": "Config files for my GitHub profile.", + "author": "m4rcel-lol", + "language": null, + "keyword": "RCE" + }, + { + "link": "https://github.com/Lokinado/ShuRCE", + "name": "ShuRCE", + "created_at": "2024-10-03T14:07:22Z", "description": null, - "author": "francoeromero", - "language": "JavaScript", + "author": "Lokinado", + "language": "TypeScript", "keyword": "RCE" }, { @@ -854,6 +854,15 @@ "language": "PowerShell", "keyword": "渗透测试" }, + { + "link": "https://github.com/whoopscs/scoop-security", + "name": "scoop-security", + "created_at": "2024-05-06T14:17:13Z", + "description": "Scoop bucket for Penetration Testing and Cybersecurity related tools. 用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。", + "author": "whoopscs", + "language": "PowerShell", + "keyword": "渗透测试" + }, { "link": "https://github.com/adysec/ARL", "name": "ARL", @@ -863,6 +872,33 @@ "language": "Python", "keyword": "渗透测试" }, + { + "link": "https://github.com/VirgoLee/Virgol", + "name": "Virgol", + "created_at": "2024-11-13T05:39:11Z", + "description": "Virgol渗透测试工具集", + "author": "VirgoLee", + "language": null, + "keyword": "渗透测试" + }, + { + "link": "https://github.com/Leeyangee/leeyangee.github.io", + "name": "leeyangee.github.io", + "created_at": "2023-06-19T02:22:19Z", + "description": "个人博客,关于渗透测试和审计,请访问 leeyabug.top", + "author": "Leeyangee", + "language": "HTML", + "keyword": "渗透测试" + }, + { + "link": "https://github.com/vsdwef/James_synthesis_tooL", + "name": "James_synthesis_tooL", + "created_at": "2024-11-25T08:50:21Z", + "description": "旨在帮助技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累,形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化!且采用GUI设置,使用起来也更加方便!", + "author": "vsdwef", + "language": null, + "keyword": "渗透测试" + }, { "link": "https://github.com/Mr-xn/Penetration_Testing_POC", "name": "Penetration_Testing_POC", @@ -872,15 +908,6 @@ "language": "HTML", "keyword": "渗透测试" }, - { - "link": "https://github.com/whoopscs/scoop-security", - "name": "scoop-security", - "created_at": "2024-05-06T14:17:13Z", - "description": "Scoop bucket for Penetration Testing and Cybersecurity related tools. 用于渗透测试和网络安全相关工具下载、安装和自动更新的Scoop软件仓库。", - "author": "whoopscs", - "language": "PowerShell", - "keyword": "渗透测试" - }, { "link": "https://github.com/kkbo8005/mitan", "name": "mitan", @@ -890,15 +917,6 @@ "language": null, "keyword": "渗透测试" }, - { - "link": "https://github.com/VirgoLee/Virgol", - "name": "Virgol", - "created_at": "2024-11-13T05:39:11Z", - "description": "Virgol渗透测试工具集", - "author": "VirgoLee", - "language": null, - "keyword": "渗透测试" - }, { "link": "https://github.com/chaos198800/xin-xi-xi-tong-shen-tou-ce-shi-fang-an-xia-zai-fen-xiang", "name": "xin-xi-xi-tong-shen-tou-ce-shi-fang-an-xia-zai-fen-xiang", @@ -917,24 +935,6 @@ "language": "Go", "keyword": "渗透测试" }, - { - "link": "https://github.com/Leeyangee/leeyangee.github.io", - "name": "leeyangee.github.io", - "created_at": "2023-06-19T02:22:19Z", - "description": "个人博客,关于渗透测试和审计,请访问 leeyabug.top", - "author": "Leeyangee", - "language": "HTML", - "keyword": "渗透测试" - }, - { - "link": "https://github.com/mohdkey/easy_bash", - "name": "easy_bash", - "created_at": "2024-12-29T09:06:56Z", - "description": "渗透测试用的集成bash脚本,目前还在doing", - "author": "mohdkey", - "language": "Shell", - "keyword": "渗透测试" - }, { "link": "https://github.com/sec-report/SecReport", "name": "SecReport", @@ -945,12 +945,12 @@ "keyword": "渗透测试" }, { - "link": "https://github.com/vsdwef/James_synthesis_tooL", - "name": "James_synthesis_tooL", - "created_at": "2024-11-25T08:50:21Z", - "description": "旨在帮助技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累,形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化!且采用GUI设置,使用起来也更加方便!", - "author": "vsdwef", - "language": null, + "link": "https://github.com/mohdkey/easy_bash", + "name": "easy_bash", + "created_at": "2024-12-29T09:06:56Z", + "description": "渗透测试用的集成bash脚本,目前还在doing", + "author": "mohdkey", + "language": "Shell", "keyword": "渗透测试" }, { @@ -1025,6 +1025,33 @@ "language": "Java", "keyword": "反序列化" }, + { + "link": "https://github.com/jar-analyzer/jar-analyzer", + "name": "jar-analyzer", + "created_at": "2023-10-07T15:42:35Z", + "description": "Jar Analyzer - 一个JAR包分析工具,批量分析,SCA漏洞分析,方法调用关系搜索,字符串搜索,Spring组件分析,信息泄露检查,CFG程序分析,JVM栈帧分析,进阶表达式搜索,字节码指令级的动态调试分析,反编译JAR包一键导出,一...", + "author": "jar-analyzer", + "language": "Java", + "keyword": "反序列化" + }, + { + "link": "https://github.com/H4cking2theGate/ysogate", + "name": "ysogate", + "created_at": "2023-10-21T13:20:19Z", + "description": "Java反序列化/JNDI注入/恶意类生成工具,支持多种高版本bypass,支持回显/内存马等多种扩展利用。", + "author": "H4cking2theGate", + "language": "Java", + "keyword": "反序列化" + }, + { + "link": "https://github.com/864381832/xJavaFxTool", + "name": "xJavaFxTool", + "created_at": "2017-08-27T04:38:06Z", + "description": "基于JavaFx搭建的实用小工具集合,方便开发过程中的代码编写与调试,想学习javaFx的同学可以参考参考。其中包括文件复制、Cron表达式生成器、编码转换、加密解密、Time转换、路径转换、二维码生成工具、身份证生成器、正则...", + "author": "864381832", + "language": "Java", + "keyword": "反序列化" + }, { "link": "https://github.com/cooker-sast/gx", "name": "gx", @@ -1052,15 +1079,6 @@ "language": "TypeScript", "keyword": "反序列化" }, - { - "link": "https://github.com/jar-analyzer/jar-analyzer", - "name": "jar-analyzer", - "created_at": "2023-10-07T15:42:35Z", - "description": "Jar Analyzer - 一个JAR包分析工具,批量分析,SCA漏洞分析,方法调用关系搜索,字符串搜索,Spring组件分析,信息泄露检查,CFG程序分析,JVM栈帧分析,进阶表达式搜索,字节码指令级的动态调试分析,反编译JAR包一键导出,一...", - "author": "jar-analyzer", - "language": "Java", - "keyword": "反序列化" - }, { "link": "https://github.com/LiSForever/unserialization", "name": "unserialization", @@ -1179,11 +1197,11 @@ "keyword": "反序列化" }, { - "link": "https://github.com/Threekiii/Awesome-Redteam", - "name": "Awesome-Redteam", - "created_at": "2022-02-08T00:45:03Z", - "description": "一个攻防知识仓库 Red Teaming and Offensive Security", - "author": "Threekiii", + "link": "https://github.com/ngc660sec/NGCBot", + "name": "NGCBot", + "created_at": "2022-12-12T03:40:22Z", + "description": "一个基于✨HOOK机制的微信机器人,支持🌱安全新闻定时推送【FreeBuf,先知,安全客,奇安信攻防社区】,👯Kfc文案,⚡漏洞查询,⚡手机号归属地查询,⚡知识库查询,🎉星座查询,⚡天气查询,🌱摸鱼日历,⚡微步威胁...", + "author": "ngc660sec", "language": "Python", "keyword": "攻防" }, @@ -1193,6 +1211,42 @@ "created_at": "2024-12-31T10:28:20Z", "description": "VoiceAntiSpoofingAI A cutting-edge AI-based system for detecting and preventing voice spoofing attacks. Enhance the security of voice authentication systems with advanced anti-spoofing technology. VoiceAntiSpoofingAI 一个基于人工智能的尖端系统,用于检测和防止语音欺骗攻击...", "author": "coronatusvi", + "language": "Jupyter Notebook", + "keyword": "攻防" + }, + { + "link": "https://github.com/zhou274/Forestdefense", + "name": "Forestdefense", + "created_at": "2025-01-06T07:22:34Z", + "description": "森林攻防", + "author": "zhou274", + "language": "C#", + "keyword": "攻防" + }, + { + "link": "https://github.com/chaos198800/lu-fei-xue-cheng-Jaden-wu-lao-ban-wang-luo-an-quan-shen-tou-gong-fang-da-shi-ke", + "name": "lu-fei-xue-cheng-Jaden-wu-lao-ban-wang-luo-an-quan-shen-tou-gong-fang-da-shi-ke", + "created_at": "2025-01-06T05:41:20Z", + "description": "路飞学城Jaden吴老板网络安全渗透攻防大师课", + "author": "chaos198800", + "language": null, + "keyword": "攻防" + }, + { + "link": "https://github.com/vsdwef/James_synthesis_tooL", + "name": "James_synthesis_tooL", + "created_at": "2024-11-25T08:50:21Z", + "description": "旨在帮助技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累,形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化!且采用GUI设置,使用起来也更加方便!", + "author": "vsdwef", + "language": null, + "keyword": "攻防" + }, + { + "link": "https://github.com/Threekiii/Awesome-Redteam", + "name": "Awesome-Redteam", + "created_at": "2022-02-08T00:45:03Z", + "description": "一个攻防知识仓库 Red Teaming and Offensive Security", + "author": "Threekiii", "language": "Python", "keyword": "攻防" }, @@ -1205,15 +1259,6 @@ "language": null, "keyword": "攻防" }, - { - "link": "https://github.com/ngc660sec/NGCBot", - "name": "NGCBot", - "created_at": "2022-12-12T03:40:22Z", - "description": "一个基于✨HOOK机制的微信机器人,支持🌱安全新闻定时推送【FreeBuf,先知,安全客,奇安信攻防社区】,👯Kfc文案,⚡漏洞查询,⚡手机号归属地查询,⚡知识库查询,🎉星座查询,⚡天气查询,🌱摸鱼日历,⚡微步威胁...", - "author": "ngc660sec", - "language": "Python", - "keyword": "攻防" - }, { "link": "https://github.com/hhuayuan/spiderbuf", "name": "spiderbuf", @@ -1223,15 +1268,6 @@ "language": "Python", "keyword": "攻防" }, - { - "link": "https://github.com/vsdwef/James_synthesis_tooL", - "name": "James_synthesis_tooL", - "created_at": "2024-11-25T08:50:21Z", - "description": "旨在帮助技术人员在日常渗透测试或攻防演练中对于漏洞及指纹的积累,形成自己强大的漏洞库及指纹库。相比于nuclei脚本可能会相对无脑简化!且采用GUI设置,使用起来也更加方便!", - "author": "vsdwef", - "language": null, - "keyword": "攻防" - }, { "link": "https://github.com/AJCDN003/jubilant-tribble", "name": "jubilant-tribble", @@ -1313,24 +1349,6 @@ "language": "Shell", "keyword": "攻防" }, - { - "link": "https://github.com/AJCDN003/fictional-spork", - "name": "fictional-spork", - "created_at": "2024-12-17T04:58:27Z", - "description": "AJCDN服务:支持无限抗攻击🛡🛡、非绕美🇺🇸、本地抗和国内加速,免实名可测试✅,享受极速网络和强大防御。🎆🎆🥰🥰 🟢 TG:@ajcdn003", - "author": "AJCDN003", - "language": null, - "keyword": "攻防" - }, - { - "link": "https://github.com/EvilGenius-dot/RMS", - "name": "RMS", - "created_at": "2023-06-17T09:41:36Z", - "description": "本地隧道、数据压缩、加密、公网连接数压缩的强大本地客户端,极限降低延迟,防止中间人攻击, 最大限度提升安全性及矿场利润。 Powerful local client for local tunnel, data compression, encryption, and public network connection number compression can...", - "author": "EvilGenius-dot", - "language": "Shell", - "keyword": "攻防" - }, { "link": "https://github.com/Xnuvers007/webshells", "name": "webshells", @@ -1341,12 +1359,12 @@ "keyword": "webshell" }, { - "link": "https://github.com/manojxshrestha/WebShellX", - "name": "WebShellX", - "created_at": "2025-01-05T11:47:29Z", - "description": null, - "author": "manojxshrestha", - "language": "Perl", + "link": "https://github.com/Cvar1984/sussyfinder", + "name": "sussyfinder", + "created_at": "2023-06-02T10:23:44Z", + "description": "Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integration. Subscribe to get API Key", + "author": "Cvar1984", + "language": "PHP", "keyword": "webshell" }, { @@ -1358,6 +1376,78 @@ "language": "PHP", "keyword": "webshell" }, + { + "link": "https://github.com/cpkarma/Reborn-PHP-Bypass-Webshell", + "name": "Reborn-PHP-Bypass-Webshell", + "created_at": "2024-12-29T07:26:44Z", + "description": "A php shell which will bypass firewalls.", + "author": "cpkarma", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/manojxshrestha/WebShellX", + "name": "WebShellX", + "created_at": "2025-01-05T11:47:29Z", + "description": null, + "author": "manojxshrestha", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/MCSManager/MCSManager", + "name": "MCSManager", + "created_at": "2017-11-12T01:41:58Z", + "description": "Free, Secure, Distributed, Modern Control Panel for Minecraft and most Steam Game Servers.", + "author": "MCSManager", + "language": "TypeScript", + "keyword": "webshell" + }, + { + "link": "https://github.com/dromara/orion-visor", + "name": "orion-visor", + "created_at": "2023-06-20T08:01:55Z", + "description": "一款高颜值、现代化的自动化运维及轻量堡垒机,提供服务器智能运维解决方案。支持资产管理分组、SSH SFTP 终端、文件上传下载、文件在线编辑、命令批量执行、多主机文件分发、cron 表达式配置计划任务,安全保障等。该项...", + "author": "dromara", + "language": "Java", + "keyword": "webshell" + }, + { + "link": "https://github.com/nyingimaina/jattac.libs.webshell", + "name": "jattac.libs.webshell", + "created_at": "2024-10-18T13:13:51Z", + "description": null, + "author": "nyingimaina", + "language": "TypeScript", + "keyword": "webshell" + }, + { + "link": "https://github.com/mertmecitbilek/YAVUZLAR-Webshell", + "name": "YAVUZLAR-Webshell", + "created_at": "2025-01-06T21:59:59Z", + "description": "HTML, CSS ve PHP kullanılarak yapılmış bir webshell uygulamasıdır. UYARI: Bu proje yalnızca eğitim ve güvenlik testleri için hazırlanmıştır. İzinsiz sistemlere erişim sağlamak yasa dışıdır.", + "author": "mertmecitbilek", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/oceanmancuonh/web_attack_adv_webshell", + "name": "web_attack_adv_webshell", + "created_at": "2024-12-25T17:17:11Z", + "description": null, + "author": "oceanmancuonh", + "language": "Shell", + "keyword": "webshell" + }, + { + "link": "https://github.com/LT-lanthau/Webshell", + "name": "Webshell", + "created_at": "2024-10-04T06:34:18Z", + "description": "A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.", + "author": "LT-lanthau", + "language": "PHP", + "keyword": "webshell" + }, { "link": "https://github.com/Mr-xn/Penetration_Testing_POC", "name": "Penetration_Testing_POC", @@ -1394,24 +1484,6 @@ "language": "PHP", "keyword": "webshell" }, - { - "link": "https://github.com/Cvar1984/sussyfinder", - "name": "sussyfinder", - "created_at": "2023-06-02T10:23:44Z", - "description": "Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integration. Subscribe to get API Key", - "author": "Cvar1984", - "language": "PHP", - "keyword": "webshell" - }, - { - "link": "https://github.com/LT-lanthau/Webshell", - "name": "Webshell", - "created_at": "2024-10-04T06:34:18Z", - "description": "A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.", - "author": "LT-lanthau", - "language": "PHP", - "keyword": "webshell" - }, { "link": "https://github.com/hackingyseguridad/fuzzer", "name": "fuzzer", @@ -1458,58 +1530,22 @@ "keyword": "webshell" }, { - "link": "https://github.com/justikail/webshell", - "name": "webshell", - "created_at": "2023-04-06T09:17:14Z", - "description": ".-.WEBSHELL.-.", - "author": "justikail", - "language": "PHP", - "keyword": "webshell" + "link": "https://github.com/safe6Sec/command", + "name": "command", + "created_at": "2021-08-22T16:16:09Z", + "description": "红队常用命令速查", + "author": "safe6Sec", + "language": null, + "keyword": "红队" }, { - "link": "https://github.com/ortod0x/rootkitninja_webshell", - "name": "rootkitninja_webshell", - "created_at": "2024-04-02T04:06:44Z", - "description": null, - "author": "ortod0x", - "language": "PHP", - "keyword": "webshell" - }, - { - "link": "https://github.com/pen4uin/java-memshell-generator", - "name": "java-memshell-generator", - "created_at": "2023-06-03T19:49:29Z", - "description": "一款支持自定义的 Java 内存马生成工具|A customizable Java in-memory webshell generation tool.", - "author": "pen4uin", - "language": "Java", - "keyword": "webshell" - }, - { - "link": "https://github.com/MCSManager/MCSManager", - "name": "MCSManager", - "created_at": "2017-11-12T01:41:58Z", - "description": "Free, Secure, Distributed, Modern Control Panel for Minecraft and most Steam Game Servers.", - "author": "MCSManager", - "language": "TypeScript", - "keyword": "webshell" - }, - { - "link": "https://github.com/rb3nzr/WSTDecryptor", - "name": "WSTDecryptor", - "created_at": "2024-06-16T06:33:01Z", - "description": "Extraction and decryption of webshell traffic from packet captures", - "author": "rb3nzr", - "language": "Python", - "keyword": "webshell" - }, - { - "link": "https://github.com/Yavuzlar/Yavuzlar-WebShell", - "name": "Yavuzlar-WebShell", - "created_at": "2024-12-31T00:19:55Z", - "description": "Yavuzlar WebShell: Web tabanlı bir shell uygulaması. Kullanıcılar, web üzerinden dosya yöneticisi, terminal ve reverse shell gibi güvenlik araçlarına erişebilir. PHP ve CSS kullanarak minimalist bir tasarımda, yönetimsel işlemler ve siber güvenlik simülasyonları için geliştirilmi...", - "author": "Yavuzlar", - "language": "PHP", - "keyword": "webshell" + "link": "https://github.com/b0bac/ApolloScanner", + "name": "ApolloScanner", + "created_at": "2022-03-17T01:34:24Z", + "description": "自动化巡航扫描框架(可用于红队打点评估)", + "author": "b0bac", + "language": "JavaScript", + "keyword": "红队" }, { "link": "https://github.com/ChinaRan0/HuntBack", @@ -1529,15 +1565,6 @@ "language": "JavaScript", "keyword": "红队" }, - { - "link": "https://github.com/safe6Sec/command", - "name": "command", - "created_at": "2021-08-22T16:16:09Z", - "description": "红队常用命令速查", - "author": "safe6Sec", - "language": null, - "keyword": "红队" - }, { "link": "https://github.com/KPF888/Starmark", "name": "Starmark", @@ -1656,48 +1683,12 @@ "keyword": "红队" }, { - "link": "https://github.com/chainreactors/gogo", - "name": "gogo", - "created_at": "2022-06-16T07:13:40Z", - "description": "面向红队的, 高度可控可拓展的自动化引擎", - "author": "chainreactors", - "language": "Go", - "keyword": "红队" - }, - { - "link": "https://github.com/mthcht/awesome-lists", - "name": "awesome-lists", - "created_at": "2022-12-11T10:45:11Z", - "description": "Awesome Security lists for SOC/CERT/CTI", - "author": "mthcht", - "language": "GLSL", - "keyword": "redteam" - }, - { - "link": "https://github.com/jm33-m0/emp3r0r", - "name": "emp3r0r", - "created_at": "2020-01-25T08:55:08Z", - "description": "Linux/Windows post-exploitation framework made by linux user", - "author": "jm33-m0", - "language": "Go", - "keyword": "redteam" - }, - { - "link": "https://github.com/geekpentesting/RedTeam", - "name": "RedTeam", - "created_at": "2025-01-05T12:13:46Z", - "description": null, - "author": "geekpentesting", - "language": "PowerShell", - "keyword": "redteam" - }, - { - "link": "https://github.com/BlackSnufkin/LitterBox", - "name": "LitterBox", - "created_at": "2024-12-25T11:24:33Z", - "description": "sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment", - "author": "BlackSnufkin", - "language": "YARA", + "link": "https://github.com/GTekSD/SUASS", + "name": "SUASS", + "created_at": "2023-07-07T13:34:39Z", + "description": "one-stop resource for all things offensive security.", + "author": "GTekSD", + "language": "JavaScript", "keyword": "redteam" }, { @@ -1709,6 +1700,15 @@ "language": "Go", "keyword": "redteam" }, + { + "link": "https://github.com/mthcht/awesome-lists", + "name": "awesome-lists", + "created_at": "2022-12-11T10:45:11Z", + "description": "Awesome Security lists for SOC/CERT/CTI", + "author": "mthcht", + "language": "GLSL", + "keyword": "redteam" + }, { "link": "https://github.com/L0WK3Y-IAAN/Hunting-With-L0WK3Y", "name": "Hunting-With-L0WK3Y", @@ -1719,102 +1719,21 @@ "keyword": "redteam" }, { - "link": "https://github.com/redteamer403/redteamer403.github.io", - "name": "redteamer403.github.io", - "created_at": "2025-01-05T08:15:36Z", - "description": null, - "author": "redteamer403", - "language": "HTML", - "keyword": "redteam" - }, - { - "link": "https://github.com/RootUp/SmuggleShield", - "name": "SmuggleShield", - "created_at": "2024-09-13T19:32:20Z", - "description": "Protection against HTML smuggling attempts.", - "author": "RootUp", - "language": "JavaScript", - "keyword": "redteam" - }, - { - "link": "https://github.com/ShkudW/EntraEnum", - "name": "EntraEnum", - "created_at": "2024-10-21T22:44:18Z", - "description": "EntraEnum is PowerShell based tool designed for enumerating and interacting with Azure Active Directory (Entra ID) environments. With support for device code phishing, token management, and enumeration features.", - "author": "ShkudW", - "language": "PowerShell", - "keyword": "redteam" - }, - { - "link": "https://github.com/edoardottt/secfiles", - "name": "secfiles", - "created_at": "2022-05-25T15:10:01Z", - "description": "My useful files for penetration tests, security assessments, bug bounty and other security related stuff", - "author": "edoardottt", - "language": "Shell", - "keyword": "redteam" - }, - { - "link": "https://github.com/casp3r0x0/pwntricks", - "name": "pwntricks", - "created_at": "2025-01-04T21:31:40Z", - "description": "pwn tricks blog by casp3r0x0 ", - "author": "casp3r0x0", - "language": "SCSS", - "keyword": "redteam" - }, - { - "link": "https://github.com/vectra-ai-research/Halberd", - "name": "Halberd", - "created_at": "2024-03-06T23:07:07Z", - "description": "Halberd : Multi-Cloud Attack Platform", - "author": "vectra-ai-research", + "link": "https://github.com/bsy0318/Chernobyl-packet", + "name": "Chernobyl-packet", + "created_at": "2025-01-07T05:52:39Z", + "description": "Network Broadcast Storm Generator : Red Team DoS attacks Tool for Network Overload and Disruption", + "author": "bsy0318", "language": "Python", "keyword": "redteam" }, { - "link": "https://github.com/CyberSecurityUP/Red-Team-Exercises", - "name": "Red-Team-Exercises", - "created_at": "2024-04-19T15:18:49Z", + "link": "https://github.com/ZHallen122/MSSQL_Custom_Redteam_Tool", + "name": "MSSQL_Custom_Redteam_Tool", + "created_at": "2025-01-07T07:30:25Z", "description": null, - "author": "CyberSecurityUP", - "language": "C++", - "keyword": "redteam" - }, - { - "link": "https://github.com/spellshift/realm", - "name": "realm", - "created_at": "2022-02-14T23:56:55Z", - "description": "Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.", - "author": "spellshift", - "language": "Rust", - "keyword": "redteam" - }, - { - "link": "https://github.com/ZishanAdThandar/pentest", - "name": "pentest", - "created_at": "2020-04-09T08:53:51Z", - "description": "Pentesting and Bug Bounty Notes, Cheetsheets and Guide for Ethical Hacker, Whitehat Pentesters and CTF Players.", - "author": "ZishanAdThandar", - "language": "PHP", - "keyword": "redteam" - }, - { - "link": "https://github.com/emanuelepicas/emanuelepicariello", - "name": "emanuelepicariello", - "created_at": "2024-11-25T18:37:56Z", - "description": "https://emanuelepicariello.com/", - "author": "emanuelepicas", - "language": "TypeScript", - "keyword": "redteam" - }, - { - "link": "https://github.com/Java-Chains/web-chains", - "name": "web-chains", - "created_at": "2024-11-02T10:41:25Z", - "description": "Web 版 Java Payload 生成与利用工具,提供 Java 反序列化、Hessian 1/2 反序列化等Payload生成,以及 JNDI、Fake Mysql、JRMPListener 等利用|The web version of Java Payload generation and utilization tool provides Payload generation such as Java deserialization and Hessian...", - "author": "Java-Chains", - "language": "Dockerfile", + "author": "ZHallen122", + "language": "C#", "keyword": "redteam" }, { @@ -1827,23 +1746,176 @@ "keyword": "redteam" }, { - "link": "https://github.com/BKLockly/RustLoader", - "name": "RustLoader", - "created_at": "2025-01-04T09:07:20Z", - "description": "rust远程shellcode加载, 过Microsoft Defender、360、火绒", - "author": "BKLockly", + "link": "https://github.com/edoardottt/secfiles", + "name": "secfiles", + "created_at": "2022-05-25T15:10:01Z", + "description": "My useful files for penetration tests, security assessments, bug bounty and other security related stuff", + "author": "edoardottt", + "language": "Shell", + "keyword": "redteam" + }, + { + "link": "https://github.com/sneakerhax/Arsenal", + "name": "Arsenal", + "created_at": "2020-03-07T00:03:45Z", + "description": "Red Team tools weaponized", + "author": "sneakerhax", + "language": null, + "keyword": "redteam" + }, + { + "link": "https://github.com/spellshift/realm", + "name": "realm", + "created_at": "2022-02-14T23:56:55Z", + "description": "Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.", + "author": "spellshift", "language": "Rust", "keyword": "redteam" }, { - "link": "https://github.com/cL0und/cL0und.github.io", - "name": "cL0und.github.io", - "created_at": "2017-08-16T02:39:00Z", - "description": "redteam.today", - "author": "cL0und", - "language": "HTML", + "link": "https://github.com/GTekSD/gteksd", + "name": "gteksd", + "created_at": "2023-04-30T07:31:28Z", + "description": "My short bio", + "author": "GTekSD", + "language": null, "keyword": "redteam" }, + { + "link": "https://github.com/BlackSnufkin/LitterBox", + "name": "LitterBox", + "created_at": "2024-12-25T11:24:33Z", + "description": "sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment", + "author": "BlackSnufkin", + "language": "YARA", + "keyword": "redteam" + }, + { + "link": "https://github.com/h4m5t/VulnAlert", + "name": "VulnAlert", + "created_at": "2025-01-04T14:19:48Z", + "description": "基于Django 的漏洞管理预警系统", + "author": "h4m5t", + "language": "CSS", + "keyword": "redteam" + }, + { + "link": "https://github.com/0xIapetus/RedTeamingNotes", + "name": "RedTeamingNotes", + "created_at": "2023-10-19T21:35:53Z", + "description": "Red teaming cheatsheet for Windows Active Directory environments, featuring a meticulously curated cheatsheet that transcends traditional command lists. This resource is enriched with in-depth explanations, foundational concepts, and strategic insights, coupled with actionable operational security ...", + "author": "0xIapetus", + "language": null, + "keyword": "redteam" + }, + { + "link": "https://github.com/navikt/helse-redteam", + "name": "helse-redteam", + "created_at": "2022-09-15T14:04:33Z", + "description": "holder styr på red-team ordningen i team Bømlo", + "author": "navikt", + "language": "Kotlin", + "keyword": "redteam" + }, + { + "link": "https://github.com/venator17/Snakes-Lair", + "name": "Snakes-Lair", + "created_at": "2024-04-29T21:59:27Z", + "description": "My GitBook website, which huge evolution of my Cybersecurity-Notes repo", + "author": "venator17", + "language": null, + "keyword": "redteam" + }, + { + "link": "https://github.com/Sholabom/redteam_llm", + "name": "redteam_llm", + "created_at": "2025-01-06T13:47:07Z", + "description": null, + "author": "Sholabom", + "language": null, + "keyword": "redteam" + }, + { + "link": "https://github.com/yaklang/yakit", + "name": "yakit", + "created_at": "2021-10-12T02:15:42Z", + "description": "Cyber Security ALL-IN-ONE Platform", + "author": "yaklang", + "language": "TypeScript", + "keyword": "redteam" + }, + { + "link": "https://github.com/jm33-m0/emp3r0r", + "name": "emp3r0r", + "created_at": "2020-01-25T08:55:08Z", + "description": "Linux/Windows post-exploitation framework made by linux user", + "author": "jm33-m0", + "language": "Go", + "keyword": "redteam" + }, + { + "link": "https://github.com/Sabberinfosec/VidExploit", + "name": "VidExploit", + "created_at": "2025-01-06T04:41:04Z", + "description": "Simple Bash Script for Hacking Windows Using Malicious Video Files!", + "author": "Sabberinfosec", + "language": "Shell", + "keyword": "redteam" + }, + { + "link": "https://github.com/huan-cdm/info_scan", + "name": "info_scan", + "created_at": "2023-11-11T13:56:19Z", + "description": "自动化漏洞扫描系统,一键完成相关漏洞扫描和信息收集、资产处理、IP基础信息探测,系统采用B/S架构,系统分为源码安装和配置好环境的虚拟机,项目会持续更新,欢迎在Issues中提交需求,如果对您有所帮助,欢迎留下宝贵...", + "author": "huan-cdm", + "language": "Python", + "keyword": "信息收集" + }, + { + "link": "https://github.com/testnet0/testnet", + "name": "testnet", + "created_at": "2024-06-14T11:29:17Z", + "description": "TestNet资产管理系统(资产管理|信息收集|暴露面管理|子域名扫描|C段扫描|端口扫描|漏洞扫描|Hunter|Fofa)", + "author": "testnet0", + "language": "Shell", + "keyword": "信息收集" + }, + { + "link": "https://github.com/haishikeji/QHY-QJL-XCX", + "name": "QHY-QJL-XCX", + "created_at": "2025-01-07T08:17:21Z", + "description": "群接龙主要用于微信好友和微信群之间各种接龙场景,如:活动报名、团购、收集信息、活动互动的、社群通知等。支持模板市场、AI生成模板、数据管理、数据导出功能。", + "author": "haishikeji", + "language": "Java", + "keyword": "信息收集" + }, + { + "link": "https://github.com/haishikeji/QT-JYZ-YY", + "name": "QT-JYZ-YY", + "created_at": "2025-01-07T08:02:03Z", + "description": "加油站运营系统是一个集成了多种功能的综合管理平台,系统提供H5、小程序,支持微信支付、支付宝支付、拉卡拉支付。帮助加油站实现高效、精准的运营管理。该系统涵盖了从员工管理、广告投放(如轮播图广告、优惠活动...", + "author": "haishikeji", + "language": "Java", + "keyword": "信息收集" + }, + { + "link": "https://github.com/haishikeji/ZF-ZHZX-QS", + "name": "ZF-ZHZX-QS", + "created_at": "2025-01-07T07:32:41Z", + "description": "智慧政协系统是一款集成了提案管理、履职跟踪、社情民意收集、会议活动安排、委员信息管理等多功能的政协工作平台,包含APP和WEB两端。该系统通过WEB端为政协工作人员提供全面的政协事务管理功能,包括公告发布、提案...", + "author": "haishikeji", + "language": "Vue", + "keyword": "信息收集" + }, + { + "link": "https://github.com/haishikeji/ZF-PMS-FGW", + "name": "ZF-PMS-FGW", + "created_at": "2025-01-07T06:34:13Z", + "description": "发改委项目调度管理系统是一款面向政府发改委部门的项目管理平台,它集成了项目申报、联防配置、业主信息管理、值班安排、巡检记录、工单处理、用地管理、用户角色权限控制等多个功能模块,支持项目从规划、实施到...", + "author": "haishikeji", + "language": "Vue", + "keyword": "信息收集" + }, { "link": "https://github.com/709343767/phoenix", "name": "phoenix", @@ -1854,12 +1926,30 @@ "keyword": "信息收集" }, { - "link": "https://github.com/huan-cdm/info_scan", - "name": "info_scan", - "created_at": "2023-11-11T13:56:19Z", - "description": "自动化漏洞扫描系统,一键完成相关漏洞扫描和信息收集、资产处理、IP基础信息探测,系统采用B/S架构,系统分为源码安装和配置好环境的虚拟机,项目会持续更新,欢迎在Issues中提交需求,如果对您有所帮助,欢迎留下宝贵...", - "author": "huan-cdm", - "language": "Python", + "link": "https://github.com/Sakwya/AICareerCrawler", + "name": "AICareerCrawler", + "created_at": "2025-01-07T03:17:34Z", + "description": "用于收集人工智能相关职业招聘信息的爬虫。", + "author": "Sakwya", + "language": null, + "keyword": "信息收集" + }, + { + "link": "https://github.com/ECNUCSE/ECNU_ITers", + "name": "ECNU_ITers", + "created_at": "2021-03-13T15:22:26Z", + "description": "ECNU CS & SE 信息收集; 华师大计软院友墙", + "author": "ECNUCSE", + "language": "HTML", + "keyword": "信息收集" + }, + { + "link": "https://github.com/SimonSkywalke/InformationCollectionPart-time", + "name": "InformationCollectionPart-time", + "created_at": "2025-01-05T15:37:38Z", + "description": "万恶的兼职公司剥削我,每天干8小时才赚100。生活所迫,只能写一基于Python的GUI插件用于提升信息收集的速度", + "author": "SimonSkywalke", + "language": null, "keyword": "信息收集" }, { @@ -1953,84 +2043,12 @@ "keyword": "信息收集" }, { - "link": "https://github.com/sunshang-hl/CityWalk", - "name": "CityWalk", - "created_at": "2024-10-30T14:55:21Z", - "description": "这是收集所有公园/图书馆/博物馆/骑行信息以及一切可以户外活动的仓库,通过它让你发现自己所处城市美丽的一面,让你更愿意走出房间,去感受他的美。一起在城市中漫步吧!", - "author": "sunshang-hl", - "language": "TypeScript", - "keyword": "信息收集" - }, - { - "link": "https://github.com/official-free12/dai_IY", - "name": "dai_IY", - "created_at": "2024-12-29T22:56:05Z", - "description": "【带后台】股票诊断推广单页源码/股票客户信息收集网站源码", - "author": "official-free12", + "link": "https://github.com/leveryd/x-waf", + "name": "x-waf", + "created_at": "2024-12-04T09:37:29Z", + "description": "让\"WAF绕过\"变得简单", + "author": "leveryd", "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/official-free12/xian_qW", - "name": "xian_qW", - "created_at": "2024-12-29T22:24:15Z", - "description": "(限时特价)股票诊断推广单页源码 /股票客户信息收集网站源码", - "author": "official-free12", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/official-free12/zi_Qb", - "name": "zi_Qb", - "created_at": "2024-12-29T17:42:22Z", - "description": "【自动发货】股票诊断推广单页源码/股票客户信息收集网站源码", - "author": "official-free12", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/springbear2020/images-gather", - "name": "images-gather", - "created_at": "2022-07-12T13:01:12Z", - "description": "基于全注解 SSM 和 Bootstrap 的两码一查系统,适用于高校内学生的健康码、行程码和密接查图片的收集以及学生健康信息整合和管理。", - "author": "springbear2020", - "language": "Java", - "keyword": "信息收集" - }, - { - "link": "https://github.com/TreeWu/win-monitor", - "name": "win-monitor", - "created_at": "2024-10-24T09:11:47Z", - "description": "# win-monitor-client 用来监控win系统cpu、内存、硬盘、定时截图的工具,因为给外婆自动播放视频的电脑有时会卡着,所以做个客户端收集一下这些信息用来做监控", - "author": "TreeWu", - "language": "Go", - "keyword": "信息收集" - }, - { - "link": "https://github.com/liugddx/info_collect", - "name": "info_collect", - "created_at": "2024-12-04T06:35:09Z", - "description": "一个基于 Python 和 Flask 构建的信息收集工具,用于自动聚合来自多个主流网站的文章。该工具支持关键词检索、查看文章来源、每日推荐最热文章,并提供友好的用户界面。通过插件化设计,您可以轻松扩展和集成更多的数据...", - "author": "liugddx", - "language": "Python", - "keyword": "信息收集" - }, - { - "link": "https://github.com/testnet0/testnet", - "name": "testnet", - "created_at": "2024-06-14T11:29:17Z", - "description": "TestNet资产管理系统(资产管理|信息收集|暴露面管理|子域名扫描|C段扫描|端口扫描|漏洞扫描|Hunter|Fofa)", - "author": "testnet0", - "language": "Shell", - "keyword": "信息收集" - }, - { - "link": "https://github.com/racpast/SNIBypassGUI", - "name": "SNIBypassGUI", - "created_at": "2024-12-15T09:11:13Z", - "description": "一个通过 Nginx 反向代理实现绕过 SNI 阻断的工具。", - "author": "racpast", - "language": "C#", "keyword": "绕过" }, { @@ -2042,6 +2060,24 @@ "language": "Java", "keyword": "绕过" }, + { + "link": "https://github.com/durunsong/kilyicms", + "name": "kilyicms", + "created_at": "2024-07-09T12:57:10Z", + "description": "这是一个国际化全栈中后台解决方案, 支持16种语言切换,前端: vue3, typescript, vite5, pinia, element-plus, unocss, sass, 后端Nodejs, express, MySQL/PostgreSQL, Redis的管理后台项目, ⬇预览: 网络需要绕过大陆⬇", + "author": "durunsong", + "language": "TypeScript", + "keyword": "绕过" + }, + { + "link": "https://github.com/racpast/SNIBypassGUI", + "name": "SNIBypassGUI", + "created_at": "2024-12-15T09:11:13Z", + "description": "一个通过 Nginx 反向代理实现绕过 SNI 阻断的工具。", + "author": "racpast", + "language": "C#", + "keyword": "绕过" + }, { "link": "https://github.com/pxx917144686/Surge_pxx", "name": "Surge_pxx", @@ -2087,15 +2123,6 @@ "language": null, "keyword": "绕过" }, - { - "link": "https://github.com/durunsong/kilyicms", - "name": "kilyicms", - "created_at": "2024-07-09T12:57:10Z", - "description": "这是一个国际化全栈中后台解决方案, 支持16种语言切换,前端: vue3, typescript, vite5, pinia, element-plus, unocss, sass, 后端Nodejs, express, MySQL/PostgreSQL, Redis的管理后台项目, ⬇预览: 网络需要绕过大陆⬇", - "author": "durunsong", - "language": "TypeScript", - "keyword": "绕过" - }, { "link": "https://github.com/chaos198800/Samsung-ji-huo-rao-guo-gong-ju-v2-ban-ben-45", "name": "Samsung-ji-huo-rao-guo-gong-ju-v2-ban-ben-45", @@ -2186,15 +2213,6 @@ "language": "Shell", "keyword": "绕过" }, - { - "link": "https://github.com/leveryd/x-waf", - "name": "x-waf", - "created_at": "2024-12-04T09:37:29Z", - "description": "让\"WAF绕过\"变得简单", - "author": "leveryd", - "language": null, - "keyword": "绕过" - }, { "link": "https://github.com/passeway/Snell", "name": "Snell", diff --git a/resources/JSON/github_repo.json b/resources/JSON/github_repo.json index 8e7f970..fe45428 100644 --- a/resources/JSON/github_repo.json +++ b/resources/JSON/github_repo.json @@ -110,10 +110,10 @@ { "link": "https://api.github.com/wy876/POC", "name": "wy876/POC", - "updated_at": "2025-01-04T06:15:34Z", - "description": "README.md", + "updated_at": "2025-01-07T07:14:02Z", + "description": "Update README.md", "author": "wy876", - "link_2": "https://github.com/wy876/POC/commit/d6a2a1e8cfb5db7059511fe5b02745327bd25efe", + "link_2": "https://github.com/wy876/POC/commit/9eefec0a4c311a412a86ab83bef3a25d3cb1766d", "keyword": "wy876/POC" } ] \ No newline at end of file diff --git a/resources/JSON/sougou-wx.json b/resources/JSON/sougou-wx.json index 210dbb3..720fc8b 100644 --- a/resources/JSON/sougou-wx.json +++ b/resources/JSON/sougou-wx.json @@ -2,142 +2,142 @@ "银行测试": [ { "title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd96gjASBlwUFSqWrJq9alN4-cD8UKdfyYRmq92d8CN3CH0g3HWxZYWpx91CwKZQf3SmD133jeXS9hC2mzDL34Zuo8bNtdNkcws4MRmO4xmHoeLVGZTzAewMfnjvxIWNdB9yWSvDNh2HojXkNjQdMv7Kq6x9bZVTQhwdEyfatc_3ZajotuuiAmOIg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9uBmqTfM-y4nsoj9xXyjEwFFJocsdI0HMyqzPegXqvHaxeLZkj3zzLA99fw1CidOsG_nLFmHVbh_Bh33KpirDDG_zNb9SpnU8Y0IFy0clsXCxa_sS1YLULmpKDyygnGxOTsJdIvAJj49Eh-WgjUguHdTpKGiCkjLMikGk8ZmcOHfzAjcIGepUqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...", "author": "观八闽", "pubDate": "2022-02-22 15:30:56" }, { "title": "央行出手!支付宝们正式被“收编”了!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX4mNlNXRqlmWhnN00FW01mQJ6Cq1_wcjAYgOP1R5cvAKAT1IsxuN43PU0aaIM5G9I4iMeicHsZmaWvJTr0FR9KydodjkDBa9gC1HBpiJyORkZiyUIOrzjX2q3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lk2yA87GAVvPeFd4Kyy9Vc3Rk_ZC3DSg1oIY7qM84PHcvJd27OBShi4sczy_Y_vZH2KhHIxXtjm2_ZbKXKuHsXABUPgshdZk1m7cHkwXbUSTWz0F8cq6L5z0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...", "author": "人民网", "pubDate": "2017-10-17 11:43:30" }, { "title": "美联储最新消息!要求银行多备“家底”,特别是→", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1anPy5RoRMOOlXXEFpWD2-z4uzbjvbThRtFLBq6sqoGAJvvqQJrhGRvkyoIUFinrOSHMqyTBAhaAFtP89LGcHXY_lnpd9I5uHN1NMiWi3-nXU3s-y5L509bm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDEy19L6dBvnOY17CB2hTU9gbvwd9d-c6NSB6ecbdNsQ4-SKziE28OvzLtlyxnUA15QBa8Bl8lvm7LIKac71VBnLKsaFxgZJmQbSlcrASRqo7h7etHpSk9GPFj3x9Nw6p-Fg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...", "author": "央视财经", "pubDate": "2023-07-12 16:15:05" }, { "title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9RzvTwRtWYY46SVdzi5AK7vdYtVIWxOxZDKCkSE_i9yyqMMZ20cZ1tet8xLzKyroEO77zXjakm4E3k7tbo1snKjWXKtdWcFdt26OsIF4Ogndp24w1YN_8XQJSaYhp-sotUP3nDUA-XmPK_uM8XOFLwFtxtKAK1D2MJV1GTpNItLf1AfaFW2DefQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd96AEaSzpLm-rNz9gvH9Mw7juO1CMUmhSqFXgLknzeHBUXPQ5j0cr-_eDz1HsLfvG2Ywukz9KFbK-8yqQvky8vbhGCeGEdSdiwvr_r90No_z720O0TXaFGS_CMpgiX1HtdqotEhit6QfoVqXyr1F2vbA16lkvjcK0V1ACCIW9Z-MhQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...", "author": "人民网舆情数据中心", "pubDate": "2022-08-31 19:55:10" }, { "title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX1kv60Nl9NUocyG5omBgAzqyhSXI3oGv5MBVM7XsbV8--xNXP0IDjc51i4F8EWCyrCbsgIKyI2dqFslqoXQHyBbuzxSAZWAGtDRe_KXOlvVhQtlGooQ6xYr6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lgVQ3PpOdEZvxYy9NN48rT0H7oCiHAjlFkf-gqSl_9O6fE7BXPbWMzx57zv5FbumE6140xqOoX4Z0MyVPXVMDfdF0FVRYe6GmX7v6dNojYT342kEU62ok2NCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...", "author": "人民网", "pubDate": "2017-05-29 08:02:43" }, { "title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ItfcIcKoWlLm8Rr_34Fda7N0QENXqvUdpC8uDCUMyP3o8kt-vjbwvo2jDC738B-2xWbdEKfY1O6EZpU8fDyyy7-FVN_6GvWw2wVnWCV_xKj180rrEYdldMUAvPcTu1jIlcL4-eY0sAdHck81TMJpkYwOOxFnW03FOTV2DXA7Hpte0WC6Sbi7DA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd95gufFuvmFmunuzImDXDgKxIsYyBuv1iylpinM2yJqtal_DwtO966KSvBk1At-veQH3AHVYHsafRaFsWrARuyctj_i9s8VDpeSaeetiSdqofYf4gBRIyEaMg_0k_9xJL_QyrethG4RTaeQ1TbaM3rq4B8-P1hvntGE1gcvUf34arm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...", "author": "新华网思客", "pubDate": "2023-05-05 13:51:35" }, { "title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9RzvTwRtWYY46SVdzi5AK7vdYtVIWxOxZDKCkSE_i9yyqMMZ20cZ1ten6BVrWcbLSaeG0DGxoah32zYL2R28r8t_uFYTgU5UCXDV-fA0eAtaVLxBnrPQwq9dyFJC5MTAQPUh92kuYx0dz_OkgxIVMN4NNG14Jxnxyi0p0l5-cLjSE8RsmObDbtQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd96AEaSzpLm-rNz9gvH9Mw7juO1CMUmhSqFXgLknzeHBUXPQ5j0cr-_c2txhR-1LXVPPx8y0ZBuoE7QzgFPAD5RBkfIoNQhoI0q9it_G6I08gjunphJjtvHsrpS-YG3YD-qJiidS19dgNHwu9Rlke_k90hxgVztir6yBPEnKgzXaECYioxHkzTmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...", "author": "人民网舆情数据中心", "pubDate": "2017-09-14 08:16:46" }, { "title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsVOz8NzTUl--VgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3SJgbbWFN17kjfqrSL_2PJVIhAsjXs3f_DlIopi7j_Sok8JIrH16vSVXuSIe89MhwiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWINRLn_OoTJmmVgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI37CQEHgmP4AxQAEunkkd7sE4haTNX9yxvEwV32aUJfTCul0Art-alMu75l5qp49P5iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...", "author": "人民网舆情数据中心", "pubDate": "2017-01-12 17:06:08" }, { "title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsVOz8NzTUl--VgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmMnQlnLeioc3teHPGFtZgtcE_sh7rSSEZnor6LNsNpWEvD3_mwMlEdhex-WGqPYDE1iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWINRLn_OoTJmmVgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmM8_xzsJhyuhwsx93e6R5dMXIeLqMttJuPATjtvUTLlEdt98MdG4C0pQJeWmLLAvpeiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...", "author": "央视新闻", "pubDate": "2017-01-14 16:40:10" }, { "title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ItfcIcKoWlLm8Rr_34Fda7N0QENXqvUdpC8uDCUMyP3o8kt-vjbwvoTmS2wQM2YPMe_Od8CN0h0ZTRrI1bsRi36o3NVnPdCQTe1qvLMqw08cOLg_T2JYwTORyotNYWVo_hvRaFd77uhDl-6mCphnALHU6q1SG-UuWYSWBra5Nsg6Ebq8fk9diw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd95gufFuvmFmunuzImDXDgKxIsYyBuv1iylpinM2yJqtal_DwtO966KS6mwZuB7PscQPhGgEvPCjHcSNYYM3p8CESO9VhvuenI8iEnO9ogE32uPr11cAoqla88cFVDdmyjqt2HFN3UyKHAM5rhbBmAd8eu_k6x-3yzU7poz-7MFGSFW6cwuUnkdA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", "description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...", "author": "新华网思客", "pubDate": "2023-03-16 10:44:22" } ], "APP逆向": [ + { + "title": "Python爬虫开发从入门到精通APP逆向班 十一期 语文五哥 写作素养 家长必修课share", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9ULdrNr8Lc1z9HvYjwTeL3gn_T3IIbIxgbouUygTTQzs4BHEj8pPg03_3QlqNu1h_brNoNz0uwl8kw2CoRSc3V7rah1FP3GjLjaPcLcDHESE9fOOeX2sMbZFeltslBrlswC29NObfbjt3yK3k3UilXsLrAO71pqWmmYOiqhDNtuUCYioxHkzTmA..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "description": "有Python爬虫开发从入门到精通APP逆向班 十一期 这个课小编唯(^_-):yyywk5 或 yyykc1---------以下是填充----------有Python爬虫开...", + "author": "好学知识园", + "pubDate": "2025-01-02 17:23:55" + }, { "title": "路飞爬虫开发App逆向第八期share", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9l40l5MWzjtbsbsR6eNCWCFc2fBtcWxYi1RScM2JNWvWAbXS2wSQe0vsRQxnJ7FxpS7-Hly9zOKbAYIy9riVzrmGRJgS4PuGQmbXjaxbg2fDzhk0fzVTRilh1Dg5i4BYm9iLOcV7xnhleHYIRY1mnBfK97YnmvOAU-mai6i3jnIE6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd95oD-toi_5trgSuc9Nels9Ufpilh9FkI9tZOzR5vZ-va5Yd-z66UPgzEwgrxuVxxuHLCD3ujfEjmAA1u2tIYRajsgXqZmofFO2E17uRZxAPevVjLJWD_INMZfh5LcaGPd0BPzZkSkoq2kdN2l4fRiq0FyBPK7jd9TOXdgrCjYo3gCn9lOoZLP2Q..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", "description": "关注以上公众号,后台回复 课程 即可领取哦~有路飞爬虫开发App逆向第八期share路飞爬虫开发App逆向第八期share### 路飞爬虫开...", "author": "小马找课呀", "pubDate": "2025-01-01 05:11:41" }, - { - "title": "一文了解安卓APP逆向分析与保护机制", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfj3humpwptDRbEJyjNDsbawLqlyDY2crnuCOeWpl1fqHvMk7rssIzzTHnmoiXrmqTp4VL2r66onxNjLT3YKAkrhiStrVU8t3sgukCyJGd2TBXVadmu6l5TOE8RsmObDbtQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", - "description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...", - "author": "FreeBuf", - "pubDate": "2018-03-31 18:12:34" - }, { "title": "AndroidApp常见逆向工具和使用技巧", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsSr0UegHo_8eVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AEZKkSu6ctdDFCQQgOOwZapcVyAZ3I_PY9VtKigBfXGyg4kpWQffwFHw4vjE6ADUXiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIrEafOQmfu4uVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AFBTCYE2dpEWhBBUnn1bF2GMpP8Hz7LzzGiz1bAU7yrDxZZI9lCe25afpvcDWXPS6iZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", "description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...", "author": "黑白之道", "pubDate": "2016-10-26 10:17:15" }, + { + "title": "一文了解安卓APP逆向分析与保护机制", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqTc1lE-DUs3abKpdEMyO1qkxmiO5iiQySuf1P6QfCAIB9pIoLm_zlPFiyrfnXnGj4WGxSLPtlacTeeKkREAyrbTA3p1Z72FCvjSVQ64MievCbmN4zhckSicC2Qmj7RgGwQ..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...", + "author": "FreeBuf", + "pubDate": "2018-03-31 18:12:34" + }, { "title": "FlutterAPP逆向实践", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9XaFRr9-KEoQ7epe88ZjBhpKdFNuZ0flx7uWdPvFHT6FLj96Ft5D40pAhJXVi62Fu1OBlqLeQHR6pl7E3Onhe8_KSuYpfoz-nMx6NQN5gvmlwBN2BLnvKNFfgGoVFfvji05X42WeTRJbLWq-d9wNbSveee96zYAzf4ZcQ3sDhmpbdrgozfSg6bw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9qjpA3veeY-KdBJSH508h2ao6GqlcXBkGAI3gNcG9TKSac92MpYRXFwzgf7IxhrbVjLzyYdH-ipMMpqbRANg3RGk6q6RSvFwEotgrdzV1GH2euvubPwgFuFOKSNh0unJQ1P608zgLZkATrTbSmyxa3qP9Fsc-zSV7s5e4tuFMxNBhlgeRt7bSzA..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", "description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...", "author": "看雪学苑", "pubDate": "2022-07-21 17:59:03" }, + { + "title": "记某APP登录逆向解密过程", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9TDjn6xUhYtyquFIJ5GlKHgQw2hsa88qvWlDV8Iwt8p_1UD-MDApVoiuFUWTugAQaBoi2SXoGtadFvS2kDJs9ob5vtkRuYVNYI9YT2F7AGQXgy_6NxCsKH0LUV9UmJm042kTBFuUlvaJ8Z879KInFPbPRuc4RqTmbdsc1TMvIXonuL0unUdKkuw..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...", + "author": "黑白之道", + "pubDate": "2024-05-03 08:36:47" + }, { "title": "APP逆向神器之Frida【Android初级篇】", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9_j6j2UQN-vxChK1eOjr0eV4x0Gr7qGfxyJYT1IO9o92OYF_6hIhsjJKE2v5sJLkZQ9POZalNGJgbHBCqMNLOw2ax_tV8iR35g8jJjvvwlC3av3PGngcOQN8XSGpD-AWTkLIzjJ7_lWPAOTdf6aFmfPo5_F-iNt59bA7SDsc8rvcYJSSFPgfogQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9MONZWwY2e31Kgj_DEYF3LmznY349dkgnWNMy6EVefBS-zfnhPSV0xRDW6bORJGsH-LxRMwspMJUA8M1V6okWS9rOULS5x2vLMc_rtx9obGs1TtJaggaAp531macUe6gHI4vgVBzc4pJTDGxuVxQMyGL5p-35mzmbkCVfs2z6rRkHpHkoPMgL3A..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", "description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...", "author": "NightTeam", "pubDate": "2019-07-03 09:00:11" }, { "title": "APP逆向sign签名算法:Python实战指南", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Z2uQi14zjGFECgple0Il5-1K8SLax84YfVaqkNMacaLrG1rkvGbndY6sEGVytRQ2Xa9okGtxlAiFdqvEtLdW8rbW9xGCpXc-0hrzlDs5UvWb91zgNMTb1rkzPqK4FbfdwKi3bykgC3WcITmV9kKf9MJmAnpcRK7rN62zqqL31VVS6t2rFt2rnA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9jlaxwnjFyK8TgmUewblozGTo0OtWYsiUKVnnYWvLbIaM6xqgnFZas1yqfSvD7qiGXGaUR2EEFQE6Hvzt1-CTfY4oc7mVr2K_GnHt14lk23aePCYX4pIVwjDVfufhGn5nMKEDU_cLiT_2rFBE8yflu6CXvwpBp3wzboZJK_gy8fZ5Nu7CnoSqqg..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", "description": "在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...", "author": "雷雷讲py", "pubDate": "2025-01-03 09:40:29" }, { - "title": "某文APP逆向抓取分析", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Qik4Bv1BdhGxuGMxUzDpjTHOHAh2qfSAh3Krx_VuApSoTdBPktWaIA3Epnk8GTJMeXFCVhhtbySJLh6_XpknCTNSZNDBWubXlcGZvix282X7mCdrMEP3WRC6Pd_oeSUHGhU87R4ma3wJvots1NbSZ5qCC1EK-lgfPTVgeIFcOgPYl_Q5RRZQjg..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", - "description": "逆向app一定要多练习,这样才能在实践中找到自己的不懂之处,才能够成长.好啦,今天的逆向小文章就到此结束啦,童鞋们下篇文...", - "author": "猿人学Python", - "pubDate": "2020-05-07 20:19:43" - }, - { - "title": "抖音APP逆向:附带抓包与6神算法探索", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKNciYPpIcdmE5dl9P8Paw_x58MkIGEcJw3juWkEMf3Hfa2tGfX7oJGkopviLeKN6p0Qsf5Pjq5lQJ440gcqIG3P92dCjJKmIEw71YhhkAfJptZjnqDZ-9WctPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", - "description": "走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必...", - "author": "彪哥in讲py", - "pubDate": "2025-01-03 13:10:22" - }, - { - "title": "APP逆向工具清单", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKEQotIC1WeYHE8IYVGBIMwjYX9eBY-oL5HUkRlYI-PnA1yRFHhpHP7Sm7W-AWObVBA3hV_7JOu-4Bl_kDMDYSBKlyTq-ojDhmiIxLICWVTQxzYYD-Z4gXxIGX_iHL9MadA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", - "description": "嘿,各位热爱编程的小伙伴们,今天咱们来聊聊APP逆向的那些事儿.给大家整理一份实用的APP逆向工具清单.一、环境准备篇重点...", - "author": "彪哥in讲py", - "pubDate": "2025-01-03 13:10:22" + "title": "APP逆向系列学习(二)", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd92qncWfEbAvtzGcKRzBFPQozLI431gF48Z2U-FsKwQJfFyw9RXdaqWMLuc0Z_V7udSQvOGBgLeCDq04U-bF25vlUzA9mPefOljzWzWppaDmh8Nq3eEfLul5gryq7ZDNBJECSEG2T6U03lguNPgEkgGtD3NsBdVri0rG5zJ7mvUlb6zvkPgoArRQ..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "description": "APP逆向系列学习(二)这个章节主要是体验frida进行脱壳,前期有些问题太多了,真是人麻了.android配置:说下遇到的问题,在...", + "author": "呼啦啦安全", + "pubDate": "2024-04-18 13:47:14" }, { "title": "对某数藏类app逆向安全分析", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9GiViCKgEh3hp7ZlMSpKeIxQIvdCmAeOoiCEAYw2fNdPDoAUxw7Sq0DjCePM34mg90eQZy34NnNqcQj5B9QyHOBprivnuY9SDKs905S9kj1Tnh4hFQDNN_v8e06kIiEF_i9uWMfyA3VvPejxQjlknYq3DhADG6xVBsJgDwHp2pAz2CsG6-xMgzQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9M9zjE8MJhOEZlPmWi2rm3KbJOj4k4ZGisjpqaLZow-9EtQUtJAQzDzU20xoJes1SraT0lYB-kKnHoReqfTbZ3XNyu4hr1xfhZPZSI31v6a4qNr-s0ukZGeMUCsQmLSroj1mwEAyv--q9g2xhNzxY16ZxTwcuOpTpiWTn5J75Lxxf_71bqkOtiw..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", "description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...", "author": "编角料", "pubDate": "2023-03-10 18:32:22" @@ -146,70 +146,70 @@ "渗透测试": [ { "title": "200万年薪!人民网这个岗位等你来!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX8qGwPH3KbbcOfd5INLRfVOxfp1RmFDjWiC5AESW6uBQt1ARzykp6WnXPJqVHomGyuI1e2brDBsJsJAkCE6fFpUM_dvx1Fbs1R1ahyanbhhtQnaAWuchNYhOJBjQH7pCxQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_ljlno77iIOd5lcl9F5wsb3Iilf2w089eSCo9KsfpFOwwGqQl_bK-oUDVZc-3WXl5GbcBkEAxO2zSXGrjDvFNuRnXE0XZk4URT_9itp0iK8B6Kk8NxgJ1JKt5Nu7CnoSqqg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...", "author": "人民网", "pubDate": "2018-08-03 15:22:17" }, { "title": "人社部拟新增10个新职业,看看自己能干点啥", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9dZOej61YtrTs2h1vajWyLvKQP6bKmphmX2eNGeMCIj9cimnvgL6vCF4lh-VxQl2-B2l1KbtoyjAjcti6Ew5yPemwVke2fiYQ1b2--6hUi0rnBgUnzvAraGWPflbRRq_Cer5174dgOFyK__WHtse0Kf33KGmbqhX4RMGQt_DwgyBAe0f8bRARvQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9efcbaMmiv2GsVuzzmtuIvcbwVbQy5CMYK9EhVSPcXal8GHjOeUZLTJTuQ8dbekr_tW3ZXE-qnvlV5rIPB3AE_GZM1ER0OEB1ABQZp2pJpVsze_Gm84vP5fHdrJOJFabXOh1qi2Y_a9GAz5YdH7cNltW-Y6aOZefDoc2WM7_UIKGfxjh3za6jWA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...", "author": "人民网海南频道", "pubDate": "2020-05-13 14:27:12" }, { "title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9PqQlcuvFN9g_bqeJ5QbmnFYukolAkRoQx0xYBeMcYYfmYhi8e3rtj7iNCfeiK5HlQDI2bw8Osk9rxaMLLJwXsQphT_kRDliL7scQtccwCZHS-mTRty1p96RW6EiR-yQysa0_N306GbPD4ev3QkpZXZ2tgMs5FpOKxlWWwy28zbM6Ebq8fk9diw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd93OSGFv8EmwpbmU6uHCYRYcvX3pfHaXZWlcOOZa5X0lCTXjKdJveeVO0g5kMAKOpF8o8Fd_QSPgErO-zdfciZKKPXBZ3mjrEfBZLnVImKzUad3Uqo9ItxnBrr8TDSwxt9qrIlIYRzVJ91IchRHgT8pK6S0X5kz0PcjF85E3-plshAe0f8bRARvQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...", "author": "新华网", "pubDate": "2017-08-24 14:13:15" }, { "title": "中新网招新了!打工人,速来!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9wS1-G8W9o-dL0JnQBeYzqIiA8EPSwmklDhtUOAJ_gaxnBlMl-tw95bALxp9cqLooLYczvhrvkAT24s-4JDW_cGN6DcrYgusOEMtZ7fwAigRz1xdN1W7kAnUlIVB0i6u2MT3T0lmG-EXTxO655c74o6kCwZJL8l1weOMKobcj_NQSYTqT4eyLmA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9brqA-2z5sV44YpCsy2p-lvlTHlDECaDYlWimKytQYjBS-roqmgf69-zUQXfJqJ4bdXzfn7Wo3LAU8kteQdFHZaDOowCBoxAnbwG4i7jFUq5fqwBpwKfw6LhLOrRCPyycWLYiC1Y8GocHkRxe7eS-9cLzBeO_khHWn8GSvOWsdJ2fxjh3za6jWA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...", "author": "中国新闻网", "pubDate": "2020-11-03 15:52:39" }, { "title": "人社部拟新增10个新职业,网友疯狂@李佳琦", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9TZnKhlrYzz2C1Nz4XB2uPAU7INirf6N-EPFi35x_DyDQQ2U_N0i2TTSVXCM-RaBIngebSx1NYTMxIp8fIEf4GllEl1P12oBM0SDJmQOtTYix88S5OWkRiuo1Uqih0dC41ndhrPQ6j07RVVxMWkSNvVEw-HEGSL7N7xWZGQs8WB5535pjGOOjYg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9iap-xwd8B2DOWjyowLFx7eyUlNAtStx_hC0VIFtlV6zfQAZaW-UrNEODhAQ2cc_dXUULGvGpybH85xwrDgLgeX8EQfnASsL1DO0FcbJvp1OmDFy70CzZNgl8Aakf0FRSamMqDafxAbPltDzVwa6ppK8D3eH3rOTeEYuK8Y51BXEGX_iHL9MadA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "author": "光明网", "pubDate": "2020-05-12 18:12:17" }, { "title": "撒贝宁惊现滑雪场!硬核测评来了→", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1by27scDSV9q6BoNp03By_ohkFhfL-9FAgQb7YxWHsEklzyKl78FV8v5UgPr4DyomQ0W08nr1Ts_5vL6-ETYerjVPoYai4WW49pAWUQqAwWLYiM6jy4dt_9S6t2rFt2rnA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDE3xedJ0Q-c9YK7OzjYe5rErOVTXm0YuEXeihQmdJDrXz4krcryH80BaDzo36v6augLSvWuqUMT2MlZ1qkxz1YqN4AKju0LLQnudKOXD3w9nMjpSJJYXMuL0NGbbB75bUeA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...", "author": "央视财经", "pubDate": "2022-12-30 15:14:23" }, { "title": "柠檬“上海户口、百万房补”?你也不是没有机会!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX8qGBPQpmJmF1rRfrn5fJly2VvqaQ-XpG8Wpb2_-zIn6bxmOMqxLrTQLOuuanB1sYdZvgaEPHUQ_udxLIzJIJaLSwU6OPy1lUa_pYMPu4R-tVumWS8jpVoy54z_tGSZTqA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lnK--ec5J8Kp0xDK-g8kILLzd12O0HZ4OoFf7W0lSmZ_hasEmvRVeRmKwlZVHhhdipSwrLaCIj1CgAwkQyNvoMHNAHD58iN5TzbZemadBLrGiQxtDpEzXpDP28temKTOwg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...", "author": "人民网", "pubDate": "2020-07-10 19:38:53" }, { "title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1TQOwn5G3LPFoeGO5WCEDfZNe6QZL1NIGM0VeHsxA5urCoIoQbUY1J-3cRF2qAGGnslLQ8KcPQcAuul1a1w-R5AvAZlJ2xqETo2iEl62_XqAsadlOaPc61ktPujwwRB2Pw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDE5DA8b3qGoK07-jKwuNMznSFYIVWmvTtqGJwxqqyTpCtsLGpwshnDWy6SyWI1U8Gf6mjKfhQJa_qNOaC9Y0rrh2ttqNR-Vd-F6CPpUS-HccJg2lh9jDcK9nwdVqCwyPdzA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...", "author": "央视财经", "pubDate": "2018-10-09 06:45:24" }, { "title": "李佳琦们要“转正”了!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX2XNLJWGVtZrGSPoWA-po6Axj2CrwLkI6W7csg2ZrMwZt17z5yDXX6HQdz7ZfgPmpTjMhPRO7p-QXldvSR8sNIdXOd-6aVKXHM3nV99G0kF_8Ut3OBNuY5TFcvUoAZZH7Q..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_ltmxPJDZA3ERhpvTAtUQIBE-cXd7ILhdSIHwev-v059a5xj_sv3Obo4tmXMwTcXLqdxnSv8TP4L_feTSEGRqOLJUArx4zhhzYjVieNYvjcaea4tdSIGh_YkSYTqT4eyLmA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "author": "人民网", "pubDate": "2020-05-12 19:02:37" }, { "title": "撒贝宁现身滑雪场,硬核测评“小汉堡”", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9QCpjvSjbD4VMiHiS6Jej9mDQtM6tDHgU2NR9YST4vm3iEQ4bmE2yk02M3hB3ZKMTnrW9eSQrLikycRLGkWlNpmLZ98gC2Oyx-bbMkKG0AcpkRnl6tX9H2npHvM8XU8Z6eP1WRk_fhw4cVHe0mMGuVfTg_etL_psPgGv70ysPZXq54z_tGSZTqA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd944tfK_MlGkvFg-1wKUtTQBcZrvur5p6CXLTCxDE8mrRRE9Ds1chuwLJBJ1R0W9b8tpzWT-5vinRA58sjDLWe24wVZH5z2zMYbzt72Z3WcYBCJyTB5ZP2nnK9d0H0dd6He199uOB79WpWQM0S06QYlUsmB85WxiIQvqZocoXk1MZe0WC6Sbi7DA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", "description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...", "author": "央视新闻", "pubDate": "2022-12-30 18:03:44" @@ -218,70 +218,70 @@ "手机银行漏洞": [ { "title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9fPAEaSpFXxfae8BDlsMpqKDKzXpikguf1JnIOJ71rS9T6B1Ci9_KDPzxj-onF2fZdPfhdIcXYHOVkKtxCkFd_bh9rAkkbR7uxY-OzvxNEhvEQ3sVetUAFgB5hfnp7hwbeS5SeRmQq0lv-OfuKRSevGmV4sGsvp54P435H_cIa_sCYioxHkzTmA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd96wzNlDGKF74IS5Dmj4VFC_2tomzwFNMNnREdfnK4Mq3rooSKWN4ShnIg7A9Ec5Pb9lyxWlOS2bfFGsfmr5KHQiKvEXuHlqIv6YQqs2HwiTLuJnPeTm57LJpdDwhxMIQkv-7BeYBc8hd4KYJuwRyqMMoQbCQ5xcrut9FubXbdVv8Cn9lOoZLP2Q..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...", "author": "木火通明", "pubDate": "2019-04-23 21:42:11" }, { "title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9ijJxckBNMIw2ONIiAAgQD0orZTwt52sxaQbBLPhNvKiwLwJEB2b8RPJNpWJsPOhDh0JfRVCw0pPHMt0_TuGoNx0Na-eMRsMPacmnLJzQCS_ZsH4040sKCA-L9rfXZZe8viuVGrdaHndRxZSm-4Kf-p229-kDQ-v09MbXGF3_9EnS-e4Yz84xMA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9TqUVhoJQx4ossYz4w_UeJ3L7oAZR8Z4AAVZt_7Vy-3g2rU5fmGOy_evytb21d7yZMgM06UVOBurDxKvIA2FZtHy1-_FzVsLb2tJ_c7MVxYP_5mHhVHd_yHy3b526gsyKBSl7OnbFIInI7cn8DwrViUZLkM8XabKSCqSEW5uEDWz1AfaFW2DefQ..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...", "author": "支付百科", "pubDate": "2020-03-19 19:33:50" }, { "title": "手机银行漏洞:五行代码可转走银行250亿美元存款", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYsuEt3jaJd8_4YrAqrUNSCl45ZS13pkM7BPtp4uoFW7hbK7RW_-gzNADKbpYdWefeyiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYszliFOwjwLat5Gy4WXFwhaO2-P3TkgG_OCcmIvT_QvXpzcATxy1SWMo-tM0mwVyUniZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...", "author": "安全牛", "pubDate": "2016-05-19 11:48:56" }, { "title": "黑客攻击发现:多家手机银行APP存漏洞", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9_A1AQX6nXlQnF4S0o79mYUL5Owo7YEYZVEwoF7uCZkq0QzDzxkcKxqO__hkw14kXiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9Y09V-oQCQ__TOSZRUgUKweX_Rt2UzbkANv7DcsH7oyEfniYKmGysiT0PgF57dXMXiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...", "author": "E安全", "pubDate": "2016-09-05 11:36:23" }, { "title": "某银行手机APP现支付漏洞3天被盗刷40多万", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzG3_-b7D05fUkhS2dCV9OXNE36jCXDB9M-os7L6Y-eOqtKNvldU87WWYxXAeTlg8hiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzzudrNNAcr6Uwh9bUJ-aLkndXx7A2o1ZW57bvlGLCwufwxQJ7_x-gBFrDKCo0G_yIiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...", "author": "支付界", "pubDate": "2016-06-16 09:00:18" }, { "title": "警惕!手机银行APP也会存在高危漏洞", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksj3rJsloDZaWdhg33lCtO23AQAsZ3q6lwX4133lbIo7gy8Ms0DOToTvctecQCZ7xPiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksuAHTGFmi4QCtrwWPkBFO3yFjBPhEC83LpmH5c393FrSnlu5XmLNrwmVkOkEYBrOUiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...", "author": "中国信通院CAICT", "pubDate": "2017-03-15 14:13:34" }, { "title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd91yEjxg5etkiY8I05ZkcFL0nIvEBF5_g8o5RMTX_iAs_nm-9XiQA7EEJyd5Wg-dEJPcPyEw422pVmwHvWHUB7VYNk0yk9Ml3Vjx6cvMXlqGD4F4UGOt0mlHgopCQEf0bqYIOMiBW9fSZ-FnGfFUMCXFzVDPQXS5-M9_-pIgBW-HzuL0unUdKkuw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9KtxJ0CIOoVXVkQ168esAVbejdCKMQ0FErz14KHaT7XQ4eT-q3Be8p4txAAAFbIaPO3sC7tA4_PC_hRf5lpXh0RSxBLs1Z5YlsV__SfftHP-kiBuTt6c1KA7mKF7WdjMTO3VqKezJItSaGlY-UkeddGu8es5-jWvZZpyR_RtNzk2jotuuiAmOIg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...", "author": "银行科技研究社", "pubDate": "2019-10-23 12:18:17" }, { "title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9kt_cpR-bPG0kD5wAUBIu0u1JVtacfwh98Ugm3ehSMzall6cemiDIOpPJV_E4tHnkDTbC92YPHQBUNCg5TK7X2a-hwy2T-6cnlIIV_Ql6oF2m0MvkUIKrecDciQZHEvrGK_zxjqYk9ms3MZX_VAzzRUmHHdwhzXvTZXgH5Qd66kNf_71bqkOtiw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9f9Spk8cQFi90pjUVtGTOH7dH1KeyQoJ1ag2aKmG_lshrXmY3kYK2lrY83F76rJ7bkr5pZhbFSpdPgkQZb1NjZTdXIadwXNND5dhCAhnzcKptUaLRlAD0sXg4ZU0yq5FjbSpIpjrhRbYiMWb52mVqw72OhhJA1but1wxyjIpC5kXuL0unUdKkuw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...", "author": "乐享崇仁", "pubDate": "2019-09-12 22:35:10" }, { "title": "警惕!有人利用手机银行漏洞疯狂作案30余起……", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd99mlF0A7yMALXW7mwfuxq-UcFznooBU5xpthqQqLOe2puE2gTOnKFcqv5h0LNpDTBlArlMgHctDJ8Qa6StRv7o5Zmz8hcmHa9AL1Abj0GMaA_LUDUi-VqaDCw8EW_IlnKo8UDKQVWW1XljufB1jPsn46FOcDw8ZTogywAZbCis970OK9DLfgmPA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9tWMpXSnRp5DF2fLqyrs0ORhZXGUEm6kR-IdIVZqgmiwRIeZVFf-LbKjZ-cVB4efOtU-sPWzWKza7vz-4v_yXQSa51uoJaZK87V7EaDi3zFHhG_Av5MuP0ksy8zr8iMcBsJcwvzJQuaChAVdIO9S55tYomrtJ4xsQ10PqKwej0dpOJBjQH7pCxQ..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...", "author": "玉山生活", "pubDate": "2019-09-15 17:21:04" }, { "title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUagADWgAB_8d3tAGKyj45KEoeIpC-s0dCPCKrXYMy4_9_3ytPzCl-d1qcPmS2LY4JjiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUanMkpA6ZSJLMFU71W6gTYwdefTnWcBudO3Oc0O14ztlN9E9V_7fMzmy2CmBrRDzpDiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", "description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...", "author": "集宁佰事通", "pubDate": "2017-01-20 11:26:29" @@ -290,145 +290,145 @@ "银行漏洞": [ { "title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd98XvXEKD25NX6fFkj6ypfZpEleWRT0-zrb0y2ksPWB0hCZa5M_GffioYP7XWySX2IgoOYoA_VtEygDb2d8ClozWAWyKDgpj-KuEqOSQhN2q72Q7l755R7slClKCTTWKS1YOfrh1pswOKaugDOWbuRrlAU04b1nGqdry6eRJDZAHLy08OLTBhW0A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9gWPGT2YFt0MRSMKl_hVc-wGTiVPjNHbKazFOBPgpqyq1-YmPnEZuty7Dv5WNsgVeEDaUgTtevmTqtWVlfiO6DWDkqJN8BqgAdlluIVCSnYfC89S8nJkok255_aqO-DCgSI1PFwt6aLqFdleiiOKEp3C8CzUwWsCZABWmPOSX_4ZQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...", "author": "测试届的LV", "pubDate": "2019-06-10 08:18:15" }, { "title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9the489nMZTrRM-XiN0wAJS0Ym_01yhUvKd6BHAvqjaLdvSGG1CxgULZG3ha2ETji1FdSP89up2VoDTzKeVNubwaoDcVsKVAwif_kcwLnQPRw5kFShQkUkNc-BP7LNPAhoZmr7jsEJ0DxmcFnVYFC_LDTGB6n0XrwP-BiVSFG9nvy08OLTBhW0A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9ciUS0Af6iifXpaqWUC3uErufLBF5RcFUARX5kV3Oft-HAWOaUoc3BIYdhzRhF1EQVj3bfxjyLZFkbT2uK6CeOAVU8PAqyxtzvoKVLwz5zmIonsj0F_o7SGEicbor4sAZxqEKRV7ptLFh5ustzG-uZO9OpX5NCDMhC-73szG0dGlQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...", "author": "新浪财经", "pubDate": "2020-07-21 15:52:31" }, { "title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9YglTSPBY73UVBVfCyPBM__Gf5YGPS_Bj7SfT1EIH8IyvVr34PjFWfrKthy01X3LANqhKMiac9lptbpW1SwKDvAlRs9QsbW-se_0WCpsQtg0PCxoVK31JriHyCvT02s3dYfQYplz82Nmg5_a2bLQwgBlfCxFmYnIi3wWLVbag0bhhlgeRt7bSzA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9OOw8_9mc-EQXpPeuC6_q4OIqmBrisCMegr5A7FCAxlWQ8ooTNyrcgJJMFngN_0e8dF6ItmxI1Ze2-sAuum6HNV5T8egjGSmQq7NjSGgd1tooa3s_iTlxFhzkGp3e1caodCXw3iawr2hdlYvNM3veArVLzwcuyj1VDWKBf2DH4vjRtmyIGw2VAg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...", "author": "纽扣资讯网", "pubDate": "2018-08-21 19:29:05" }, { "title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9XwF5OfuwLiwn84vZXvJ4dBt4iAqSs2CIC13kr1UbI3ypvWBQyC9QB_u5IGeonYqb7SBVvnI5e7lKTjfuzHtJYpU_EqxULy97EGfcl9S1lr3qzvzynmH7wxNmZMZwfWJ-dvihKku0ApLDfS1jMSzIM-9g54S14GDnD0hS4aQStUR5Nu7CnoSqqg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9bMbVZh9G-lAyg6D15CQudGl36ycyUxQn7klg_G3Pnvjd7Bw05tJxwbeMN5xjTcZc8SkK8H_DQG1djWxlJdPzMyJcsBvoN0E6-y7Cal_KdOGNhrSDVDSzS6qpSxR1zTpUINKNpEXNycHXjTeLBig7jLb5Gnd7QQJ-O6QCJf9EXnU5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...", "author": "外交之声", "pubDate": "2017-12-03 23:54:42" }, { "title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9tLqsRfiKt2fcmnJvyG1JPGso0xteYU7eLR8AuGjNEhMPKILCiQeYE5SmV30yzXRecuMT18woYDZjeAkLa7NY8YlORktwzCWZnX3eWNitozAcRICchLoVjBiQ8CX6S7JU5hUj6SM13FlxwsjMq0TTDKyXJkalD7xEOJFXlkKKI-eAFV_3u-a3OQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9tdbu_BCHj7gmdtoqTtPjoSiSJBviI1AQwHcC_7PrOmM4BOKrgb4aVxzRL_R6aO8zHIjezUqftVn3aiFIHfJxCJpOOD3pdXrx71Zv5EwW2MEju3GdmUn8etx3YQk6RGx2Im1VetVSPME6lm6Ga8YquvNDggsNUKufMbs_NBw5xqX6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...", "author": "知书局", "pubDate": "2023-02-03 18:20:39" }, { "title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9lJ5xF9ayVllVDmBWDFddB3A0ze8ILrxRj_Rn0wVXNu-5NdN5ylRK8R_iw2zXyhwzVoGZz01im9bl7iTW1ee2fgayLpJyZZ9z2_mqrFBNm2t3oFDq5ZALjafoVLHWJlsJdIcvkG7cYpWdYJr73NsMTPfiv55fN35LLy7844tQScNhWLv6O878UA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9CXy-yCeecAnXBp1uj5JxMvi5z9rQIf3ATdmLZ1at7xjp8x3_Xk047tAdz6SA_wGn18dbFWdON5PYrQVPpGYpJm7-uaYawjuFKT4XLncW_H1cYD_J3zPIvpwJL2n7syTthDpURfL9cC70Tj4k0liD8pJmBS3T1-y56tKEgcMwF7O00NVofL2iDw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...", "author": "澳网", "pubDate": "2017-12-04 23:18:55" }, { "title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd94AGs_6GEpTEOlIDUJWpFLKY35QhP39XQAD2Hjr1EM66fOP8I0uz41ODKxAASi5XO2BwG_GhfAyozzkibN-RyuMjJxUs5GUqRjOh5hvCpWBZRuzTxEfDsKaRiuOXCj7B21oaiktXepiCDsyZdbVYcYRLkCWxQVmNH5hPSIR8jY1BhlgeRt7bSzA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd97RQlw9ARSObMmAMST-tMYHm5H8PwHV5MtMOqMXMaiZMy2xBM1tUCTdJDYByc78GD_WCvHsSJv4w1uTTX67R0h2ahlO3eM2OvKwCqXBtJuxQuUop5MkL35ZFCUy586Jr-V5s1FVwtdW642-ABsmQwQ-w0MuWxN0GbYPtB6uQN9XpFH6In5Ei3zg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...", "author": "火绒安全", "pubDate": "2017-09-11 17:23:47" }, { "title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9grUjhSztIpxVqenVsHUGZh__-mG7bPlAymoA4Bvf4Vp9dk7gIbKJ8YWHCC_tuCcsKDQCkyemmn68lSX7JrwtNfFcpGBOjjnHgUOY4BV6vZNh5ssu64OjFc0OzN30N3exJFjQhSGSwP83Csa1ZI-6x0BxIDV3mqpDZPOBGv_nWyvuL0unUdKkuw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9JWIii1OV4DeupK5w1LZdS3aKg6DiTzSGUIEe63-1x2dVEpo7HsSHq0WTk3o0pRu0CYzj1CeYZxM8gtOVbJ3r1CrIQPNy23Klq25un2nkFVaLV3crQEQ_CaGU7UhG4M4h01NBKQJ__ziP_bwu7BCADP5WQf9ocWE-piDaYUNx_z1Q_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...", "author": "灵枫历史阁", "pubDate": "2023-06-04 17:49:26" }, { "title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9-ZWZ2PHumi7RwfCGcnSI1EEJ4c3z7RFK_xmye9XIRvNsWWpB7oTFg8ile_gcSisdTSI0xxvQ5QnsdCIbp8ptCi-INS9GA1ymH-Owiw3PEGRBwWKE8gKnqfSPjeNpoGEmSVo4F3tSb81SXDQULMjREtgtxVBCitrDMKpDs3NYILuTJmCU1UgHwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9hcsF-n47gQuRy0e9Yr0mNOs3CYncPzlszK9CJvS0lH3S0SeTk2yaoDvzg9ACC-gIlAA7WO-UEIS0LMOX7DAq_hoscBAwzHg7hlxDFXFzetAD-_KD0-hCBQLgvKP9eiodDKJvKnwZ0WkwQrD-EodvSwONeKcgqwu1qlUJUhk2iBVQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", "description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...", "author": "城市知道温哥华", "pubDate": "2023-10-09 06:55:35" }, { - "title": "黑产利用光大银行漏洞,信用卡1万额度可提15万", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9YuaXX5I7Blccef99ne-2EIhqkZKehrz2jzlhA9fdpKOiIrdXgWSF9gM5LymyAsqAGL-hJnheY-sczKHmEQMc--omRBFmDI1Ccv1KhlVSo0qHbS0NV5b75zTb-Byz9IG9DUJ78Csr_WM0NoROpsxEcDgootiglj8AOLQbQu07PT-q3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9", - "description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...", - "author": "可转债摊大饼", - "pubDate": "2018-05-26 13:15:31" + "title": "这几种套现方式钻了银行漏洞!竟没有被封…", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9aAGWbb4TAN9RhbkWboIST0VbhdfgzrPfN6ym34UZ4cWeR3LKTWam7NRzPN8kJ4jjfXGR3kktRId9pcv9KYpkSnhvZ_qJL7JjiAor7BWcD3tYjgSrM5ii__7dKWW95dVBqtEv-jlnEYD8ierLzdRYuv3JbcJua58Xpeoi6bu8Tv4Cn9lOoZLP2Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "description": "不过随着银行监管越来越严,很多卡友也受到了处罚,卡姐有个朋友,堪称“套现小行家”,用信用卡套现了5万元.仍然在银行保持...", + "author": "来谈钱", + "pubDate": "2024-03-17 18:02:42" } ], "支付漏洞": [ { "title": "史上最全移动支付漏洞案例 谁动了银行卡里的钱?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgZu8tviIIT75g9oJnjSeXJTBPJukiy0atEmChO0frq5n8JGLH2LKcbH3Qi9ySg6yniZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgzjtdQnSq0TvpYxUSn2SWuSQM4RtqS0rAYm6SIZ_Y8Di1eENg0LGTN6UZDNPA5PaEiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "雷锋网硬创公开课-移动支付漏洞案例@GeekPwn随着移动支付的普及,我们的生活变得越来越便利.我们甚至已经可以不带钱包、现...", "author": "GeekPwn", "pubDate": "2016-04-19 09:35:10" }, { "title": "手机支付漏洞已成盗刷之源!小编教你如何防范!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZn_QnfHYVxrjFBHWq66HXNYTtlU5ZEhjdBmpZs2I0tlE3pUxzRkNegYGNmjurPsOgiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZGd3u2FRtBg_TPwWOr1utChU56Fq8cOajnpbA21TbCMRlHDkHEkzycMpeUPCA-4pxiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...", "author": "电脑爱好者", "pubDate": "2016-05-20 17:30:26" }, { "title": "就一加手机支付漏洞讨论在线支付中的安全风险", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfrFmQsylociJLjS-mnBLJuoMu32Rxtsxlr4lo_Z8-Lok-wp9h25dKO7utld1wWLMrmY6bEwRvr7jqxjgki4oBcL8e-taz9vzwD3GLxYY4q1fOy4T1mDuUHJe0WC6Sbi7DA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqcxtcMtoMGVI0FPHpPppGIPZ6N8Ry8WRM4dEwMyV7gNJejzSauxOOWCQQhHpymInuNtGHXfK3osV6y8Z2YTUAaW6mOqWu7JVEcsjFMvTzhv5UAckkOmnE22rCDCayYmfpA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...", "author": "FreeBuf", "pubDate": "2018-02-12 19:17:27" }, { "title": "天融信:《电子支付漏洞报告》重磅发布!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9HLpnE2kVZd1IeNEEadfYBn1loyl1Z-xCgV8ehiYbGHBG_OjiU-GEtAvlLjYH1bf8nBpoZHfKFW50XhDAUifGmms-JrmgtyPsh3RmVxqbNzyY29jqn0GC64yQtkEf0-c9WKZe-yP6TX1f-9A3XG6ZpGgCDhVybA7L-WkjZCD1Lwk5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9zWZZE-CJlhxBllPbnGftsuo2yzQQ7DoYaDAc35Wc1gHG4zEx24qN38avdW_nVTmJJasOsiGxpjAhLRLR_bWnYXSmQAJ4RYHZusjo8fsF3as-7bxMCRNYGBt2gP4F13EF2BVetJ1ic-KA3iBkc47k3waZ61g6kc6p3rW5u1uPassNGbbB75bUeA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...", "author": "天融信", "pubDate": "2023-07-12 18:21:06" }, { "title": "银行卡免密支付漏洞这么大!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20x5JWHrDlTUo9CT21SzH5qvJuYARiyPAoZSVbUHFSJ9tCZB-UEOs5lWi13R8piIn5kiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xb7RsigplhBUo_xhNO4jppq1LRZiE0127V9uNpApYrOpd7dWJLorCgjQt21IQKWxPiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...", "author": "犀牛生意经", "pubDate": "2016-08-29 09:23:44" }, { "title": "敏付科技存“支付漏洞”被约谈整改", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9T7MSItBWUDi6aBtqRJl8vLhibdQpcX9KHK_9pINJAT4FktBvm82SMRpvfx7KRgsW4OQml8kzCMCwukpjvXw1XMhXUljTQZP_Dm8QZubiEB2Wzh2C3Apz7t0e4o8K7SU9wYA2xyLzKOfWoJb2ktKwyzJcQXWJ9t9nw7KM6M30HoTYl_Q5RRZQjg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9ZG6ahmSu_TZtqLkv3mqVjj-0qnUDQGbIbLKGI3lkUNYD3QVubl9Q9uPOIrdYB-Goe_HVonN362zKOf3iI4fk0Acp47FblPvt4M5GW4TCy9es8t0XIeOITzENXDz4EVTsxYuoZGSM05JXTC6QorS_ZbXDgN3hd_aCZRpPBzAnE29j32-j2KiwUw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...", "author": "支付之家网", "pubDate": "2022-01-24 08:00:21" }, + { + "title": "聚合支付漏洞被利用,新模式主犯获刑", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9kplfVXQebeHfZxhQ4pYSosUiELUgx_-egE2_6OaZMIGwTxmAQc6RsY3k1QC-YTOGcZZ2bM3Tid9EPPmnw1K2S6wchB0dB0GfAAO29TkBgnUmXcLybh-yLBVkyCSurjpOj9tdoocz-kxUrMl_1_2KpqRFL0D6g93EQD_NLMygZzz0OK9DLfgmPA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "description": "一些不法分子利用这一漏洞,通过搭建非法的支付通道,进行如信用卡套现、信用卡代还等非法活动,严重危害金融市场的稳定.信用...", + "author": "蓬博看支付", + "pubDate": "2024-12-10 12:00:18" + }, { "title": "利用支付漏洞套现1300万被判15年", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9ijJxckBNMIw2ONIiAAgQD0orZTwt52sxaQbBLPhNvKiwLwJEB2b8RGz9sddV35XEd1tlMDaDHLCaYNpK_xdB_Z2v0AztsETHJ15Ppg0A-HsOyHqMXXU4bszK6kpOJ16P1vLsZk690W2OIuJza-W2HFt2BhuAy6kbEhHkzLhEHNLdrgozfSg6bw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9TqUVhoJQx4ossYz4w_UeJ3L7oAZR8Z4AAVZt_7Vy-3g2rU5fmGOy_Xgwm5Tzklzx4lq-owNROYVnB0lcTKZnRREuFG6mTp-dhFEoI-_XQho4W-IkK57ivSR7_erNh1nU3HilLm2tdz7_6-uKAsofK0kvkjXafyOf88NRua3oSAo5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...", "author": "支付百科", "pubDate": "2022-01-03 13:54:08" }, { "title": "某小程序的支付漏洞+任意地址删除", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9v5SVMkK_FaY4t9Rq_tvTCDq3JK1LD5qKq7j_abZgfHRDa3Xz345a7lmyooHcu-9Oq-RX4K2AWqz5u8hQyZzsf8RbseD4nJh2td5Kue-f8lIqaOo268sgxzBJHQNy44VdZoHZCerA2BM3-fxCuQZ1xXh-3tgxYpSLLp9hDG4DuBdS6t2rFt2rnA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9GU3OPDb_otSqQiEv8MR3-NGCLvsqrVRWAPiv9Wk6CinqHRXRRzfpTkGgPGCEeEIqyClz1EMAHPUktnugMohsXOs8oTkiEy4JH08zucA2JuYY1E4GoLNKjIumVKzvDtdIb7bBjJmb_hd5QGDTiv5a0vlqdAix_fBzlEfPY8Ym1_KjotuuiAmOIg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...", "author": "狐狸说安全", "pubDate": "2023-09-14 14:25:44" }, { "title": "从最近的微信支付看XXE漏洞", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfivnagF8mYgB2rsrNTDEkBApV8-AR7AUMkA9EEK8Aw1AdcG9aMx2QUkIhuszZNfcrNj-h1FCBP0PelgoHGhR28PH_o2UFD_tQBMNt7Adu4CGcPaBna-erXM5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqSIGjvA8cRBT9cyf8EbLF5XocZLHa0NElvNOSTb7gjfMYezZnNj-RBSQGxQWzOeKs5UWmGELAwG3v2qgz-KRtuu4A640RVoCI4PkDSCfsq54aFTA8pFs_v0Cn9lOoZLP2Q..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", "description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...", "author": "FreeBuf", "pubDate": "2018-07-08 18:03:00" - }, - { - "title": "渗透测试之支付逻辑漏洞", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9UUGtPtyVVNZTv9xUlnGtgS1JYoH7mxQh0H0hQ1X6jRYjs-2iVyuUDzEFvN1xmyxKHyZcXM9YDsTRZLkBtDBZbyO4mTSVLqgnFJ_2Uy17j8jC0fMZuEqAZzdnhwE9jcwlgOKsWBR6u9eTlYP5ju4PjerW_iZb4iJEW_1sV_1wLNhCy6umSSPEsg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF", - "description": "支付逻辑漏洞分类:1、支付过程中可直接修改数据包中的支付金额这种漏洞应该是支付漏洞中最常见的,主要针对支付宝等需要第三...", - "author": "黑白之道", - "pubDate": "2020-05-03 10:23:30" } ] } \ No newline at end of file diff --git a/resources/db/4hou.db b/resources/db/4hou.db deleted file mode 100644 index 340fe2a..0000000 Binary files a/resources/db/4hou.db and /dev/null differ diff --git a/resources/db/anquanke.db b/resources/db/anquanke.db deleted file mode 100644 index ed57add..0000000 Binary files a/resources/db/anquanke.db and /dev/null differ diff --git a/resources/db/doonsec.db b/resources/db/doonsec.db deleted file mode 100644 index 40a7f5d..0000000 Binary files a/resources/db/doonsec.db and /dev/null differ diff --git a/resources/db/freebuf.db b/resources/db/freebuf.db deleted file mode 100644 index e0086ad..0000000 Binary files a/resources/db/freebuf.db and /dev/null differ diff --git a/resources/db/qianxin.db b/resources/db/qianxin.db deleted file mode 100644 index 35ffe5b..0000000 Binary files a/resources/db/qianxin.db and /dev/null differ diff --git a/resources/db/seebug.db b/resources/db/seebug.db deleted file mode 100644 index c81c2b2..0000000 Binary files a/resources/db/seebug.db and /dev/null differ diff --git a/resources/db/sougou-wx.db b/resources/db/sougou-wx.db deleted file mode 100644 index 4ce5f60..0000000 Binary files a/resources/db/sougou-wx.db and /dev/null differ diff --git a/resources/db/xianzhi.db b/resources/db/xianzhi.db deleted file mode 100644 index 21cdfbe..0000000 Binary files a/resources/db/xianzhi.db and /dev/null differ diff --git a/resources/history/github.md b/resources/history/github.md index 63dc2b9..e69de29 100644 --- a/resources/history/github.md +++ b/resources/history/github.md @@ -1,25 +0,0 @@ -#### 大佬 su18 上传了一个新工具:[woodpecker-plugin-template](https://github.com/su18/woodpecker-plugin-template) -**项目描述**:woodpecker-plugin-template -**上传时间**:2024-12-13 08:47:27 - ----------- -#### 大佬 su18 上传了一个新工具:[closure-compiler](https://github.com/su18/closure-compiler) -**项目描述**:A JavaScript checker and optimizer. -**上传时间**:2024-12-08 05:13:17 - ----------- -#### 大佬 projectdiscovery 上传了一个新工具:[nuclei-templates-ai](https://github.com/projectdiscovery/nuclei-templates-ai) -**项目描述**:Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage 👾 -**上传时间**:2024-12-04 01:46:51 - ----------- -#### 大佬 projectdiscovery 上传了一个新工具:[nuclei-templates-test](https://github.com/projectdiscovery/nuclei-templates-test) -**项目描述**:Nuclei Templates test -**上传时间**:2024-11-18 10:30:37 - ----------- -#### 大佬 su18 上传了一个新工具:[CVE-2022-25845-In-Spring](https://github.com/su18/CVE-2022-25845-In-Spring) -**项目描述**:CVE-2022-25845(fastjson1.2.80) exploit in Spring Env! -**上传时间**:2024-11-08 08:24:12 - ----------- diff --git a/resources/history/sec_news.md b/resources/history/sec_news.md index 02f6e79..e69de29 100644 --- a/resources/history/sec_news.md +++ b/resources/history/sec_news.md @@ -1,182 +0,0 @@ -#### 文章:[恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户](https://www.freebuf.com/news/419140.html) -**类型**:资讯 -**上传时间**:2025-01-06 13:42:35 - ----------------------------------------- -#### 文章:[LegionLoader滥用Chrome扩展传播多种恶意软件](https://www.freebuf.com/news/419136.html) -**类型**:资讯 -**上传时间**:2025-01-06 11:38:08 - ----------------------------------------- -#### 文章:[大量恶意npm包盯上了开发者](https://www.freebuf.com/news/419131.html) -**类型**:资讯 -**上传时间**:2025-01-06 10:58:21 - ----------------------------------------- -#### 文章:[【情报】大型泄密库搜索引擎-libraryofleaks](https://www.freebuf.com/news/419128.html) -**类型**:资讯 -**上传时间**:2025-01-06 10:43:48 - ----------------------------------------- -#### 文章:[知名化工巨头被勒索攻击,泄露761.8GB数据](https://www.freebuf.com/news/419127.html) -**类型**:资讯 -**上传时间**:2025-01-06 10:41:31 - ----------------------------------------- -#### 文章:[2024年度十大网络安全热点事件盘点:时代暗涌下的安全危机](https://www.anquanke.com/post/id/303291) -**作者**: 安全客 -**来源**:微信 -**上传时间**:2025-01-06 11:00:15 - ----------------------------------------- -#### 文章:[关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断](https://www.anquanke.com/post/id/303282) -**作者**: 安全客 -**来源**:TheHackersNews -**上传时间**:2025-01-06 10:52:56 - ----------------------------------------- -#### 文章:[项目隔离: PyPI 抵御恶意软件的新防线](https://www.anquanke.com/post/id/303279) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:48:40 - ----------------------------------------- -#### 文章:[CVE-2024-12912 & CVE-2024-13062: 华硕路由器面临风险](https://www.anquanke.com/post/id/303275) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:37:22 - ----------------------------------------- -#### 文章:[35+ 款 Chrome 浏览器扩展程序遭入侵:250 万用户面临风险](https://www.anquanke.com/post/id/303270) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:21:36 - ----------------------------------------- -#### 文章:[通过恶意 npm 软件包对以太坊开发人员进行供应链攻击](https://www.anquanke.com/post/id/303267) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:11:35 - ----------------------------------------- -#### 文章:[每分钟就有 4,080 份记录在数据泄露事件中受损](https://www.anquanke.com/post/id/303288) -**作者**: 安全客 -**来源**:helpnetsecurity -**上传时间**:2025-01-06 10:09:03 - ----------------------------------------- -#### 文章:[SysBumps:在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化](https://www.anquanke.com/post/id/303264) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:02:40 - ----------------------------------------- -#### 文章:[现代 CISO 是组织成功的基石](https://www.anquanke.com/post/id/303285) -**作者**: 安全客 -**来源**:helpnetsecurity -**上传时间**:2025-01-06 10:01:09 - ----------------------------------------- -#### 文章:[CVE-2025-22275 (CVSS 9.3):iTerm2 修补了暴露用户输入和输出的重大安全漏洞](https://www.anquanke.com/post/id/303259) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 09:55:57 - ----------------------------------------- -#### 文章:[黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据](https://www.anquanke.com/post/id/303256) -**作者**: 安全客 -**来源**:therecord -**上传时间**:2025-01-06 09:51:53 - ----------------------------------------- -#### 文章:[恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户](https://www.freebuf.com/news/419140.html) -**类型**:资讯 -**上传时间**:2025-01-06 13:42:35 - ----------------------------------------- -#### 文章:[LegionLoader滥用Chrome扩展传播多种恶意软件](https://www.freebuf.com/news/419136.html) -**类型**:资讯 -**上传时间**:2025-01-06 11:38:08 - ----------------------------------------- -#### 文章:[大量恶意npm包盯上了开发者](https://www.freebuf.com/news/419131.html) -**类型**:资讯 -**上传时间**:2025-01-06 10:58:21 - ----------------------------------------- -#### 文章:[【情报】大型泄密库搜索引擎-libraryofleaks](https://www.freebuf.com/news/419128.html) -**类型**:资讯 -**上传时间**:2025-01-06 10:43:48 - ----------------------------------------- -#### 文章:[知名化工巨头被勒索攻击,泄露761.8GB数据](https://www.freebuf.com/news/419127.html) -**类型**:资讯 -**上传时间**:2025-01-06 10:41:31 - ----------------------------------------- -#### 文章:[2024年度十大网络安全热点事件盘点:时代暗涌下的安全危机](https://www.anquanke.com/post/id/303291) -**作者**: 安全客 -**来源**:微信 -**上传时间**:2025-01-06 11:00:15 - ----------------------------------------- -#### 文章:[关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断](https://www.anquanke.com/post/id/303282) -**作者**: 安全客 -**来源**:TheHackersNews -**上传时间**:2025-01-06 10:52:56 - ----------------------------------------- -#### 文章:[项目隔离: PyPI 抵御恶意软件的新防线](https://www.anquanke.com/post/id/303279) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:48:40 - ----------------------------------------- -#### 文章:[CVE-2024-12912 & CVE-2024-13062: 华硕路由器面临风险](https://www.anquanke.com/post/id/303275) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:37:22 - ----------------------------------------- -#### 文章:[35+ 款 Chrome 浏览器扩展程序遭入侵:250 万用户面临风险](https://www.anquanke.com/post/id/303270) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:21:36 - ----------------------------------------- -#### 文章:[通过恶意 npm 软件包对以太坊开发人员进行供应链攻击](https://www.anquanke.com/post/id/303267) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:11:35 - ----------------------------------------- -#### 文章:[每分钟就有 4,080 份记录在数据泄露事件中受损](https://www.anquanke.com/post/id/303288) -**作者**: 安全客 -**来源**:helpnetsecurity -**上传时间**:2025-01-06 10:09:03 - ----------------------------------------- -#### 文章:[SysBumps:在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化](https://www.anquanke.com/post/id/303264) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 10:02:40 - ----------------------------------------- -#### 文章:[现代 CISO 是组织成功的基石](https://www.anquanke.com/post/id/303285) -**作者**: 安全客 -**来源**:helpnetsecurity -**上传时间**:2025-01-06 10:01:09 - ----------------------------------------- -#### 文章:[CVE-2025-22275 (CVSS 9.3):iTerm2 修补了暴露用户输入和输出的重大安全漏洞](https://www.anquanke.com/post/id/303259) -**作者**: 安全客 -**来源**:securityonline -**上传时间**:2025-01-06 09:55:57 - ----------------------------------------- -#### 文章:[黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据](https://www.anquanke.com/post/id/303256) -**作者**: 安全客 -**来源**:therecord -**上传时间**:2025-01-06 09:51:53 - ----------------------------------------- diff --git a/resources/history/tech_passage.md b/resources/history/tech_passage.md index e1e6a8b..e69de29 100644 --- a/resources/history/tech_passage.md +++ b/resources/history/tech_passage.md @@ -1,900 +0,0 @@ -#### 文章:[结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践](https://forum.butian.net/share/4011) -**来源**:subject -**上传时间**:2025-01-06 10:00:00 -**描述**:本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具,特别是“通义灵码”,帮助发现了多个高危漏洞,包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证,并分享了使用“通义灵码”的心得和体验。最后,作者总结了AI在代码审计中的优势和不足,并展望了未来的发展方向。 - ----------------------------------------- -#### 文章:[Windows进程](https://forum.butian.net/share/4002) -**来源**:subject -**上传时间**:2025-01-06 09:00:02 -**描述**:进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。 - ----------------------------------------- -#### 文章:[结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践](https://forum.butian.net/share/4011) -**来源**:subject -**上传时间**:2025-01-06 10:00:00 -**描述**:本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具,特别是“通义灵码”,帮助发现了多个高危漏洞,包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证,并分享了使用“通义灵码”的心得和体验。最后,作者总结了AI在代码审计中的优势和不足,并展望了未来的发展方向。 - ----------------------------------------- -#### 文章:[Windows进程](https://forum.butian.net/share/4002) -**来源**:subject -**上传时间**:2025-01-06 09:00:02 -**描述**:进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。 - ----------------------------------------- -#### 文章:[CVE-2024-50379|条件竞争Tomcat RCE POC(首发)](https://mp.weixin.qq.com/s?__biz=Mzg2NTk4MTE1MQ==&mid=2247486408&idx=1&sn=ac34350ed2c25084cb78cec5ff40275e) -**作者**:TtTeam -**上传时间**:2025-01-06 14:41:19 -**简介**:半通杀|Tomcat RCE!无敌! - ----------------------------------------- -#### 文章:[【渗透利器】比proxifier更好用的代理神器,可轻松配置代理--sunnynet](https://mp.weixin.qq.com/s?__biz=Mzk0OTY3OTc5Mw==&mid=2247484914&idx=1&sn=ffcae701630227b7da949c2c63b66b04) -**作者**:网安鲲为帝 -**上传时间**:2025-01-06 14:27:36 -**简介**:None - ----------------------------------------- -#### 文章:[实战攻防中的信息收集](https://mp.weixin.qq.com/s?__biz=MzkyMjU2Nzc1Mg==&mid=2247484483&idx=1&sn=8f7983ac3a289460203b71969a365dbe) -**作者**:LHACK安全 -**上传时间**:2025-01-06 14:00:57 -**简介**:None - ----------------------------------------- -#### 文章:[CVE-2024-43452:针对 Windows 特权提升漏洞的 PoC 漏洞发布](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526837&idx=1&sn=bdc1792b20bbc0e3485123421c3c240c) -**作者**:Ots安全 -**上传时间**:2025-01-06 13:53:08 -**简介**:None - ----------------------------------------- -#### 文章:[CVE-2024-47575:FortiManager FortiManager Cloud 缺少身份验证允许执行任意代码或命令](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526827&idx=1&sn=02106475443306b2005d8031e320d35f) -**作者**:Ots安全 -**上传时间**:2025-01-06 13:44:09 -**简介**:None - ----------------------------------------- -#### 文章:[ThievingFox——从密码管理器和 Windows 实用程序远程检索凭据](https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247526827&idx=2&sn=357dc695b40732b89fd8115f61111e9a) -**作者**:Ots安全 -**上传时间**:2025-01-06 13:44:09 -**简介**:ThievingFox 是一组后漏洞利用工具,用于在渗透测试和类似活动中从工作站和服务器收集凭据。它的工作原理是让目标应用程序加载恶意库,该库执行内存挂钩以收集凭据。 - ----------------------------------------- -#### 文章:[【成功复现】爱数AnyShare SMTP_GetConfig 信息泄露漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502853&idx=1&sn=6116493ef276d07ee2f6c5105fb25d62) -**作者**:弥天安全实验室 -**上传时间**:2025-01-06 12:18:51 -**简介**:【成功复现】爱数AnyShare SMTP_GetConfig 信息泄露漏洞 - ----------------------------------------- -#### 文章:[工具集:PotatoTool【1.3更新】集合解密、分析、扫描、溯源、免杀、提权等功能的网络安全综合工具](https://mp.weixin.qq.com/s?__biz=Mzk0MjY1ODE5Mg==&mid=2247485088&idx=1&sn=dde3f7615d6d2e96776b49bce1762bea) -**作者**:风铃Sec -**上传时间**:2025-01-06 12:17:41 -**简介**:None - ----------------------------------------- -#### 文章:[JAVA XXE 学习总结](https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247546440&idx=1&sn=1aafdd4bc381662ded1bedaacb7191f8) -**作者**:掌控安全EDU -**上传时间**:2025-01-06 12:02:15 -**简介**:None - ----------------------------------------- -#### 文章:[从js到高危垂直越权漏洞挖掘](https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614973&idx=1&sn=0cb7f44aa7d6b3d7f0b82a6e1490a6cc) -**作者**:白帽子左一 -**上传时间**:2025-01-06 12:01:05 -**简介**:None - ----------------------------------------- -#### 文章:[Java安全小记-FastJson反序列化](https://mp.weixin.qq.com/s?__biz=Mzk0ODY1NzEwMA==&mid=2247485169&idx=1&sn=804880c5f2fad83f50d7217bbe3dfe60) -**作者**:土拨鼠的安全屋 -**上传时间**:2025-01-06 12:00:23 -**简介**:None - ----------------------------------------- -#### 文章:[浅析CTF中PWN题堆类型的ORW技术](https://mp.weixin.qq.com/s?__biz=MjM5MjEyMTcyMQ==&mid=2651037243&idx=1&sn=6fcfd1790adc07489a7aa79613c56bfd) -**作者**:SAINTSEC -**上传时间**:2025-01-06 11:52:08 -**简介**:浅析ctf中pwn题堆类型的orw - ----------------------------------------- -#### 文章:[某华命令执行Rce原理分析](https://mp.weixin.qq.com/s?__biz=MzkyMjM5NDM3NQ==&mid=2247486194&idx=1&sn=1edc0eb964a23d4ef1d95e0668354d48) -**作者**:进击安全 -**上传时间**:2025-01-06 11:45:51 -**简介**:None - ----------------------------------------- -#### 文章:[[溯源]HuntBack(反击狩猎),用于攻防演练中,防守方对恶意ip进行web指纹扫描与识别](https://mp.weixin.qq.com/s?__biz=Mzg4NTgxNTc5Mg==&mid=2247486805&idx=1&sn=53ec3f82f35a73b14adc666c9ed0ca22) -**作者**:W啥都学 -**上传时间**:2025-01-06 11:41:44 -**简介**:None - ----------------------------------------- -#### 文章:[漏洞通告 | Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞](https://mp.weixin.qq.com/s?__biz=Mzg5MTc3ODY4Mw==&mid=2247507635&idx=1&sn=3ed64fc475689a3cd2c08cc3a146a471) -**作者**:微步在线研究响应中心 -**上传时间**:2025-01-06 10:50:43 -**简介**:立即查看漏洞详情 - ----------------------------------------- -#### 文章:[【介质取证】“隐藏”在日志文件里的行为痕迹](https://mp.weixin.qq.com/s?__biz=MzI0OTEyMTk5OQ==&mid=2247494068&idx=1&sn=7903df1ae2f96b57d88bdccc88dbdb38) -**作者**:平航科技 -**上传时间**:2025-01-06 10:01:02 -**简介**:None - ----------------------------------------- -#### 文章:[刷脸登录银行 App 现他人信息,银行回应称“网络抖动带来的极小概率事件”|Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650606244&idx=1&sn=8000e773da8fb2b362bc7283a912db76) -**作者**:黑白之道 -**上传时间**:2025-01-06 09:55:05 -**简介**:None - ----------------------------------------- -#### 文章:[针对 PostgreSQL 数据库的攻击研究](https://mp.weixin.qq.com/s?__biz=MzI5MDQ2NjExOQ==&mid=2247499743&idx=1&sn=f6f99cdd5962403d8c00657ceaa708a5) -**作者**:信安之路 -**上传时间**:2025-01-06 09:37:29 -**简介**:None - ----------------------------------------- -#### 文章:[【漏洞复现】快云服务器助手GetDetail接口文件任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzI1NTE2NzQ3NQ==&mid=2247485521&idx=2&sn=21fccb1beac3a0dcc9a565a36fcfa9a7) -**作者**:网络安全007 -**上传时间**:2025-01-06 09:01:03 -**简介**:None - ----------------------------------------- -#### 文章:[【Nday漏洞分析】ProjectSend 身份认证绕过漏洞(CVE-2024-11680)](https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247486903&idx=1&sn=0a066aff4189674338d0ffe68e405275) -**作者**:神农Sec -**上传时间**:2025-01-06 09:00:39 -**简介**:None - ----------------------------------------- -#### 文章:[vulnhub之unknowndevice2的实践](https://mp.weixin.qq.com/s?__biz=MzA3MjM5MDc2Nw==&mid=2650748903&idx=1&sn=f3265733267791c930270b071e833d0e) -**作者**:云计算和网络安全技术实践 -**上传时间**:2025-01-06 08:46:59 -**简介**:None - ----------------------------------------- -#### 文章:[内网渗透之ADCS权限维持](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494683&idx=1&sn=ff1e934c2bb0dee6e9959d04e96218c0) -**作者**:七芒星实验室 -**上传时间**:2025-01-06 08:46:33 -**简介**:文章前言本篇文章主要介绍如何通过证书服务来实现权限维持的目的基本原理在微软的文档里有一段话\\x26quot;当使用PKCA时 - ----------------------------------------- -#### 文章:[企业安全建设之蜜罐搭建与使用](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494683&idx=2&sn=2fb0376ca472b4a0a1eff27d319df088) -**作者**:七芒星实验室 -**上传时间**:2025-01-06 08:46:33 -**简介**:基本介绍HFish是一款基于Golang开发的跨平台多功能主动诱导型开源国产蜜罐框架系统,它从内网失陷检测、 - ----------------------------------------- -#### 文章:[W&Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=Mzg2NzkxOTQ0OA==&mid=2247484492&idx=1&sn=7da5690238bdb790765079470195bd8e) -**作者**:菜鸟学渗透 -**上传时间**:2025-01-06 08:30:31 -**简介**:W\\x26amp;Jsoft-D-Security数据仿泄露系统(DLP)存在任意文件读取漏洞 - ----------------------------------------- -#### 文章:[【实用工具】Windows应急响应上机排查工具](https://mp.weixin.qq.com/s?__biz=MzIxOTk0ODY0NQ==&mid=2247485387&idx=1&sn=59722752cf6054be5cf5ff0645012d04) -**作者**:如棠安全 -**上传时间**:2025-01-06 08:15:40 -**简介**:在上机排查过程中,通过“事件查看器”逐个查看系统日志太过繁琐。这样的话,我们可以通过此工具一键对系统日志进行分类核查,有效提高上机研判、处置能力。 - ----------------------------------------- -#### 文章:[免杀系列 - 无法让管理员找到你的木马进程](https://mp.weixin.qq.com/s?__biz=MzkzMDQ5MDM3NA==&mid=2247487937&idx=1&sn=f424ff0e311911b564ad87924e90b994) -**作者**:SecretTeam安全团队 -**上传时间**:2025-01-06 08:08:29 -**简介**:None - ----------------------------------------- -#### 文章:[【神兵利器】GRS内网穿透工具](https://mp.weixin.qq.com/s?__biz=MzU2NzY5MzI5Ng==&mid=2247504721&idx=1&sn=e25858d7e5772aa1d94b191a42a49d49) -**作者**:菜鸟学信安 -**上传时间**:2025-01-06 08:03:20 -**简介**:None - ----------------------------------------- -#### 文章:[记一次某道CMS审计过程](https://mp.weixin.qq.com/s?__biz=MzkwMzMwODg2Mw==&mid=2247510233&idx=1&sn=0159324632f603442a3a7b5d5bec845c) -**作者**:李白你好 -**上传时间**:2025-01-06 08:01:49 -**简介**:None - ----------------------------------------- -#### 文章:[Hacking Scanner 一键渗透扫描器](https://mp.weixin.qq.com/s?__biz=Mzk0ODM0NDIxNQ==&mid=2247493163&idx=1&sn=cd8f69d7ecc43e8bc09da662d0094ede) -**作者**:夜组安全 -**上传时间**:2025-01-06 08:01:01 -**简介**:None - ----------------------------------------- -#### 文章:[X-Ways Forensics 包含报告表/标签的使用](https://mp.weixin.qq.com/s?__biz=Mzg3NTU3NTY0Nw==&mid=2247489479&idx=1&sn=a196e28523a7438789bb56901d775f8d) -**作者**:网络安全与取证研究 -**上传时间**:2025-01-06 08:00:57 -**简介**:关于包含报告表/标签功能,笔者也是在一次偶然之中领悟到了其强大之处,因为之前一直都认为报告表功能并无大用。现在,标签列是我分析页面中 的常驻列,并且往往处在较为靠前的位置。笔者希望能通过本文介绍包含报告表/标签的强大之处和高效用法。 - ----------------------------------------- -#### 文章:[漏洞预警 | WordPress Plugin Tutor SQL注入漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=1&sn=fbd0590c31f7e295b5743345888e231c) -**作者**:浅安安全 -**上传时间**:2025-01-06 08:00:30 -**简介**:WordPress插件Tutor LMS的/wp-admin/admin-ajax.php接口存在SQL注入漏洞,未经身份验证的攻击者可以通过该漏洞获取数据库敏感信息。 - ----------------------------------------- -#### 文章:[漏洞预警 | 友数聚CPAS审计管理系统SQL注入和任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=2&sn=1e67ec9b7cddeda507a7d80598525961) -**作者**:浅安安全 -**上传时间**:2025-01-06 08:00:30 -**简介**:友数聚CPAS审计管理系统存在SQL注入和任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞获取敏感信息,建议相关用户及时更新。 - ----------------------------------------- -#### 文章:[工具 | Hfish](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491992&idx=4&sn=22a306b858e629b4d99395f890731306) -**作者**:浅安安全 -**上传时间**:2025-01-06 08:00:30 -**简介**:HFish是一款社区型免费蜜罐。 - ----------------------------------------- -#### 文章:[Ember Bear APT 攻击模拟](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504432&idx=1&sn=89ec75cbd0580342d7cde65855139ace) -**作者**:安全狗的自我修养 -**上传时间**:2025-01-06 07:09:53 -**简介**:这是对 (Ember Bear) APT 组织针对乌克兰能源组织的攻击的模拟,攻击活动于 2021 年 4 月活跃,攻击链开 - ----------------------------------------- -#### 文章:[浅谈密码相关原理及代码实现](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518163&idx=1&sn=e2b7200747c06902d53e3556d78d9c31) -**作者**:船山信安 -**上传时间**:2025-01-06 00:12:23 -**简介**:None - ----------------------------------------- -#### 文章:[安卓逆向2025 -- Frida学习之环境搭建](https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037473&idx=1&sn=fc63b8d78a7113b33bc9630af30dce5b) -**作者**:逆向有你 -**上传时间**:2025-01-06 00:00:29 -**简介**:None - ----------------------------------------- -#### 文章:[Windows 11 BitLocker被绕过,来提取卷加密密钥](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498072&idx=2&sn=d5947fa42d47876f2c6a88dfd33a2479) -**作者**:河南等级保护测评 -**上传时间**:2025-01-06 00:00:20 -**简介**:None - ----------------------------------------- -#### 文章:[黑客利用 DoS 漏洞禁用 Palo Alto Networks 防火墙](https://mp.weixin.qq.com/s?__biz=Mzg3ODY0NTczMA==&mid=2247491876&idx=1&sn=1ffb723d73f1a24290998ff19c4f929e) -**作者**:犀牛安全 -**上传时间**:2025-01-06 00:00:00 -**简介**:None - ----------------------------------------- -#### 文章:[记两次内网入侵溯源](https://mp.weixin.qq.com/s?__biz=Mzg2NDYwMDA1NA==&mid=2247543401&idx=1&sn=529638018a2a223edc0be924bf6d9d30) -**作者**:Hacking黑白红 -**上传时间**:2025-01-05 23:26:58 -**简介**:None - ----------------------------------------- -#### 文章:[研究人员发布针对 Windows LDAP 漏洞的 PoC 漏洞利用程序](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505530&idx=4&sn=d74d0d52adbd4477bc0279d88f92f1e3) -**作者**:网络研究观 -**上传时间**:2025-01-05 21:27:48 -**简介**:None - ----------------------------------------- -#### 文章:[【漏洞复现】内训宝 SCORM 模块存在任意文件上传漏洞](https://mp.weixin.qq.com/s?__biz=MzI1NTE2NzQ3NQ==&mid=2247485511&idx=1&sn=24c216754ea9f84396bd3159a2ec4b0f) -**作者**:网络安全007 -**上传时间**:2025-01-05 16:26:41 -**简介**:内训宝 SCORM 模块存在任意文件上传漏洞|附复现过程! - ----------------------------------------- -#### 文章:[【渗透 Tips】解决Edge的IE模式下无法抓包情况](https://mp.weixin.qq.com/s?__biz=MzIzNDU5Mzk2OQ==&mid=2247486346&idx=1&sn=abef247f01a77843ed143f35d85ae810) -**作者**:阿呆攻防 -**上传时间**:2025-01-05 16:07:40 -**简介**:None - ----------------------------------------- -#### 文章:[JS逆向系列17-Hook_cookie v0.2脚本原理解析](https://mp.weixin.qq.com/s?__biz=MzkzNTcwOTgxMQ==&mid=2247485234&idx=1&sn=3948bce9c853c43f96632533b5ef236a) -**作者**:Spade sec -**上传时间**:2025-01-05 15:47:51 -**简介**:None - ----------------------------------------- -#### 文章:[2024 数证杯流量分析WP](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518156&idx=1&sn=6b52ea6ce0a870f4a425c6cdbc325f5e) -**作者**:船山信安 -**上传时间**:2025-01-05 10:45:23 -**简介**:None - ----------------------------------------- -#### 文章:[针对潜在危险的 Windows LDAP 漏洞的利用代码已发布](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498048&idx=2&sn=76a1a1db4b128f834fc607a9518b2f8d) -**作者**:河南等级保护测评 -**上传时间**:2025-01-05 00:12:58 -**简介**:None - ----------------------------------------- -#### 文章:[安卓逆向 -- 某TV抓包和jce响应解析](https://mp.weixin.qq.com/s?__biz=MzA4MzgzNTU5MA==&mid=2652037449&idx=1&sn=37bae8ad1d88fb2fe194256e6326e768) -**作者**:逆向有你 -**上传时间**:2025-01-05 00:01:26 -**简介**:None - ----------------------------------------- -#### 文章:[网络抓包神器:Tcpdump实用技巧与案例解析](https://mp.weixin.qq.com/s?__biz=MzkxMzMyNzMyMA==&mid=2247569384&idx=1&sn=3dda4be3d2a2361e8de95a139536e7b4) -**作者**:马哥网络安全 -**上传时间**:2025-01-04 17:01:47 -**简介**:None - ----------------------------------------- -#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5) -**作者**:教父爱分享 -**上传时间**:2025-01-05 23:19:42 -**简介**:None - ----------------------------------------- -#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0) -**作者**:暴暴的皮卡丘 -**上传时间**:2025-01-05 22:44:13 -**简介**:None - ----------------------------------------- -#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839) -**作者**:安全初心 -**上传时间**:2025-01-05 22:32:13 -**简介**:None - ----------------------------------------- -#### 文章:[Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6) -**作者**:商密君 -**上传时间**:2025-01-05 19:15:38 -**简介**:None - ----------------------------------------- -#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608) -**作者**:玲珑安全 -**上传时间**:2025-01-05 18:55:21 -**简介**:None - ----------------------------------------- -#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768) -**作者**:芳华绝代安全团队 -**上传时间**:2025-01-05 18:53:58 -**简介**:None - ----------------------------------------- -#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770) -**作者**:securitainment -**上传时间**:2025-01-04 23:04:05 -**简介**:None - ----------------------------------------- -#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5) -**作者**:冲鸭安全 -**上传时间**:2025-01-04 10:00:36 -**简介**:None - ----------------------------------------- -#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。 - ----------------------------------------- -#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。 - ----------------------------------------- -#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Metasploit Framework是一款开源安全漏洞检测工具。 - ----------------------------------------- -#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9) -**作者**:技术修道场 -**上传时间**:2025-01-04 08:00:17 -**简介**:安全紧急关注!据 VulnCheck 最新披露,知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞(CVE-2024-12856),目前正遭受黑客大规模攻击!更危险的是,利用该漏洞竟只需默认密码! - ----------------------------------------- -#### 文章:[【oscp】Tr0ll 靶机全系列(1-3),FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74) -**作者**:泷羽Sec -**上传时间**:2025-01-04 07:44:56 -**简介**:None - ----------------------------------------- -#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8) -**作者**:安全狗的自我修养 -**上传时间**:2025-01-04 07:09:11 -**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构 - ----------------------------------------- -#### 文章:[无文件恶意软件 – 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822) -**作者**:河南等级保护测评 -**上传时间**:2025-01-04 07:05:19 -**简介**:None - ----------------------------------------- -#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621) -**作者**:七芒星实验室 -**上传时间**:2025-01-04 07:00:24 -**简介**:None - ----------------------------------------- -#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182) -**作者**:船山信安 -**上传时间**:2025-01-04 02:01:04 -**简介**:None - ----------------------------------------- -#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6) -**作者**:OneMoreThink -**上传时间**:2025-01-04 01:17:57 -**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略 - ----------------------------------------- -#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5) -**作者**:教父爱分享 -**上传时间**:2025-01-05 23:19:42 -**简介**:None - ----------------------------------------- -#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0) -**作者**:暴暴的皮卡丘 -**上传时间**:2025-01-05 22:44:13 -**简介**:None - ----------------------------------------- -#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839) -**作者**:安全初心 -**上传时间**:2025-01-05 22:32:13 -**简介**:None - ----------------------------------------- -#### 文章:[Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6) -**作者**:商密君 -**上传时间**:2025-01-05 19:15:38 -**简介**:None - ----------------------------------------- -#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608) -**作者**:玲珑安全 -**上传时间**:2025-01-05 18:55:21 -**简介**:None - ----------------------------------------- -#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768) -**作者**:芳华绝代安全团队 -**上传时间**:2025-01-05 18:53:58 -**简介**:None - ----------------------------------------- -#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770) -**作者**:securitainment -**上传时间**:2025-01-04 23:04:05 -**简介**:None - ----------------------------------------- -#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5) -**作者**:冲鸭安全 -**上传时间**:2025-01-04 10:00:36 -**简介**:None - ----------------------------------------- -#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。 - ----------------------------------------- -#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。 - ----------------------------------------- -#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Metasploit Framework是一款开源安全漏洞检测工具。 - ----------------------------------------- -#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9) -**作者**:技术修道场 -**上传时间**:2025-01-04 08:00:17 -**简介**:安全紧急关注!据 VulnCheck 最新披露,知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞(CVE-2024-12856),目前正遭受黑客大规模攻击!更危险的是,利用该漏洞竟只需默认密码! - ----------------------------------------- -#### 文章:[【oscp】Tr0ll 靶机全系列(1-3),FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74) -**作者**:泷羽Sec -**上传时间**:2025-01-04 07:44:56 -**简介**:None - ----------------------------------------- -#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8) -**作者**:安全狗的自我修养 -**上传时间**:2025-01-04 07:09:11 -**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构 - ----------------------------------------- -#### 文章:[无文件恶意软件 – 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822) -**作者**:河南等级保护测评 -**上传时间**:2025-01-04 07:05:19 -**简介**:None - ----------------------------------------- -#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621) -**作者**:七芒星实验室 -**上传时间**:2025-01-04 07:00:24 -**简介**:None - ----------------------------------------- -#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182) -**作者**:船山信安 -**上传时间**:2025-01-04 02:01:04 -**简介**:None - ----------------------------------------- -#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6) -**作者**:OneMoreThink -**上传时间**:2025-01-04 01:17:57 -**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略 - ----------------------------------------- -#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8) -**作者**:网络研究观 -**上传时间**:2025-01-04 00:30:41 -**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。 - ----------------------------------------- -#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50) -**作者**:网络研究观 -**上传时间**:2025-01-04 00:30:41 -**简介**:None - ----------------------------------------- -#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5) -**作者**:教父爱分享 -**上传时间**:2025-01-05 23:19:42 -**简介**:None - ----------------------------------------- -#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0) -**作者**:暴暴的皮卡丘 -**上传时间**:2025-01-05 22:44:13 -**简介**:None - ----------------------------------------- -#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839) -**作者**:安全初心 -**上传时间**:2025-01-05 22:32:13 -**简介**:None - ----------------------------------------- -#### 文章:[Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6) -**作者**:商密君 -**上传时间**:2025-01-05 19:15:38 -**简介**:None - ----------------------------------------- -#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608) -**作者**:玲珑安全 -**上传时间**:2025-01-05 18:55:21 -**简介**:None - ----------------------------------------- -#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768) -**作者**:芳华绝代安全团队 -**上传时间**:2025-01-05 18:53:58 -**简介**:None - ----------------------------------------- -#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770) -**作者**:securitainment -**上传时间**:2025-01-04 23:04:05 -**简介**:None - ----------------------------------------- -#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5) -**作者**:冲鸭安全 -**上传时间**:2025-01-04 10:00:36 -**简介**:None - ----------------------------------------- -#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。 - ----------------------------------------- -#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。 - ----------------------------------------- -#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Metasploit Framework是一款开源安全漏洞检测工具。 - ----------------------------------------- -#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9) -**作者**:技术修道场 -**上传时间**:2025-01-04 08:00:17 -**简介**:安全紧急关注!据 VulnCheck 最新披露,知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞(CVE-2024-12856),目前正遭受黑客大规模攻击!更危险的是,利用该漏洞竟只需默认密码! - ----------------------------------------- -#### 文章:[【oscp】Tr0ll 靶机全系列(1-3),FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74) -**作者**:泷羽Sec -**上传时间**:2025-01-04 07:44:56 -**简介**:None - ----------------------------------------- -#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8) -**作者**:安全狗的自我修养 -**上传时间**:2025-01-04 07:09:11 -**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构 - ----------------------------------------- -#### 文章:[无文件恶意软件 – 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822) -**作者**:河南等级保护测评 -**上传时间**:2025-01-04 07:05:19 -**简介**:None - ----------------------------------------- -#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621) -**作者**:七芒星实验室 -**上传时间**:2025-01-04 07:00:24 -**简介**:None - ----------------------------------------- -#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182) -**作者**:船山信安 -**上传时间**:2025-01-04 02:01:04 -**简介**:None - ----------------------------------------- -#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6) -**作者**:OneMoreThink -**上传时间**:2025-01-04 01:17:57 -**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略 - ----------------------------------------- -#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8) -**作者**:网络研究观 -**上传时间**:2025-01-04 00:30:41 -**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。 - ----------------------------------------- -#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50) -**作者**:网络研究观 -**上传时间**:2025-01-04 00:30:41 -**简介**:None - ----------------------------------------- -#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5) -**作者**:教父爱分享 -**上传时间**:2025-01-05 23:19:42 -**简介**:None - ----------------------------------------- -#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0) -**作者**:暴暴的皮卡丘 -**上传时间**:2025-01-05 22:44:13 -**简介**:None - ----------------------------------------- -#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839) -**作者**:安全初心 -**上传时间**:2025-01-05 22:32:13 -**简介**:None - ----------------------------------------- -#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608) -**作者**:玲珑安全 -**上传时间**:2025-01-05 18:55:21 -**简介**:None - ----------------------------------------- -#### 文章:[通过模拟功能实现提权(Bugcrowd)](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768) -**作者**:芳华绝代安全团队 -**上传时间**:2025-01-05 18:53:58 -**简介**:None - ----------------------------------------- -#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770) -**作者**:securitainment -**上传时间**:2025-01-04 23:04:05 -**简介**:None - ----------------------------------------- -#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5) -**作者**:冲鸭安全 -**上传时间**:2025-01-04 10:00:36 -**简介**:None - ----------------------------------------- -#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Metasploit Framework是一款开源安全漏洞检测工具。 - ----------------------------------------- -#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9) -**作者**:技术修道场 -**上传时间**:2025-01-04 08:00:17 -**简介**:安全紧急关注!据 VulnCheck 最新披露,知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞(CVE-2024-12856),目前正遭受黑客大规模攻击!更危险的是,利用该漏洞竟只需默认密码! - ----------------------------------------- -#### 文章:[【oscp】Tr0ll 靶机全系列(1-3),FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74) -**作者**:泷羽Sec -**上传时间**:2025-01-04 07:44:56 -**简介**:None - ----------------------------------------- -#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8) -**作者**:安全狗的自我修养 -**上传时间**:2025-01-04 07:09:11 -**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构 - ----------------------------------------- -#### 文章:[无文件恶意软件 – 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822) -**作者**:河南等级保护测评 -**上传时间**:2025-01-04 07:05:19 -**简介**:None - ----------------------------------------- -#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621) -**作者**:七芒星实验室 -**上传时间**:2025-01-04 07:00:24 -**简介**:None - ----------------------------------------- -#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182) -**作者**:船山信安 -**上传时间**:2025-01-04 02:01:04 -**简介**:None - ----------------------------------------- -#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8) -**作者**:网络研究观 -**上传时间**:2025-01-04 00:30:41 -**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。 - ----------------------------------------- -#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50) -**作者**:网络研究观 -**上传时间**:2025-01-04 00:30:41 -**简介**:None - ----------------------------------------- -#### 文章:[Windows 曝9.8分漏洞,已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6) -**作者**:商密君 -**上传时间**:2025-01-05 19:15:38 -**简介**:None - ----------------------------------------- -#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。 - ----------------------------------------- -#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。 - ----------------------------------------- -#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6) -**作者**:OneMoreThink -**上传时间**:2025-01-04 01:17:57 -**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略 - ----------------------------------------- -#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。 - ----------------------------------------- -#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。 - ----------------------------------------- -#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6) -**作者**:OneMoreThink -**上传时间**:2025-01-04 01:17:57 -**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略 - ----------------------------------------- -#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞(CVE-2024-49112)](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c) -**作者**:飓风网络安全 -**上传时间**:2025-01-03 22:37:58 -**简介**:None - ----------------------------------------- -#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7) -**作者**:奇安信 CERT -**上传时间**:2025-01-03 22:18:20 -**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。 - ----------------------------------------- -#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed) -**作者**:弥天安全实验室 -**上传时间**:2025-01-03 18:50:36 -**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞 - ----------------------------------------- -#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b) -**作者**:河北镌远网络科技有限公司 -**上传时间**:2025-01-03 18:29:17 -**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险 - ----------------------------------------- -#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。 - ----------------------------------------- -#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。 - ----------------------------------------- -#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6) -**作者**:OneMoreThink -**上传时间**:2025-01-04 01:17:57 -**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略 - ----------------------------------------- -#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞(CVE-2024-49112)](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c) -**作者**:飓风网络安全 -**上传时间**:2025-01-03 22:37:58 -**简介**:None - ----------------------------------------- -#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7) -**作者**:奇安信 CERT -**上传时间**:2025-01-03 22:18:20 -**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。 - ----------------------------------------- -#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed) -**作者**:弥天安全实验室 -**上传时间**:2025-01-03 18:50:36 -**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞 - ----------------------------------------- -#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b) -**作者**:河北镌远网络科技有限公司 -**上传时间**:2025-01-03 18:29:17 -**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险 - ----------------------------------------- -#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:Apache MINA存在反序列化漏洞,攻击者可通过向受影响的应用程序发送特制的恶意序列化数据,利用不安全的反序列化过程触发该漏洞,从而可能导致远程代码执行。 - ----------------------------------------- -#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64) -**作者**:浅安安全 -**上传时间**:2025-01-04 08:03:54 -**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞,未经身份验证的攻击者可以通过该漏洞读取服务器任意文件,从而获取服务器大量敏感信息。 - ----------------------------------------- -#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6) -**作者**:OneMoreThink -**上传时间**:2025-01-04 01:17:57 -**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略 - ----------------------------------------- -#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞(CVE-2024-49112)](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c) -**作者**:飓风网络安全 -**上传时间**:2025-01-03 22:37:58 -**简介**:None - ----------------------------------------- -#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7) -**作者**:奇安信 CERT -**上传时间**:2025-01-03 22:18:20 -**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。 - ----------------------------------------- -#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed) -**作者**:弥天安全实验室 -**上传时间**:2025-01-03 18:50:36 -**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞 - ----------------------------------------- -#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b) -**作者**:河北镌远网络科技有限公司 -**上传时间**:2025-01-03 18:29:17 -**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险 - ----------------------------------------- diff --git a/resources/history/wx_news.md b/resources/history/wx_news.md index a50be81..e69de29 100644 --- a/resources/history/wx_news.md +++ b/resources/history/wx_news.md @@ -1,28 +0,0 @@ -#### 文章:[路飞爬虫开发App逆向第八期share](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9l40l5MWzjtbsbsR6eNCWCFc2fBtcWxYi1RScM2JNWvWAbXS2wSQe0vsRQxnJ7FxpS7-Hly9zOKbAYIy9riVzrmGRJgS4PuGQmbXjaxbg2fDzhk0fzVTRilh1Dg5i4BYm9iLOcV7xnhleHYIRY1mnBfK97YnmvOAU-mai6i3jnIE6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA) -描述:关注以上公众号,后台回复 课程 即可领取哦~有路飞爬虫开发App逆向第八期share路飞爬虫开发App逆向第八期share### 路飞爬虫开... -**上传时间**:2025-01-01 05:11:41 -**作者**:小马找课呀 -**关键词**:APP逆向 - ----------------------------------------- -#### 文章:[抖音APP逆向:附带抓包与6神算法探索](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKNciYPpIcdmE5dl9P8Paw_x58MkIGEcJw3juWkEMf3Hfa2tGfX7oJGkopviLeKN6p0Qsf5Pjq5lQJ440gcqIG3P92dCjJKmIEw71YhhkAfJptZjnqDZ-9WctPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA) -描述:走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必... -**上传时间**:2025-01-03 13:10:22 -**作者**:彪哥in讲py -**关键词**:APP逆向 - ----------------------------------------- -#### 文章:[APP逆向工具清单](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKEQotIC1WeYHE8IYVGBIMwjYX9eBY-oL5HUkRlYI-PnA1yRFHhpHP7Sm7W-AWObVBA3hV_7JOu-4Bl_kDMDYSBKlyTq-ojDhmiIxLICWVTQxzYYD-Z4gXxIGX_iHL9MadA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA) -描述:嘿,各位热爱编程的小伙伴们,今天咱们来聊聊APP逆向的那些事儿.给大家整理一份实用的APP逆向工具清单.一、环境准备篇重点... -**上传时间**:2025-01-03 13:10:22 -**作者**:彪哥in讲py -**关键词**:APP逆向 - ----------------------------------------- -#### 文章:[APP逆向sign签名算法:Python实战指南](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Z2uQi14zjGFECgple0Il5-1K8SLax84YfVaqkNMacaLrG1rkvGbndY6sEGVytRQ2Xa9okGtxlAiFdqvEtLdW8rbW9xGCpXc-0hrzlDs5UvWb91zgNMTb1rkzPqK4FbfdwKi3bykgC3WcITmV9kKf9MJmAnpcRK7rN62zqqL31VVS6t2rFt2rnA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA) -描述:在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准... -**上传时间**:2025-01-03 09:40:29 -**作者**:雷雷讲py -**关键词**:APP逆向 - ----------------------------------------- diff --git a/resources/log/core.log b/resources/log/core.log index 382db0b..e69de29 100644 --- a/resources/log/core.log +++ b/resources/log/core.log @@ -1,22 +0,0 @@ -2025-01-06 16:48:36 - INFO - __main__::252 - 程序正在运行当中。 -2025-01-06 16:48:46 - INFO - __main__:send_first_message:232 - 飞书发送 程序信息 成功 -2025-01-06 16:48:46 - INFO - __main__:send_first_message:235 - 飞书发送 RSS源状态 成功 -2025-01-06 16:48:47 - INFO - __main__:send_first_message:237 - 飞书发送 首次运行提醒 成功 -2025-01-06 16:48:47 - INFO - __main__:main_job:185 - 发送程序启动,当前时间为:2025-01-06 16:48:47 -2025-01-06 16:48:47 - INFO - __main__:main_job:186 - 正在启动各爬虫并获取资源中... -2025-01-06 16:48:48 - INFO - spider.common:seebug_main:76 - 数据已保存到 ./resources/JSON/seebug.json! -2025-01-06 16:48:48 - INFO - spider.common:anquanke_main:112 - 数据已保存到 ./resources/JSON/anquanke.json! -2025-01-06 16:48:49 - INFO - spider.common:huawei_main:148 - 数据已保存到 ./resources/JSON/huawei.json! -2025-01-06 16:48:49 - INFO - spider.common:doonsec_main:166 - 数据已保存到 ./resources/JSON/doonsec.json! -2025-01-06 16:48:49 - INFO - spider.common:qianxin_main:184 - 数据已保存到 ./resources/JSON/qianxin.json! -2025-01-06 16:48:49 - INFO - spider.freebuf:freebuf_main:69 - 数据已保存到 ./resources/JSON/freebuf.json! -2025-01-06 16:48:51 - INFO - spider.xianzhi:xianzhi_main:67 - 数据已保存到 ./resources/JSON/xianzhi.json! -2025-01-06 16:48:51 - INFO - spider.common:M_4hou_main:94 - 数据已保存到 ./resources/JSON/4hou.json! -2025-01-06 16:48:51 - INFO - __main__:check_avaliable:86 - 嘶吼资讯数据为空,跳过执行。 -2025-01-06 16:48:52 - INFO - __main__:check_avaliable:63 - 飞书发送 安全客资讯 成功 -2025-01-06 16:49:08 - INFO - __main__:check_avaliable:63 - 飞书发送 洞见微信安全资讯 成功 -2025-01-06 16:49:23 - INFO - __main__:check_avaliable:86 - 先知社区资讯数据为空,跳过执行。 -2025-01-06 16:49:23 - INFO - __main__:check_avaliable:63 - 飞书发送 FreeBuf资讯 成功 -2025-01-06 16:49:39 - INFO - __main__:check_avaliable:63 - 飞书发送 奇安信攻防社区资讯 成功 -2025-01-06 16:49:54 - INFO - __main__:check_avaliable:86 - Seebug社区资讯数据为空,跳过执行。 -2025-01-06 16:51:59 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出... diff --git a/spider/github.py b/spider/github.py index b80b7ac..f34218a 100644 --- a/spider/github.py +++ b/spider/github.py @@ -59,7 +59,8 @@ def github_main_keyword(key, black_words): if result == None: time.sleep(5) continue - for i in range(0, 20): + n = len(result['items']) + for i in range(0, n): description = result['items'][i]['description'] if description is None: diff --git a/spider/sougou_wx.py b/spider/sougou_wx.py index 8ed5712..e125381 100644 --- a/spider/sougou_wx.py +++ b/spider/sougou_wx.py @@ -99,7 +99,7 @@ def sougou_wx_main(keywords): results = parse_html(html_content) # 移除非法代理对 cleaned_results = [{k: remove_surrogates(v) for k, v in item.items()} for item in results] - logger.warning(f"关键词【{keyword}】的微信公众号-Sogou搜索内容保存成功。") + logger.info(f"关键词【{keyword}】的微信公众号-Sogou搜索内容保存成功。") all_results[keyword] = cleaned_results # 将结果存储在字典中,以关键词为键 time.sleep(5)