diff --git a/GotoSend/__pycache__/baidu.cpython-312.pyc b/GotoSend/__pycache__/baidu.cpython-312.pyc new file mode 100644 index 0000000..0f9959d Binary files /dev/null and b/GotoSend/__pycache__/baidu.cpython-312.pyc differ diff --git a/UpdateLOG.md b/UpdateLOG.md index 6f4bb32..f5a94c6 100644 --- a/UpdateLOG.md +++ b/UpdateLOG.md @@ -12,7 +12,7 @@ - 添加更多RSS订阅源(持续进行中) - 添加更多推送方式,如邮件、微信等 - 添加谷歌搜索等更多相关检测源,后续将支持谷歌语法 -- 将搜狗-微信和GitHub同步上网站推送 + ### 下一步计划(已完成) - 将所有打印信息转为logging info并存档(已完成) @@ -25,6 +25,7 @@ - 添加GitHub等监测源(重构参考项目逻辑并上线) - 添加百度监测源 - 添加性能限制模块(限制每次读取数量) +- 将搜狗-微信和GitHub同步上网站推送 ### 下一步计划(已作废) - 添加Mysql作为数据库存储(现有sqlite已满足使用) @@ -45,4 +46,5 @@ - 2025年01月06日:更新了配置信息自动获取的逻辑,添加关键词等现可在运行时添加,重要配置信息(config.yaml)仍需暂停重新运行 - 2025年01月10日上午:修复了github推送的问题(时区,消息配置错误等) - 2025年01月10日下午:上线了百度搜索内容监测 -- 2025年01月14日晚:添加了网站读取文件逻辑仅读取限制数量的文件,避免文件过大导致程序崩溃或是阅读困难 \ No newline at end of file +- 2025年01月14日晚:添加了网站读取文件逻辑仅读取限制数量的文件,避免文件过大导致程序崩溃或是阅读困难 +- 2025年01月15日早:优化并精简了web程序的代码 \ No newline at end of file diff --git a/config/__pycache__/check_config.cpython-312.pyc b/config/__pycache__/check_config.cpython-312.pyc index 98279d0..ae20d59 100644 Binary files a/config/__pycache__/check_config.cpython-312.pyc and b/config/__pycache__/check_config.cpython-312.pyc differ diff --git a/resources/JSON/github_keyword.json b/resources/JSON/github_keyword.json index 5b1433f..f1f31ed 100644 --- a/resources/JSON/github_keyword.json +++ b/resources/JSON/github_keyword.json @@ -1,4 +1,22 @@ [ + { + "link": "https://github.com/xiangyuecn/AreaCity-JsSpider-StatsGov", + "name": "AreaCity-JsSpider-StatsGov", + "created_at": "2018-11-28T05:11:35Z", + "description": "省市区县乡镇三级或四级城市数据,带拼音标注、坐标、行政区域边界范围;2025年01月14日最新采集,提供csv格式文件,支持在线转成多级联动js代码、通用json格式,提供软件转成shp、geojson、sql、导入数据库;带浏览器里面运...", + "author": "xiangyuecn", + "language": "JavaScript", + "keyword": "sql注入" + }, + { + "link": "https://github.com/1024-lab/smart-admin", + "name": "smart-admin", + "created_at": "2019-11-16T02:30:31Z", + "description": "SmartAdmin国内首个以「高质量代码」为核心,「简洁、高效、安全」快速开发平台;基于SpringBoot2/3 + Sa-Token + Mybatis-Plus 和 Vue3 + Vite5 + Ant Design Vue 4.x (同时支持JavaScript和TypeScript双版本);满足国家三级等保要求、支持登录限制、接...", + "author": "1024-lab", + "language": "Java", + "keyword": "sql注入" + }, { "link": "https://github.com/zlt2000/microservices-platform", "name": "microservices-platform", @@ -53,15 +71,6 @@ "language": null, "keyword": "sql注入" }, - { - "link": "https://github.com/chaos198800/SQL-zhu-ru-gong-ji-yu-fang-yu-gao-qing-wan-zheng-PDF-ban-xia-zai", - "name": "SQL-zhu-ru-gong-ji-yu-fang-yu-gao-qing-wan-zheng-PDF-ban-xia-zai", - "created_at": "2024-12-22T05:56:18Z", - "description": "SQL注入攻击与防御高清完整PDF版下载", - "author": "chaos198800", - "language": null, - "keyword": "sql注入" - }, { "link": "https://github.com/Sanandd/---doAction-SQL-", "name": "---doAction-SQL-", @@ -170,15 +179,6 @@ "language": "Python", "keyword": "sql注入" }, - { - "link": "https://github.com/woshirenji/ERP_SQL-", - "name": "ERP_SQL-", - "created_at": "2024-12-21T03:28:59Z", - "description": "云时空商业ERP params 存在SQL注入漏洞。", - "author": "woshirenji", - "language": null, - "keyword": "sql注入" - }, { "link": "https://github.com/20142995/wxvl", "name": "wxvl", @@ -449,15 +449,6 @@ "language": null, "keyword": "未授权" }, - { - "link": "https://github.com/chaos198800/Si9000-shou-quan-xu-ke-tong-xiang-wei-lai-de-ying-jian-she-ji-jie-jue-fang-an", - "name": "Si9000-shou-quan-xu-ke-tong-xiang-wei-lai-de-ying-jian-she-ji-jie-jue-fang-an", - "created_at": "2024-12-20T02:18:07Z", - "description": "Si9000授权许可通向未来的硬件设计解决方案", - "author": "chaos198800", - "language": null, - "keyword": "未授权" - }, { "link": "https://github.com/ainrm/Jrohy-trojan-unauth-poc", "name": "Jrohy-trojan-unauth-poc", @@ -512,6 +503,15 @@ "language": null, "keyword": "未授权" }, + { + "link": "https://github.com/lichunown/head-encrypt", + "name": "head-encrypt", + "created_at": "2024-11-22T08:31:19Z", + "description": "head-encrypt 文件(头)加密工具。 在只想防止未经授权的访问者识别文件类型或内容时。由于完全加密大型文件耗时 head-encrypt提供了一种解决方案,通过仅加密文件的头部部分,减少了加密过程所需的时间。", + "author": "lichunown", + "language": "Python", + "keyword": "未授权" + }, { "link": "https://github.com/20142995/wxvl", "name": "wxvl", @@ -521,15 +521,6 @@ "language": "Python", "keyword": "漏洞POC" }, - { - "link": "https://github.com/wy876/POC", - "name": "POC", - "created_at": "2023-08-19T12:08:53Z", - "description": "收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1400多个poc/exp,长期更新。", - "author": "wy876", - "language": null, - "keyword": "漏洞POC" - }, { "link": "https://github.com/126789t/poc_everyday", "name": "poc_everyday", @@ -548,6 +539,51 @@ "language": "Python", "keyword": "漏洞POC" }, + { + "link": "https://github.com/Threekiii/Vulnerability-Wiki", + "name": "Vulnerability-Wiki", + "created_at": "2022-04-29T05:36:33Z", + "description": "基于 docsify 快速部署 Awesome-POC 中的漏洞文档", + "author": "Threekiii", + "language": "HTML", + "keyword": "漏洞POC" + }, + { + "link": "https://github.com/Threekiii/Awesome-POC", + "name": "Awesome-POC", + "created_at": "2022-02-20T06:43:22Z", + "description": "一个漏洞POC知识库 目前数量 1000+", + "author": "Threekiii", + "language": null, + "keyword": "漏洞POC" + }, + { + "link": "https://github.com/Threekiii/CVE", + "name": "CVE", + "created_at": "2023-01-05T02:19:29Z", + "description": "一个CVE漏洞预警知识库 no exp/poc", + "author": "Threekiii", + "language": null, + "keyword": "漏洞POC" + }, + { + "link": "https://github.com/lal0ne/vulnerability", + "name": "vulnerability", + "created_at": "2022-01-20T02:48:42Z", + "description": "收集、整理、修改互联网上公开的漏洞POC", + "author": "lal0ne", + "language": "Go", + "keyword": "漏洞POC" + }, + { + "link": "https://github.com/wy876/POC", + "name": "POC", + "created_at": "2023-08-19T12:08:53Z", + "description": "收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1400多个poc/exp,长期更新。", + "author": "wy876", + "language": null, + "keyword": "漏洞POC" + }, { "link": "https://github.com/perlh/hscan", "name": "hscan", @@ -566,15 +602,6 @@ "language": "Python", "keyword": "漏洞POC" }, - { - "link": "https://github.com/lal0ne/vulnerability", - "name": "vulnerability", - "created_at": "2022-01-20T02:48:42Z", - "description": "收集、整理、修改互联网上公开的漏洞POC", - "author": "lal0ne", - "language": "Go", - "keyword": "漏洞POC" - }, { "link": "https://github.com/zan8in/afrog-pocs", "name": "afrog-pocs", @@ -639,77 +666,14 @@ "keyword": "漏洞POC" }, { - "link": "https://github.com/Threekiii/CVE", - "name": "CVE", - "created_at": "2023-01-05T02:19:29Z", - "description": "一个CVE漏洞预警知识库 no exp/poc", - "author": "Threekiii", - "language": null, - "keyword": "漏洞POC" - }, - { - "link": "https://github.com/Threekiii/Vulnerability-Wiki", - "name": "Vulnerability-Wiki", - "created_at": "2022-04-29T05:36:33Z", - "description": "基于 docsify 快速部署 Awesome-POC 中的漏洞文档", - "author": "Threekiii", - "language": "HTML", - "keyword": "漏洞POC" - }, - { - "link": "https://github.com/Threekiii/Awesome-POC", - "name": "Awesome-POC", - "created_at": "2022-02-20T06:43:22Z", - "description": "一个漏洞POC知识库 目前数量 1000+", - "author": "Threekiii", - "language": null, - "keyword": "漏洞POC" - }, - { - "link": "https://github.com/LIR794/TG_BOT_RCE", - "name": "TG_BOT_RCE", - "created_at": "2024-11-24T19:24:37Z", - "description": null, - "author": "LIR794", - "language": "Python", - "keyword": "RCE" - }, - { - "link": "https://github.com/cultureelerfgoed/rce-thesauri-backup", - "name": "rce-thesauri-backup", - "created_at": "2023-10-17T12:00:47Z", - "description": "Automatic thesauri backups from RCE PoolParty", + "link": "https://github.com/cultureelerfgoed/sparql", + "name": "sparql", + "created_at": "2018-03-27T11:51:01Z", + "description": "In deze repositories worden openbare SPARQL queries verzameld die gebruikt worden op linked datasets van de RCE", "author": "cultureelerfgoed", "language": "Python", "keyword": "RCE" }, - { - "link": "https://github.com/BOl1o/CVE-2024-49112-PoC", - "name": "CVE-2024-49112-PoC", - "created_at": "2024-12-25T02:06:53Z", - "description": "CVE-2024-49112 Windows LDAP RCE PoC and Metasploit Module", - "author": "BOl1o", - "language": null, - "keyword": "RCE" - }, - { - "link": "https://github.com/happymimimix/Git-Auto-Updater", - "name": "Git-Auto-Updater", - "created_at": "2025-01-07T03:44:08Z", - "description": "A magical repository that can upgrade your Git from 2.45.0 to 2.45.1 automatically with the Git RCE glitch. ", - "author": "happymimimix", - "language": null, - "keyword": "RCE" - }, - { - "link": "https://github.com/AleksaZatezalo/managedEngineRCE", - "name": "managedEngineRCE", - "created_at": "2024-12-02T03:04:47Z", - "description": null, - "author": "AleksaZatezalo", - "language": "Python", - "keyword": "RCE" - }, { "link": "https://github.com/GhostTroops/TOP", "name": "TOP", @@ -738,12 +702,30 @@ "keyword": "RCE" }, { - "link": "https://github.com/gh202503/poc-cve-2020-35489", - "name": "poc-cve-2020-35489", - "created_at": "2025-01-06T20:45:48Z", - "description": "poc-CVE-2020-35489", - "author": "gh202503", - "language": "Shell", + "link": "https://github.com/cultureelerfgoed/rce-thesauri-backup", + "name": "rce-thesauri-backup", + "created_at": "2023-10-17T12:00:47Z", + "description": "Automatic thesauri backups from RCE PoolParty", + "author": "cultureelerfgoed", + "language": "Python", + "keyword": "RCE" + }, + { + "link": "https://github.com/rcevulndev/rcevulndev.github.io", + "name": "rcevulndev.github.io", + "created_at": "2021-06-03T19:56:44Z", + "description": null, + "author": "rcevulndev", + "language": "HTML", + "keyword": "RCE" + }, + { + "link": "https://github.com/bo0l3an/CVE-2024-49112-PoC", + "name": "CVE-2024-49112-PoC", + "created_at": "2025-01-08T01:56:41Z", + "description": "CVE-2024-49112 LDAP RCE PoC and Metasploit Module", + "author": "bo0l3an", + "language": "Python", "keyword": "RCE" }, { @@ -756,94 +738,121 @@ "keyword": "RCE" }, { - "link": "https://github.com/cbween/rcerda", - "name": "rcerda", - "created_at": "2024-12-24T18:00:09Z", - "description": null, - "author": "cbween", - "language": "Ruby", - "keyword": "RCE" - }, - { - "link": "https://github.com/grantdadams/Rceattle_MSE", - "name": "Rceattle_MSE", - "created_at": "2021-10-29T19:44:07Z", - "description": null, - "author": "grantdadams", + "link": "https://github.com/darksideoftheshmoo/rcell2.examples", + "name": "rcell2.examples", + "created_at": "2022-04-15T19:52:23Z", + "description": "Example notebooks and sample data for rcell2", + "author": "darksideoftheshmoo", "language": "R", "keyword": "RCE" }, { - "link": "https://github.com/brightio/penelope", - "name": "penelope", - "created_at": "2021-06-05T20:32:27Z", - "description": "Penelope Shell Handler", - "author": "brightio", + "link": "https://github.com/fl4m3-s/Cleo_Unauth_RCE", + "name": "Cleo_Unauth_RCE", + "created_at": "2025-01-14T03:32:36Z", + "description": "Proof of concept to use an arbitrary file write to achieve Remote Code Execution in Cleo Harmony, VLTrader, and LexiCom before 5.8.0.24.", + "author": "fl4m3-s", "language": "Python", "keyword": "RCE" }, { - "link": "https://github.com/faysalhassantorjo/RCE", - "name": "RCE", - "created_at": "2024-10-15T04:37:34Z", + "link": "https://github.com/shelldivers/Just1RCe", + "name": "Just1RCe", + "created_at": "2024-11-12T11:05:01Z", + "description": "irc", + "author": "shelldivers", + "language": "C++", + "keyword": "RCE" + }, + { + "link": "https://github.com/darksideoftheshmoo/rcell2-cellid", + "name": "rcell2-cellid", + "created_at": "2022-10-11T15:29:22Z", + "description": "R package bundling Cell-ID and tools to optimize its performance.", + "author": "darksideoftheshmoo", + "language": "C", + "keyword": "RCE" + }, + { + "link": "https://github.com/leistimo/RCET_ThirdSemester", + "name": "RCET_ThirdSemester", + "created_at": "2022-03-29T21:15:03Z", "description": null, - "author": "faysalhassantorjo", + "author": "leistimo", + "language": null, + "keyword": "RCE" + }, + { + "link": "https://github.com/canonai/New-RCE-script-", + "name": "New-RCE-script-", + "created_at": "2025-01-13T15:37:02Z", + "description": "Python programming language script, easy to run, and still have to do it in a home lab or something. Enjoy our work!", + "author": "canonai", + "language": "Python", + "keyword": "RCE" + }, + { + "link": "https://github.com/N4s1rl1/Limesurvey-6.6.4-RCE", + "name": "Limesurvey-6.6.4-RCE", + "created_at": "2025-01-13T14:34:14Z", + "description": "Getting RCE (Remote Code Execution) for LimeSurvey version 6.6.4.", + "author": "N4s1rl1", + "language": "Python", + "keyword": "RCE" + }, + { + "link": "https://github.com/rhtap-rhdh-qe/o2b6rce2e-dotnet-basic-gitops", + "name": "o2b6rce2e-dotnet-basic-gitops", + "created_at": "2025-01-13T06:31:46Z", + "description": "This is GitOps repository for o2b6rce2e-dotnet-basic", + "author": "rhtap-rhdh-qe", + "language": null, + "keyword": "RCE" + }, + { + "link": "https://github.com/rhtap-rhdh-qe/o2b6rce2e-dotnet-basic", + "name": "o2b6rce2e-dotnet-basic", + "created_at": "2025-01-13T06:31:40Z", + "description": "This is o2b6rce2e-dotnet-basic", + "author": "rhtap-rhdh-qe", "language": "HTML", "keyword": "RCE" }, { - "link": "https://github.com/josephgodwinkimani/cyberpanel-2.3.4-file-upload-RCE", - "name": "cyberpanel-2.3.4-file-upload-RCE", - "created_at": "2024-12-30T13:36:07Z", - "description": null, - "author": "josephgodwinkimani", + "link": "https://github.com/Nikhil-Pachpande/web-crawler", + "name": "web-crawler", + "created_at": "2023-02-03T03:13:13Z", + "description": "This project is a simple web crawler and web security scanner that identifies vulnerabilities such as SQLi, XSS, CSRF, SSRF, LFI, and RCE on a given set of URLs.", + "author": "Nikhil-Pachpande", "language": "Python", "keyword": "RCE" }, { - "link": "https://github.com/Zuk4r1/VulnKit", - "name": "VulnKit", - "created_at": "2024-11-28T22:06:20Z", - "description": "VulnKit es una herramienta de auditoría de seguridad que busca vulnerabilidades críticas como inyección SQL, RCE, SSRF, deserialización insegura y XSS. Escanea encabezados de seguridad y ejecuta exploits personalizados para evaluar sistemas de forma ética, siempre con los permisos adecuados", - "author": "Zuk4r1", - "language": "Python", + "link": "https://github.com/yangrchen/collab-runner-rce", + "name": "collab-runner-rce", + "created_at": "2024-12-28T05:31:53Z", + "description": "Realtime collaborative code runner using Firecracker microVMs.", + "author": "yangrchen", + "language": "Go", "keyword": "RCE" }, { - "link": "https://github.com/tongshuang2022/dahua_GetClassValue_rce", - "name": "dahua_GetClassValue_rce", - "created_at": "2025-01-07T05:47:03Z", - "description": null, - "author": "tongshuang2022", + "link": "https://github.com/alienfxfiend/Prelude-in-C", + "name": "Prelude-in-C", + "created_at": "2022-09-21T20:30:37Z", + "description": "xL AUX *~My Journey Into Programming~* *~My Learning Path~* *~Diary Of A Reverse Engineer~* *~Legacy of RCE Chronicles & Code Mastery~* *~Gdev Kdev Primer Sysdev 101 Capture The Flag CTF Macro Excerpt [Codemasters]~* *~Steep Learning Curve~* :comet: —Cybernetic Crew Brb乇√iレ◥Çレ₳Ñ◤", + "author": "alienfxfiend", "language": null, "keyword": "RCE" }, { - "link": "https://github.com/omair2084/biotime-rce-8.5.5", - "name": "biotime-rce-8.5.5", - "created_at": "2024-03-28T20:44:56Z", - "description": "The exploit covers several vulnerabilities in BioTime which lead to Remote Code Execution or atleast directory traversal.", - "author": "omair2084", - "language": "Python", - "keyword": "RCE" - }, - { - "link": "https://github.com/m4rcel-lol/m4rcel-lol", - "name": "m4rcel-lol", - "created_at": "2024-11-10T13:22:36Z", - "description": "Config files for my GitHub profile.", - "author": "m4rcel-lol", + "link": "https://github.com/cpkkcb/fuzzDicts", + "name": "fuzzDicts", + "created_at": "2020-11-26T04:51:29Z", + "description": "渗透测试路径字典,爆破字典。内容来自互联网和实战积累。", + "author": "cpkkcb", "language": null, - "keyword": "RCE" - }, - { - "link": "https://github.com/Lokinado/ShuRCE", - "name": "ShuRCE", - "created_at": "2024-10-03T14:07:22Z", - "description": null, - "author": "Lokinado", - "language": "TypeScript", - "keyword": "RCE" + "keyword": "渗透测试" }, { "link": "https://github.com/arch3rPro/PST-Bucket", @@ -873,11 +882,38 @@ "keyword": "渗透测试" }, { - "link": "https://github.com/VirgoLee/Virgol", - "name": "Virgol", - "created_at": "2024-11-13T05:39:11Z", - "description": "Virgol渗透测试工具集", - "author": "VirgoLee", + "link": "https://github.com/INotGreen/XiebroC2", + "name": "XiebroC2", + "created_at": "2024-02-15T15:46:07Z", + "description": "渗透测试C2、支持Lua插件扩展、域前置/CDN上线、自定义profile、前置sRDI、文件管理、进程管理、内存加载、截图、反向代理、分组管理", + "author": "INotGreen", + "language": "Go", + "keyword": "渗透测试" + }, + { + "link": "https://github.com/doimet/AuxTools", + "name": "AuxTools", + "created_at": "2022-05-03T16:53:11Z", + "description": "图形化渗透测试辅助工具", + "author": "doimet", + "language": null, + "keyword": "渗透测试" + }, + { + "link": "https://github.com/kkbo8005/mitan", + "name": "mitan", + "created_at": "2024-04-03T09:59:12Z", + "description": "密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、端口扫描、批量信息权重查询、密码字典等功能", + "author": "kkbo8005", + "language": null, + "keyword": "渗透测试" + }, + { + "link": "https://github.com/birdhan/SecurityTools", + "name": "SecurityTools", + "created_at": "2022-03-07T07:52:37Z", + "description": "渗透测试工具包 | 开源安全测试工具 | 网络安全工具", + "author": "birdhan", "language": null, "keyword": "渗透测试" }, @@ -890,6 +926,15 @@ "language": "HTML", "keyword": "渗透测试" }, + { + "link": "https://github.com/SurrealSky/web_security", + "name": "web_security", + "created_at": "2020-03-13T09:29:24Z", + "description": "web以及二进制安全,渗透测试,漏洞挖掘,工控安全学习笔记", + "author": "SurrealSky", + "language": "Python", + "keyword": "渗透测试" + }, { "link": "https://github.com/vsdwef/James_synthesis_tooL", "name": "James_synthesis_tooL", @@ -899,33 +944,6 @@ "language": null, "keyword": "渗透测试" }, - { - "link": "https://github.com/Mr-xn/Penetration_Testing_POC", - "name": "Penetration_Testing_POC", - "created_at": "2019-07-24T03:37:55Z", - "description": "渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms", - "author": "Mr-xn", - "language": "HTML", - "keyword": "渗透测试" - }, - { - "link": "https://github.com/kkbo8005/mitan", - "name": "mitan", - "created_at": "2024-04-03T09:59:12Z", - "description": "密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、端口扫描、批量信息权重查询、密码字典等功能", - "author": "kkbo8005", - "language": null, - "keyword": "渗透测试" - }, - { - "link": "https://github.com/chaos198800/xin-xi-xi-tong-shen-tou-ce-shi-fang-an-xia-zai-fen-xiang", - "name": "xin-xi-xi-tong-shen-tou-ce-shi-fang-an-xia-zai-fen-xiang", - "created_at": "2025-01-03T01:47:50Z", - "description": "信息系统渗透测试方案下载分享", - "author": "chaos198800", - "language": null, - "keyword": "渗透测试" - }, { "link": "https://github.com/yuning029/PenSafe", "name": "PenSafe", @@ -944,6 +962,24 @@ "language": "Python", "keyword": "渗透测试" }, + { + "link": "https://github.com/VirgoLee/Virgol", + "name": "Virgol", + "created_at": "2024-11-13T05:39:11Z", + "description": "Virgol渗透测试工具集", + "author": "VirgoLee", + "language": null, + "keyword": "渗透测试" + }, + { + "link": "https://github.com/Mr-xn/Penetration_Testing_POC", + "name": "Penetration_Testing_POC", + "created_at": "2019-07-24T03:37:55Z", + "description": "渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms", + "author": "Mr-xn", + "language": "HTML", + "keyword": "渗透测试" + }, { "link": "https://github.com/mohdkey/easy_bash", "name": "easy_bash", @@ -953,15 +989,6 @@ "language": "Shell", "keyword": "渗透测试" }, - { - "link": "https://github.com/doimet/AuxTools", - "name": "AuxTools", - "created_at": "2022-05-03T16:53:11Z", - "description": "图形化渗透测试辅助工具", - "author": "doimet", - "language": null, - "keyword": "渗透测试" - }, { "link": "https://github.com/hanc00l/nemo_go", "name": "nemo_go", @@ -999,22 +1026,49 @@ "keyword": "渗透测试" }, { - "link": "https://github.com/zerotwo0x00/alphaMap", - "name": "alphaMap", - "created_at": "2024-12-22T07:35:52Z", - "description": "alphaMap 集成渗透测试一体化平台", - "author": "zerotwo0x00", - "language": null, - "keyword": "渗透测试" + "link": "https://github.com/y1shiny1shin/Seri", + "name": "Seri", + "created_at": "2024-12-26T07:24:55Z", + "description": "个人反序列化学习代码", + "author": "y1shiny1shin", + "language": "Java", + "keyword": "反序列化" }, { - "link": "https://github.com/shangtianci12345/shangtianci12345.github.io", - "name": "shangtianci12345.github.io", - "created_at": "2024-12-13T05:37:02Z", - "description": "在github上面搭建的博客,里面会定期更新。里面详细写了我是怎么找到vps,服务器,vpn,梯子的,渗透测试怎么找工作\\---------------------------------------↑↑↑↑↑↑请帮我点个star(⁄ ⁄•⁄ω⁄•⁄ ⁄)♡↑↑↑↑↑↑↑", - "author": "shangtianci12345", - "language": "HTML", - "keyword": "渗透测试" + "link": "https://github.com/LiSForever/unserialization", + "name": "unserialization", + "created_at": "2024-09-24T09:41:25Z", + "description": "反序列化", + "author": "LiSForever", + "language": "Java", + "keyword": "反序列化" + }, + { + "link": "https://github.com/godownio/java_unserial_attackcode", + "name": "java_unserial_attackcode", + "created_at": "2024-09-21T10:10:44Z", + "description": "Java反序列化字节码生成器", + "author": "godownio", + "language": "Java", + "keyword": "反序列化" + }, + { + "link": "https://github.com/miahemu/juechen-rpc", + "name": "juechen-rpc", + "created_at": "2025-01-13T16:05:26Z", + "description": "基于 Java + Etcd + Vert.x 的高性能 RPC 框架,用新颖的技术栈从 0 到 1 开发轮子。基于 Vert.x 的网络服务器、序列化器、基于 Etcd 和 ZooKeeper 的注册中心、反射、动态代理、自定义网络协议、多种设计模式(单例 / 工厂 / 装饰者等)...", + "author": "miahemu", + "language": null, + "keyword": "反序列化" + }, + { + "link": "https://github.com/my6521/WWB.BufferSerializer", + "name": "WWB.BufferSerializer", + "created_at": "2025-01-13T07:49:55Z", + "description": "一个非常简单的二进制序列化和反序列化工具", + "author": "my6521", + "language": "C#", + "keyword": "反序列化" }, { "link": "https://github.com/B0T1eR/ysoSimple", @@ -1025,6 +1079,24 @@ "language": "Java", "keyword": "反序列化" }, + { + "link": "https://github.com/Ape1ron/SpringAopInDeserializationDemo1", + "name": "SpringAopInDeserializationDemo1", + "created_at": "2025-01-11T09:22:18Z", + "description": "在spring-aop中新发现的反序列化gadget-chain", + "author": "Ape1ron", + "language": "Java", + "keyword": "反序列化" + }, + { + "link": "https://github.com/Ape1ron/FastjsonInDeserializationDemo1", + "name": "FastjsonInDeserializationDemo1", + "created_at": "2025-01-11T09:17:33Z", + "description": "高版本Fastjson在Java原生反序列化中的利用演示", + "author": "Ape1ron", + "language": "Java", + "keyword": "反序列化" + }, { "link": "https://github.com/jar-analyzer/jar-analyzer", "name": "jar-analyzer", @@ -1079,24 +1151,6 @@ "language": "TypeScript", "keyword": "反序列化" }, - { - "link": "https://github.com/LiSForever/unserialization", - "name": "unserialization", - "created_at": "2024-09-24T09:41:25Z", - "description": "反序列化", - "author": "LiSForever", - "language": "Java", - "keyword": "反序列化" - }, - { - "link": "https://github.com/chaos198800/WebLogic-fan-xu-lie-hua-quan-ban-ben-lou-dong-li-yong-gong-ju", - "name": "WebLogic-fan-xu-lie-hua-quan-ban-ben-lou-dong-li-yong-gong-ju", - "created_at": "2024-12-31T03:30:52Z", - "description": "WebLogic反序列化全版本漏洞利用工具", - "author": "chaos198800", - "language": null, - "keyword": "反序列化" - }, { "link": "https://github.com/yukuyoulei/ConfigExcel", "name": "ConfigExcel", @@ -1124,15 +1178,6 @@ "language": "Java", "keyword": "反序列化" }, - { - "link": "https://github.com/y1shiny1shin/Seri", - "name": "Seri", - "created_at": "2024-12-26T07:24:55Z", - "description": "个人反序列化学习代码", - "author": "y1shiny1shin", - "language": "Java", - "keyword": "反序列化" - }, { "link": "https://github.com/triplexlove/javasocket", "name": "javasocket", @@ -1160,60 +1205,6 @@ "language": "C++", "keyword": "反序列化" }, - { - "link": "https://github.com/chaos198800/Shiro-fan-xu-lie-hua-gong-ju---jia-qiang-ban", - "name": "Shiro-fan-xu-lie-hua-gong-ju---jia-qiang-ban", - "created_at": "2024-12-24T13:59:52Z", - "description": "Shiro反序列化工具-加强版", - "author": "chaos198800", - "language": null, - "keyword": "反序列化" - }, - { - "link": "https://github.com/cngege/Version", - "name": "Version", - "created_at": "2023-08-04T07:27:01Z", - "description": "C++ 的版本反序列化器", - "author": "cngege", - "language": "C++", - "keyword": "反序列化" - }, - { - "link": "https://github.com/godownio/java_unserial_attackcode", - "name": "java_unserial_attackcode", - "created_at": "2024-09-21T10:10:44Z", - "description": "Java反序列化字节码生成器", - "author": "godownio", - "language": "Java", - "keyword": "反序列化" - }, - { - "link": "https://github.com/shangdev/utools-php-unserialize", - "name": "utools-php-unserialize", - "created_at": "2024-10-18T02:32:34Z", - "description": "utools PHP反序列化工具", - "author": "shangdev", - "language": "TypeScript", - "keyword": "反序列化" - }, - { - "link": "https://github.com/ngc660sec/NGCBot", - "name": "NGCBot", - "created_at": "2022-12-12T03:40:22Z", - "description": "一个基于✨HOOK机制的微信机器人,支持🌱安全新闻定时推送【FreeBuf,先知,安全客,奇安信攻防社区】,👯Kfc文案,⚡漏洞查询,⚡手机号归属地查询,⚡知识库查询,🎉星座查询,⚡天气查询,🌱摸鱼日历,⚡微步威胁...", - "author": "ngc660sec", - "language": "Python", - "keyword": "攻防" - }, - { - "link": "https://github.com/coronatusvi/VoiceAntiSpoofingAI", - "name": "VoiceAntiSpoofingAI", - "created_at": "2024-12-31T10:28:20Z", - "description": "VoiceAntiSpoofingAI A cutting-edge AI-based system for detecting and preventing voice spoofing attacks. Enhance the security of voice authentication systems with advanced anti-spoofing technology. VoiceAntiSpoofingAI 一个基于人工智能的尖端系统,用于检测和防止语音欺骗攻击...", - "author": "coronatusvi", - "language": "Jupyter Notebook", - "keyword": "攻防" - }, { "link": "https://github.com/zhou274/Forestdefense", "name": "Forestdefense", @@ -1224,14 +1215,23 @@ "keyword": "攻防" }, { - "link": "https://github.com/chaos198800/lu-fei-xue-cheng-Jaden-wu-lao-ban-wang-luo-an-quan-shen-tou-gong-fang-da-shi-ke", - "name": "lu-fei-xue-cheng-Jaden-wu-lao-ban-wang-luo-an-quan-shen-tou-gong-fang-da-shi-ke", - "created_at": "2025-01-06T05:41:20Z", - "description": "路飞学城Jaden吴老板网络安全渗透攻防大师课", - "author": "chaos198800", + "link": "https://github.com/guchangan1/All-Defense-Tool", + "name": "All-Defense-Tool", + "created_at": "2022-04-25T11:45:06Z", + "description": "本项目集成了全网优秀的攻防武器工具项目,包含自动化利用,子域名、目录扫描、端口扫描等信息收集工具,各大中间件、cms、OA漏洞利用工具,爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全...", + "author": "guchangan1", "language": null, "keyword": "攻防" }, + { + "link": "https://github.com/Threekiii/Awesome-Redteam", + "name": "Awesome-Redteam", + "created_at": "2022-02-08T00:45:03Z", + "description": "一个攻防知识仓库 Red Teaming and Offensive Security", + "author": "Threekiii", + "language": "Python", + "keyword": "攻防" + }, { "link": "https://github.com/vsdwef/James_synthesis_tooL", "name": "James_synthesis_tooL", @@ -1242,14 +1242,41 @@ "keyword": "攻防" }, { - "link": "https://github.com/Threekiii/Awesome-Redteam", - "name": "Awesome-Redteam", - "created_at": "2022-02-08T00:45:03Z", - "description": "一个攻防知识仓库 Red Teaming and Offensive Security", - "author": "Threekiii", + "link": "https://github.com/ngc660sec/NGCBot", + "name": "NGCBot", + "created_at": "2022-12-12T03:40:22Z", + "description": "一个基于✨HOOK机制的微信机器人,支持🌱安全新闻定时推送【FreeBuf,先知,安全客,奇安信攻防社区】,👯Kfc文案,⚡漏洞查询,⚡手机号归属地查询,⚡知识库查询,🎉星座查询,⚡天气查询,🌱摸鱼日历,⚡微步威胁...", + "author": "ngc660sec", "language": "Python", "keyword": "攻防" }, + { + "link": "https://github.com/CJ-Labs/zk-red-packet", + "name": "zk-red-packet", + "created_at": "2025-01-09T02:24:43Z", + "description": "使用 Poseidon 哈希和零知识证明来实现安全的红包领取机制,防止重入攻击和保护用户隐私", + "author": "CJ-Labs", + "language": "Solidity", + "keyword": "攻防" + }, + { + "link": "https://github.com/Jackyy330/CDN-", + "name": "CDN-", + "created_at": "2025-01-09T06:41:51Z", + "description": "高防CDN过国内移动屏蔽、地区屏蔽、无限抗T级DDOS以及CC攻击、证书SSL在内免费申请、可添加地区白名单。自主独立后台,可设置WAF以及异常地区IP访问等等", + "author": "Jackyy330", + "language": null, + "keyword": "攻防" + }, + { + "link": "https://github.com/coronatusvi/VoiceAntiSpoofingAI", + "name": "VoiceAntiSpoofingAI", + "created_at": "2024-12-31T10:28:20Z", + "description": "VoiceAntiSpoofingAI A cutting-edge AI-based system for detecting and preventing voice spoofing attacks. Enhance the security of voice authentication systems with advanced anti-spoofing technology. VoiceAntiSpoofingAI 一个基于人工智能的尖端系统,用于检测和防止语音欺骗攻击...", + "author": "coronatusvi", + "language": "Jupyter Notebook", + "keyword": "攻防" + }, { "link": "https://github.com/official-free12/an_gY", "name": "an_gY", @@ -1295,24 +1322,6 @@ "language": "Java", "keyword": "攻防" }, - { - "link": "https://github.com/chaos198800/an-heng-wang-luo-an-quan-shi-zhan-gong-fang-yan-lian-ying-dui-zhi-nan", - "name": "an-heng-wang-luo-an-quan-shi-zhan-gong-fang-yan-lian-ying-dui-zhi-nan", - "created_at": "2024-12-23T12:39:24Z", - "description": "安恒网络安全实战攻防演练应对指南", - "author": "chaos198800", - "language": null, - "keyword": "攻防" - }, - { - "link": "https://github.com/chaos198800/SQL-zhu-ru-gong-ji-yu-fang-yu-gao-qing-wan-zheng-PDF-ban-xia-zai", - "name": "SQL-zhu-ru-gong-ji-yu-fang-yu-gao-qing-wan-zheng-PDF-ban-xia-zai", - "created_at": "2024-12-22T05:56:18Z", - "description": "SQL注入攻击与防御高清完整PDF版下载", - "author": "chaos198800", - "language": null, - "keyword": "攻防" - }, { "link": "https://github.com/Zpyzpyy/-", "name": "-", @@ -1359,119 +1368,11 @@ "keyword": "webshell" }, { - "link": "https://github.com/Cvar1984/sussyfinder", - "name": "sussyfinder", - "created_at": "2023-06-02T10:23:44Z", - "description": "Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integration. Subscribe to get API Key", - "author": "Cvar1984", - "language": "PHP", - "keyword": "webshell" - }, - { - "link": "https://github.com/exploit-haxor/webshell", - "name": "webshell", - "created_at": "2024-12-13T23:46:35Z", - "description": "webshell", - "author": "exploit-haxor", - "language": "PHP", - "keyword": "webshell" - }, - { - "link": "https://github.com/cpkarma/Reborn-PHP-Bypass-Webshell", - "name": "Reborn-PHP-Bypass-Webshell", - "created_at": "2024-12-29T07:26:44Z", - "description": "A php shell which will bypass firewalls.", - "author": "cpkarma", - "language": "PHP", - "keyword": "webshell" - }, - { - "link": "https://github.com/manojxshrestha/WebShellX", - "name": "WebShellX", - "created_at": "2025-01-05T11:47:29Z", - "description": null, - "author": "manojxshrestha", - "language": "PHP", - "keyword": "webshell" - }, - { - "link": "https://github.com/MCSManager/MCSManager", - "name": "MCSManager", - "created_at": "2017-11-12T01:41:58Z", - "description": "Free, Secure, Distributed, Modern Control Panel for Minecraft and most Steam Game Servers.", - "author": "MCSManager", - "language": "TypeScript", - "keyword": "webshell" - }, - { - "link": "https://github.com/dromara/orion-visor", - "name": "orion-visor", - "created_at": "2023-06-20T08:01:55Z", - "description": "一款高颜值、现代化的自动化运维及轻量堡垒机,提供服务器智能运维解决方案。支持资产管理分组、SSH SFTP 终端、文件上传下载、文件在线编辑、命令批量执行、多主机文件分发、cron 表达式配置计划任务,安全保障等。该项...", - "author": "dromara", - "language": "Java", - "keyword": "webshell" - }, - { - "link": "https://github.com/nyingimaina/jattac.libs.webshell", - "name": "jattac.libs.webshell", - "created_at": "2024-10-18T13:13:51Z", - "description": null, - "author": "nyingimaina", - "language": "TypeScript", - "keyword": "webshell" - }, - { - "link": "https://github.com/mertmecitbilek/YAVUZLAR-Webshell", - "name": "YAVUZLAR-Webshell", - "created_at": "2025-01-06T21:59:59Z", - "description": "HTML, CSS ve PHP kullanılarak yapılmış bir webshell uygulamasıdır. UYARI: Bu proje yalnızca eğitim ve güvenlik testleri için hazırlanmıştır. İzinsiz sistemlere erişim sağlamak yasa dışıdır.", - "author": "mertmecitbilek", - "language": "PHP", - "keyword": "webshell" - }, - { - "link": "https://github.com/oceanmancuonh/web_attack_adv_webshell", - "name": "web_attack_adv_webshell", - "created_at": "2024-12-25T17:17:11Z", - "description": null, - "author": "oceanmancuonh", - "language": "Shell", - "keyword": "webshell" - }, - { - "link": "https://github.com/LT-lanthau/Webshell", - "name": "Webshell", - "created_at": "2024-10-04T06:34:18Z", - "description": "A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.", - "author": "LT-lanthau", - "language": "PHP", - "keyword": "webshell" - }, - { - "link": "https://github.com/Mr-xn/Penetration_Testing_POC", - "name": "Penetration_Testing_POC", - "created_at": "2019-07-24T03:37:55Z", - "description": "渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms", - "author": "Mr-xn", - "language": "HTML", - "keyword": "webshell" - }, - { - "link": "https://github.com/ReaJason/MemShellParty", - "name": "MemShellParty", - "created_at": "2024-09-01T05:17:19Z", - "description": "JavaWeb 内存马开聚会 🎉", - "author": "ReaJason", - "language": "Java", - "keyword": "webshell" - }, - { - "link": "https://github.com/HackfutSec/Shell-Finder", - "name": "Shell-Finder", - "created_at": "2025-01-05T05:31:22Z", - "description": "Shell Finder is a security tool that scans websites for common malicious shell files, providing results via console output and optionally sending them to Telegram.", - "author": "HackfutSec", + "link": "https://github.com/macOnGit/sam-webshell", + "name": "sam-webshell", + "created_at": "2024-11-01T16:50:20Z", + "description": "app for generating shells", + "author": "macOnGit", "language": "Python", "keyword": "webshell" }, @@ -1485,30 +1386,30 @@ "keyword": "webshell" }, { - "link": "https://github.com/hackingyseguridad/fuzzer", - "name": "fuzzer", - "created_at": "2018-08-11T16:37:52Z", - "description": "fuzzer http ( hackingyseguridad.com ) busca ficheros interesantes en un sitio web", - "author": "hackingyseguridad", - "language": "Shell", - "keyword": "webshell" - }, - { - "link": "https://github.com/alexithema/webshell", + "link": "https://github.com/exploit-haxor/webshell", "name": "webshell", - "created_at": "2024-12-19T05:58:48Z", - "description": null, - "author": "alexithema", + "created_at": "2024-12-13T23:46:35Z", + "description": "webshell", + "author": "exploit-haxor", "language": "PHP", "keyword": "webshell" }, { - "link": "https://github.com/nvth/webshell", - "name": "webshell", - "created_at": "2024-11-20T04:18:40Z", - "description": "just simple webshell with upload", - "author": "nvth", - "language": "ASP.NET", + "link": "https://github.com/zhaojh329/rttys", + "name": "rttys", + "created_at": "2018-01-17T13:31:34Z", + "description": "Access your device's terminal from anywhere via the web.", + "author": "zhaojh329", + "language": "Go", + "keyword": "webshell" + }, + { + "link": "https://github.com/Cvar1984/sussyfinder", + "name": "sussyfinder", + "created_at": "2023-06-02T10:23:44Z", + "description": "Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface and VirusTotal integration. Subscribe to get API Key", + "author": "Cvar1984", + "language": "PHP", "keyword": "webshell" }, { @@ -1521,20 +1422,155 @@ "keyword": "webshell" }, { - "link": "https://github.com/Zyroxsh/WebShellAutomation", - "name": "WebShellAutomation", - "created_at": "2025-01-01T19:36:54Z", - "description": "Automate webshells", - "author": "Zyroxsh", - "language": "Python", + "link": "https://github.com/dromara/orion-visor", + "name": "orion-visor", + "created_at": "2023-06-20T08:01:55Z", + "description": "一款高颜值、现代化的自动化运维及轻量堡垒机,提供服务器智能运维解决方案。支持资产管理分组、SSH SFTP 终端、文件上传下载、文件在线编辑、命令批量执行、多主机文件分发、cron 表达式配置计划任务,安全保障等。该项...", + "author": "dromara", + "language": "Java", "keyword": "webshell" }, { - "link": "https://github.com/safe6Sec/command", - "name": "command", - "created_at": "2021-08-22T16:16:09Z", - "description": "红队常用命令速查", - "author": "safe6Sec", + "link": "https://github.com/PranavArya37/webshell", + "name": "webshell", + "created_at": "2025-01-08T08:27:16Z", + "description": null, + "author": "PranavArya37", + "language": "TypeScript", + "keyword": "webshell" + }, + { + "link": "https://github.com/LT-lanthau/Webshell", + "name": "Webshell", + "created_at": "2024-10-04T06:34:18Z", + "description": "A collection of webshells for learning only. All forms of misuse and violations are not our responsibility.", + "author": "LT-lanthau", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/MCSManager/MCSManager", + "name": "MCSManager", + "created_at": "2017-11-12T01:41:58Z", + "description": "Free, Secure, Distributed, Modern Control Panel for Minecraft and most Steam Game Servers.", + "author": "MCSManager", + "language": "TypeScript", + "keyword": "webshell" + }, + { + "link": "https://github.com/pen4uin/java-memshell-generator", + "name": "java-memshell-generator", + "created_at": "2023-06-03T19:49:29Z", + "description": "一款支持自定义的 Java 内存马生成工具|A customizable Java in-memory webshell generation tool.", + "author": "pen4uin", + "language": "Java", + "keyword": "webshell" + }, + { + "link": "https://github.com/Yavuzlar/Yavuzlar-WebShell", + "name": "Yavuzlar-WebShell", + "created_at": "2024-12-31T00:19:55Z", + "description": "Yavuzlar WebShell: Web tabanlı bir shell uygulaması. Kullanıcılar, web üzerinden dosya yöneticisi, terminal ve reverse shell gibi güvenlik araçlarına erişebilir. PHP ve CSS kullanarak minimalist bir tasarımda, yönetimsel işlemler ve siber güvenlik simülasyonları için geliştirilmi...", + "author": "Yavuzlar", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/cr1f/P.A.S.-Fork", + "name": "P.A.S.-Fork", + "created_at": "2020-12-01T18:45:52Z", + "description": "A modified version of the well-known webshell - P.A.S. by Profexer. Tries to solve the problem of detecting some requests and responses by various WAF/IDS.", + "author": "cr1f", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/ReaJason/MemShellParty", + "name": "MemShellParty", + "created_at": "2024-09-01T05:17:19Z", + "description": "JavaWeb 内存马开聚会 🎉", + "author": "ReaJason", + "language": "Java", + "keyword": "webshell" + }, + { + "link": "https://github.com/AabyssZG/WebShell-Bypass-Guide", + "name": "WebShell-Bypass-Guide", + "created_at": "2023-03-18T02:04:11Z", + "description": "从零学习Webshell免杀手册", + "author": "AabyssZG", + "language": null, + "keyword": "webshell" + }, + { + "link": "https://github.com/sagsooz/Bypass-Webshell", + "name": "Bypass-Webshell", + "created_at": "2023-07-30T21:11:26Z", + "description": "Prvi8 PHP AND ASPX Web Shells ( Bypasser Web Shells ) NEW !", + "author": "sagsooz", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/S-Tazar/webshell-collection", + "name": "webshell-collection", + "created_at": "2024-08-01T05:46:10Z", + "description": null, + "author": "S-Tazar", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/cpkarma/Reborn-PHP-Bypass-Webshell", + "name": "Reborn-PHP-Bypass-Webshell", + "created_at": "2024-12-29T07:26:44Z", + "description": "A php shell which will bypass firewalls.", + "author": "cpkarma", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/ceren77/Webshell", + "name": "Webshell", + "created_at": "2025-01-07T18:12:46Z", + "description": "HTML, CSS ve PHP dilleri kullanılarak yazılmış bir webshell uygulamasıdır", + "author": "ceren77", + "language": "PHP", + "keyword": "webshell" + }, + { + "link": "https://github.com/azx1573/frontend-algorithms", + "name": "frontend-algorithms", + "created_at": "2024-11-17T07:23:53Z", + "description": "渐进式收集整理及手动实现前端算法基础知识点包括栈、队列、链表、哈希表、树(二叉树、红黑树等)、图常见的各种基础算法、高阶算法等等。", + "author": "azx1573", + "language": "JavaScript", + "keyword": "红队" + }, + { + "link": "https://github.com/chainreactors/gogo", + "name": "gogo", + "created_at": "2022-06-16T07:13:40Z", + "description": "面向红队的, 高度可控可拓展的自动化引擎", + "author": "chainreactors", + "language": "Go", + "keyword": "红队" + }, + { + "link": "https://github.com/ChinaRan0/HuntBack", + "name": "HuntBack", + "created_at": "2024-12-22T10:27:31Z", + "description": "针对护网行动中红队溯源工具", + "author": "ChinaRan0", + "language": "Python", + "keyword": "红队" + }, + { + "link": "https://github.com/ranhn/Goby-Poc", + "name": "Goby-Poc", + "created_at": "2025-01-08T06:20:06Z", + "description": "此次更新共包含1314个自定义gobypoc,是否含有后门和重复自行判断,如果无红队版,可直接poc管理处导入自定义poc即可,共计1314个。", + "author": "ranhn", "language": null, "keyword": "红队" }, @@ -1548,21 +1584,12 @@ "keyword": "红队" }, { - "link": "https://github.com/ChinaRan0/HuntBack", - "name": "HuntBack", - "created_at": "2024-12-22T10:27:31Z", - "description": "针对护网行动中红队溯源工具", - "author": "ChinaRan0", - "language": "Python", - "keyword": "红队" - }, - { - "link": "https://github.com/azx1573/frontend-algorithms", - "name": "frontend-algorithms", - "created_at": "2024-11-17T07:23:53Z", - "description": "渐进式收集整理及手动实现前端算法基础知识点包括栈、队列、链表、哈希表、树(二叉树、红黑树等)、图常见的各种基础算法、高阶算法等等。", - "author": "azx1573", - "language": "JavaScript", + "link": "https://github.com/safe6Sec/command", + "name": "command", + "created_at": "2021-08-22T16:16:09Z", + "description": "红队常用命令速查", + "author": "safe6Sec", + "language": null, "keyword": "红队" }, { @@ -1601,15 +1628,6 @@ "language": null, "keyword": "红队" }, - { - "link": "https://github.com/chaos198800/hong-dui-shi-yong-de-na-xie-gong-ju-ji-chu-pian-fu-xia-zai-fen-xiang", - "name": "hong-dui-shi-yong-de-na-xie-gong-ju-ji-chu-pian-fu-xia-zai-fen-xiang", - "created_at": "2024-12-28T05:01:43Z", - "description": "红队使用的那些工具基础篇附下载分享", - "author": "chaos198800", - "language": null, - "keyword": "红队" - }, { "link": "https://github.com/P0lar1ght/JVMHeapAnalyzer", "name": "JVMHeapAnalyzer", @@ -1673,33 +1691,6 @@ "language": "Python", "keyword": "红队" }, - { - "link": "https://github.com/Zer08Bytes/Monitoring", - "name": "Monitoring", - "created_at": "2024-11-28T07:56:06Z", - "description": "红蓝队病毒木马监控辅助工具", - "author": "Zer08Bytes", - "language": null, - "keyword": "红队" - }, - { - "link": "https://github.com/GTekSD/SUASS", - "name": "SUASS", - "created_at": "2023-07-07T13:34:39Z", - "description": "one-stop resource for all things offensive security.", - "author": "GTekSD", - "language": "JavaScript", - "keyword": "redteam" - }, - { - "link": "https://github.com/R3DRUN3/vermilion", - "name": "vermilion", - "created_at": "2025-01-02T15:17:35Z", - "description": "Linux post exploitation tool for info gathering and exfiltration 🐧📡💀", - "author": "R3DRUN3", - "language": "Go", - "keyword": "redteam" - }, { "link": "https://github.com/mthcht/awesome-lists", "name": "awesome-lists", @@ -1710,41 +1701,14 @@ "keyword": "redteam" }, { - "link": "https://github.com/L0WK3Y-IAAN/Hunting-With-L0WK3Y", - "name": "Hunting-With-L0WK3Y", - "created_at": "2025-01-02T22:36:34Z", - "description": "This repository documents my path from cybersecurity enthusiast to a skilled bug bounty hunter. Here, I share the tools, resources, techniques, and real-world insights I've gathered along the way, aimed at uncovering vulnerabilities and improving application security.", - "author": "L0WK3Y-IAAN", + "link": "https://github.com/xophae/moonwalk", + "name": "moonwalk", + "created_at": "2025-01-13T18:07:12Z", + "description": "Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.", + "author": "xophae", "language": null, "keyword": "redteam" }, - { - "link": "https://github.com/bsy0318/Chernobyl-packet", - "name": "Chernobyl-packet", - "created_at": "2025-01-07T05:52:39Z", - "description": "Network Broadcast Storm Generator : Red Team DoS attacks Tool for Network Overload and Disruption", - "author": "bsy0318", - "language": "Python", - "keyword": "redteam" - }, - { - "link": "https://github.com/ZHallen122/MSSQL_Custom_Redteam_Tool", - "name": "MSSQL_Custom_Redteam_Tool", - "created_at": "2025-01-07T07:30:25Z", - "description": null, - "author": "ZHallen122", - "language": "C#", - "keyword": "redteam" - }, - { - "link": "https://github.com/snooppr/snoop", - "name": "snoop", - "created_at": "2020-02-14T11:18:33Z", - "description": "Snoop — инструмент разведки на основе открытых данных (OSINT world)", - "author": "snooppr", - "language": "Python", - "keyword": "redteam" - }, { "link": "https://github.com/edoardottt/secfiles", "name": "secfiles", @@ -1755,93 +1719,12 @@ "keyword": "redteam" }, { - "link": "https://github.com/sneakerhax/Arsenal", - "name": "Arsenal", - "created_at": "2020-03-07T00:03:45Z", - "description": "Red Team tools weaponized", - "author": "sneakerhax", - "language": null, - "keyword": "redteam" - }, - { - "link": "https://github.com/spellshift/realm", - "name": "realm", - "created_at": "2022-02-14T23:56:55Z", - "description": "Realm is a cross platform Red Team engagement platform with a focus on automation and reliability.", - "author": "spellshift", - "language": "Rust", - "keyword": "redteam" - }, - { - "link": "https://github.com/GTekSD/gteksd", - "name": "gteksd", - "created_at": "2023-04-30T07:31:28Z", - "description": "My short bio", - "author": "GTekSD", - "language": null, - "keyword": "redteam" - }, - { - "link": "https://github.com/BlackSnufkin/LitterBox", - "name": "LitterBox", - "created_at": "2024-12-25T11:24:33Z", - "description": "sandbox approach for malware developers and red teamers to test payloads against detection mechanisms before deployment", - "author": "BlackSnufkin", - "language": "YARA", - "keyword": "redteam" - }, - { - "link": "https://github.com/h4m5t/VulnAlert", - "name": "VulnAlert", - "created_at": "2025-01-04T14:19:48Z", - "description": "基于Django 的漏洞管理预警系统", - "author": "h4m5t", - "language": "CSS", - "keyword": "redteam" - }, - { - "link": "https://github.com/0xIapetus/RedTeamingNotes", - "name": "RedTeamingNotes", - "created_at": "2023-10-19T21:35:53Z", - "description": "Red teaming cheatsheet for Windows Active Directory environments, featuring a meticulously curated cheatsheet that transcends traditional command lists. This resource is enriched with in-depth explanations, foundational concepts, and strategic insights, coupled with actionable operational security ...", - "author": "0xIapetus", - "language": null, - "keyword": "redteam" - }, - { - "link": "https://github.com/navikt/helse-redteam", - "name": "helse-redteam", - "created_at": "2022-09-15T14:04:33Z", - "description": "holder styr på red-team ordningen i team Bømlo", - "author": "navikt", - "language": "Kotlin", - "keyword": "redteam" - }, - { - "link": "https://github.com/venator17/Snakes-Lair", - "name": "Snakes-Lair", - "created_at": "2024-04-29T21:59:27Z", - "description": "My GitBook website, which huge evolution of my Cybersecurity-Notes repo", - "author": "venator17", - "language": null, - "keyword": "redteam" - }, - { - "link": "https://github.com/Sholabom/redteam_llm", - "name": "redteam_llm", - "created_at": "2025-01-06T13:47:07Z", - "description": null, - "author": "Sholabom", - "language": null, - "keyword": "redteam" - }, - { - "link": "https://github.com/yaklang/yakit", - "name": "yakit", - "created_at": "2021-10-12T02:15:42Z", - "description": "Cyber Security ALL-IN-ONE Platform", - "author": "yaklang", - "language": "TypeScript", + "link": "https://github.com/BStyls/Simple-RunPE-Process-Hollowing", + "name": "Simple-RunPE-Process-Hollowing", + "created_at": "2025-01-14T15:16:17Z", + "description": "The RunPE program is written in C# to execute a specific executable file within another files memory using the ProcessHollowing technique.", + "author": "BStyls", + "language": "C#", "keyword": "redteam" }, { @@ -1854,14 +1737,149 @@ "keyword": "redteam" }, { - "link": "https://github.com/Sabberinfosec/VidExploit", - "name": "VidExploit", - "created_at": "2025-01-06T04:41:04Z", - "description": "Simple Bash Script for Hacking Windows Using Malicious Video Files!", - "author": "Sabberinfosec", - "language": "Shell", + "link": "https://github.com/ibnaleem/gosearch", + "name": "gosearch", + "created_at": "2024-11-09T23:47:22Z", + "description": "🔍 OSINT tool for searching people's digital footprint and leaked passwords across various social networks, written in Go.", + "author": "ibnaleem", + "language": "Go", "keyword": "redteam" }, + { + "link": "https://github.com/laramies/theHarvester", + "name": "theHarvester", + "created_at": "2011-01-01T20:40:15Z", + "description": "E-mails, subdomains and names Harvester - OSINT ", + "author": "laramies", + "language": "Python", + "keyword": "redteam" + }, + { + "link": "https://github.com/CedarvilleCyber/RedTeamVault", + "name": "RedTeamVault", + "created_at": "2024-06-17T00:18:17Z", + "description": "Red Team TTP Obsidian Vault", + "author": "CedarvilleCyber", + "language": null, + "keyword": "redteam" + }, + { + "link": "https://github.com/swisskyrepo/PayloadsAllTheThings", + "name": "PayloadsAllTheThings", + "created_at": "2016-10-18T07:29:07Z", + "description": "A list of useful payloads and bypass for Web Application Security and Pentest/CTF", + "author": "swisskyrepo", + "language": "Python", + "keyword": "redteam" + }, + { + "link": "https://github.com/maxDcb/C2Implant", + "name": "C2Implant", + "created_at": "2023-04-26T12:17:42Z", + "description": "Windows C++ Implant for Exploration C2", + "author": "maxDcb", + "language": "C++", + "keyword": "redteam" + }, + { + "link": "https://github.com/maxDcb/C2Core", + "name": "C2Core", + "created_at": "2023-04-26T06:32:18Z", + "description": "Core Submodule of Exploration C2 ", + "author": "maxDcb", + "language": "C++", + "keyword": "redteam" + }, + { + "link": "https://github.com/D1se0/h4cker_b00k", + "name": "h4cker_b00k", + "created_at": "2024-06-28T16:29:43Z", + "description": "Welcome to h4cker_b00k, a sheet where the write up's of different CTF's are to learn ethical hacking...", + "author": "D1se0", + "language": null, + "keyword": "redteam" + }, + { + "link": "https://github.com/CyberSecurityUP/Offensive-Windows-Drivers-Development", + "name": "Offensive-Windows-Drivers-Development", + "created_at": "2025-01-14T15:52:35Z", + "description": null, + "author": "CyberSecurityUP", + "language": "C", + "keyword": "redteam" + }, + { + "link": "https://github.com/tkmru/awesome-edr-bypass", + "name": "awesome-edr-bypass", + "created_at": "2023-04-19T18:01:21Z", + "description": "Awesome EDR Bypass Resources For Ethical Hacking", + "author": "tkmru", + "language": null, + "keyword": "redteam" + }, + { + "link": "https://github.com/h4m5t/VulnAlert", + "name": "VulnAlert", + "created_at": "2025-01-04T14:19:48Z", + "description": "基于Django 的漏洞管理预警系统", + "author": "h4m5t", + "language": "CSS", + "keyword": "redteam" + }, + { + "link": "https://github.com/Oni-kuki/RedTeam-Operator_Workstation", + "name": "RedTeam-Operator_Workstation", + "created_at": "2024-12-24T00:46:41Z", + "description": "This project automates the setup of work environments for Red Team operators, enabling faster deployment and operational readiness.", + "author": "Oni-kuki", + "language": "PowerShell", + "keyword": "redteam" + }, + { + "link": "https://github.com/ait-testbed/attackmate", + "name": "attackmate", + "created_at": "2023-04-28T11:00:16Z", + "description": "AttackMate is an attack orchestration tool that executes full attack-chains based on playbooks.", + "author": "ait-testbed", + "language": "Python", + "keyword": "redteam" + }, + { + "link": "https://github.com/LOLBAS-Project/LOLBAS", + "name": "LOLBAS", + "created_at": "2018-06-08T22:11:05Z", + "description": "Living Off The Land Binaries And Scripts - (LOLBins and LOLScripts)", + "author": "LOLBAS-Project", + "language": "XSLT", + "keyword": "redteam" + }, + { + "link": "https://github.com/t3l3machus/ACEshark", + "name": "ACEshark", + "created_at": "2024-12-28T10:42:29Z", + "description": "ACEshark is a utility designed for rapid extraction and analysis of Windows service configurations and Access Control Entries, eliminating the need for tools like accesschk.exe or other non-native binaries.", + "author": "t3l3machus", + "language": "Python", + "keyword": "redteam" + }, + { + "link": "https://github.com/yaklang/yakit", + "name": "yakit", + "created_at": "2021-10-12T02:15:42Z", + "description": "Cyber Security ALL-IN-ONE Platform", + "author": "yaklang", + "language": "TypeScript", + "keyword": "redteam" + }, + { + "link": "https://github.com/huqiang252/InformationGathering", + "name": "InformationGathering", + "created_at": "2024-06-20T08:25:28Z", + "description": "信息收集", + "author": "huqiang252", + "language": "Python", + "keyword": "信息收集" + }, { "link": "https://github.com/huan-cdm/info_scan", "name": "info_scan", @@ -1871,6 +1889,132 @@ "language": "Python", "keyword": "信息收集" }, + { + "link": "https://github.com/GrassWorkshop/wxapkg_infosearch", + "name": "wxapkg_infosearch", + "created_at": "2025-01-15T01:05:22Z", + "description": "一款微信小程序源码包信息收集工具,根据已有项目改编", + "author": "GrassWorkshop", + "language": "Python", + "keyword": "信息收集" + }, + { + "link": "https://github.com/709343767/phoenix", + "name": "phoenix", + "created_at": "2022-03-19T12:50:26Z", + "description": "“phoenix” 是一个灵活可配置的开源监控平台,主要用于监控应用程序、服务器、数据库、网络、tcp端口和http接口,通过实时收集、汇聚和分析监控信息,实现在发现异常时立刻推送告警信息,并且提供了可视化系统进行配置...", + "author": "709343767", + "language": "Java", + "keyword": "信息收集" + }, + { + "link": "https://github.com/lxl66566/my-college-files", + "name": "my-college-files", + "created_at": "2022-09-14T14:58:14Z", + "description": "ECUST 华东理工大学 信息工程专业 资料全收集", + "author": "lxl66566", + "language": "Typst", + "keyword": "信息收集" + }, + { + "link": "https://github.com/guchangan1/All-Defense-Tool", + "name": "All-Defense-Tool", + "created_at": "2022-04-25T11:45:06Z", + "description": "本项目集成了全网优秀的攻防武器工具项目,包含自动化利用,子域名、目录扫描、端口扫描等信息收集工具,各大中间件、cms、OA漏洞利用工具,爆破工具、内网横向、免杀、社工钓鱼以及应急响应、甲方安全资料等其他安全...", + "author": "guchangan1", + "language": null, + "keyword": "信息收集" + }, + { + "link": "https://github.com/xunmaw001/Restaurant-ordering-system", + "name": "Restaurant-ordering-system", + "created_at": "2025-01-13T13:01:45Z", + "description": "基于 Spring Boot 和 Vue 的餐厅点餐系统是一款便捷的餐饮管理工具。系统集成了菜单管理,可随时更新菜品信息;餐桌管理,便于安排顾客就餐;点餐功能,支持顾客自助点餐;订单处理,能高效处理订单并进行收银操作;还包...", + "author": "xunmaw001", + "language": "JavaScript", + "keyword": "信息收集" + }, + { + "link": "https://github.com/JoeanAmier/XHS-Downloader", + "name": "XHS-Downloader", + "created_at": "2023-08-16T11:03:36Z", + "description": "小红书链接提取/作品采集工具:提取账号发布、收藏、点赞、专辑作品链接;提取搜索结果作品、用户链接;采集小红书作品信息;提取小红书作品下载地址;下载小红书无水印作品文件", + "author": "JoeanAmier", + "language": "Python", + "keyword": "信息收集" + }, + { + "link": "https://github.com/kkbo8005/mitan", + "name": "mitan", + "created_at": "2024-04-03T09:59:12Z", + "description": "密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、端口扫描、批量信息权重查询、密码字典等功能", + "author": "kkbo8005", + "language": null, + "keyword": "信息收集" + }, + { + "link": "https://github.com/h1thub/SecureJS", + "name": "SecureJS", + "created_at": "2025-01-13T06:35:00Z", + "description": "SecureJS 是一款功能强大的工具,旨在通过模拟浏览器行为从目标网站收集所有相关链接(包括加载的所有资源链接和页面中存在的所有链接),访问这些链接(主要是 JavaScript 文件),并扫描其中的敏感信息,如令牌、密钥、...", + "author": "h1thub", + "language": "Go", + "keyword": "信息收集" + }, + { + "link": "https://github.com/CyrilSLi/12306-wechat-apis", + "name": "12306-wechat-apis", + "created_at": "2025-01-10T05:54:22Z", + "description": "12306 微信小程序信息类 API 收集", + "author": "CyrilSLi", + "language": null, + "keyword": "信息收集" + }, + { + "link": "https://github.com/dromara/dax-pay", + "name": "dax-pay", + "created_at": "2024-02-16T13:08:06Z", + "description": "免费开源的支付网关,支持支付宝、微信、云闪付等通道,提供收单、退款、对账、分账等功能,通过HTTP方式进行调用,不与其他系统产生耦合关联,可以快速集成到各种系统中,提供可视化界面进行管理,便于实现统一的支...", + "author": "dromara", + "language": "Java", + "keyword": "信息收集" + }, + { + "link": "https://github.com/xunmaw001/Comic-website", + "name": "Comic-website", + "created_at": "2025-01-10T14:27:18Z", + "description": "基于 Spring Boot + Vue 的漫画网站,是一个漫画爱好者的聚集地。该系统提供丰富的漫画资源,支持漫画分类、搜索、在线阅读、收藏等功能。前端 Vue 为用户带来舒适的阅读界面和流畅操作体验;后端 Spring Boot 保证系统稳定,实...", + "author": "xunmaw001", + "language": "JavaScript", + "keyword": "信息收集" + }, + { + "link": "https://github.com/xxm1995/dax-pay-h5", + "name": "dax-pay-h5", + "created_at": "2024-02-16T13:12:56Z", + "description": "免费开源的支付网关,支持支付宝、微信、云闪付等通道,提供收单、退款、聚合支付、组合支付、对账、分账等功能,同时扩展了更多支付方式,如储值卡、现金卡等,通过HTTP方式进行调用,不与其他系统产生耦合关联,可...", + "author": "xxm1995", + "language": "TypeScript", + "keyword": "信息收集" + }, + { + "link": "https://github.com/peng456/rabbitmq_note", + "name": "rabbitmq_note", + "created_at": "2019-03-07T08:16:45Z", + "description": "rabbitmq 的总结blog.信息收集。面试的时候,这些都需要。知识需要输出,沉淀,才会进入的大脑。记住看过一遍的事,大脑是会遗忘的。", + "author": "peng456", + "language": null, + "keyword": "信息收集" + }, + { + "link": "https://github.com/s7safe/masnmapscan-GO", + "name": "masnmapscan-GO", + "created_at": "2025-01-09T05:41:18Z", + "description": "masnmapscan的Golang版本,接入自动化流程体系中,对收集到的子域名进行端口扫描,并进入下一个流程,适用于自动化渗透、自动化信息收集、自动化资产测绘、Bug Bounty", + "author": "s7safe", + "language": "Go", + "keyword": "信息收集" + }, { "link": "https://github.com/testnet0/testnet", "name": "testnet", @@ -1908,146 +2052,11 @@ "keyword": "信息收集" }, { - "link": "https://github.com/haishikeji/ZF-PMS-FGW", - "name": "ZF-PMS-FGW", - "created_at": "2025-01-07T06:34:13Z", - "description": "发改委项目调度管理系统是一款面向政府发改委部门的项目管理平台,它集成了项目申报、联防配置、业主信息管理、值班安排、巡检记录、工单处理、用地管理、用户角色权限控制等多个功能模块,支持项目从规划、实施到...", - "author": "haishikeji", - "language": "Vue", - "keyword": "信息收集" - }, - { - "link": "https://github.com/709343767/phoenix", - "name": "phoenix", - "created_at": "2022-03-19T12:50:26Z", - "description": "“phoenix” 是一个灵活可配置的开源监控平台,主要用于监控应用程序、服务器、数据库、网络、tcp端口和http接口,通过实时收集、汇聚和分析监控信息,实现在发现异常时立刻推送告警信息,并且提供了可视化系统进行配置...", - "author": "709343767", - "language": "Java", - "keyword": "信息收集" - }, - { - "link": "https://github.com/Sakwya/AICareerCrawler", - "name": "AICareerCrawler", - "created_at": "2025-01-07T03:17:34Z", - "description": "用于收集人工智能相关职业招聘信息的爬虫。", - "author": "Sakwya", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/ECNUCSE/ECNU_ITers", - "name": "ECNU_ITers", - "created_at": "2021-03-13T15:22:26Z", - "description": "ECNU CS & SE 信息收集; 华师大计软院友墙", - "author": "ECNUCSE", - "language": "HTML", - "keyword": "信息收集" - }, - { - "link": "https://github.com/SimonSkywalke/InformationCollectionPart-time", - "name": "InformationCollectionPart-time", - "created_at": "2025-01-05T15:37:38Z", - "description": "万恶的兼职公司剥削我,每天干8小时才赚100。生活所迫,只能写一基于Python的GUI插件用于提升信息收集的速度", - "author": "SimonSkywalke", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/JoeanAmier/XHS-Downloader", - "name": "XHS-Downloader", - "created_at": "2023-08-16T11:03:36Z", - "description": "小红书链接提取/作品采集工具:提取账号发布、收藏、点赞、专辑作品链接;提取搜索结果作品、用户链接;采集小红书作品信息;提取小红书作品下载地址;下载小红书无水印作品文件", - "author": "JoeanAmier", - "language": "Python", - "keyword": "信息收集" - }, - { - "link": "https://github.com/kkbo8005/mitan", - "name": "mitan", - "created_at": "2024-04-03T09:59:12Z", - "description": "密探渗透测试工具包含资产信息收集,子域名爆破,搜索语法,资产测绘(FOFA,Hunter,quake, ZoomEye),指纹识别,敏感信息采集,文件扫描、端口扫描、批量信息权重查询、密码字典等功能", - "author": "kkbo8005", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/badboycxcc/Exchange-Info", - "name": "Exchange-Info", - "created_at": "2024-07-30T02:37:14Z", - "description": "Exchange 信息收集工具", - "author": "badboycxcc", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/dromara/dax-pay", - "name": "dax-pay", - "created_at": "2024-02-16T13:08:06Z", - "description": "免费开源的支付网关,支持支付宝、微信、云闪付等通道,提供收单、退款、对账、分账等功能,通过HTTP方式进行调用,不与其他系统产生耦合关联,可以快速集成到各种系统中,提供可视化界面进行管理,便于实现统一的支...", - "author": "dromara", - "language": "Java", - "keyword": "信息收集" - }, - { - "link": "https://github.com/xxm1995/dax-pay-ui", - "name": "dax-pay-ui", - "created_at": "2024-02-16T13:10:01Z", - "description": "免费开源的支付网关,支持支付宝、微信、云闪付等通道,提供收单、退款、对账、分账等功能,同时扩展了更多支付方式,如储值卡、现金卡等,通过HTTP方式进行调用,不与其他系统产生耦合关联,可以快速集成到各种系统...", - "author": "xxm1995", - "language": "Vue", - "keyword": "信息收集" - }, - { - "link": "https://github.com/huqiang252/InformationGathering", - "name": "InformationGathering", - "created_at": "2024-06-20T08:25:28Z", - "description": "信息收集", - "author": "huqiang252", - "language": "Python", - "keyword": "信息收集" - }, - { - "link": "https://github.com/ZemingL1u/Information-Cloud-Convergence", - "name": "Information-Cloud-Convergence", - "created_at": "2024-03-29T10:48:54Z", - "description": "信息云汇——校园活动信息的收集、发布、参与、管理全流程一体化平台", - "author": "ZemingL1u", - "language": "JavaScript", - "keyword": "信息收集" - }, - { - "link": "https://github.com/KPF888/Starmark", - "name": "Starmark", - "created_at": "2024-08-28T10:20:58Z", - "description": "红队信息收集工具", - "author": "KPF888", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/official-free12/gu_fS", - "name": "gu_fS", - "created_at": "2024-12-31T08:45:55Z", - "description": "股票交流推广源码 股票客户信息收集网站源码", - "author": "official-free12", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/official-free12/gu_Yh", - "name": "gu_Yh", - "created_at": "2024-12-31T08:45:42Z", - "description": "股票交流推广源码 股票客户信息收集网站源码", - "author": "official-free12", - "language": null, - "keyword": "信息收集" - }, - { - "link": "https://github.com/leveryd/x-waf", - "name": "x-waf", - "created_at": "2024-12-04T09:37:29Z", - "description": "让\"WAF绕过\"变得简单", - "author": "leveryd", + "link": "https://github.com/ItzNotJorz/cursor-free-vip", + "name": "cursor-free-vip", + "created_at": "2025-01-11T22:09:51Z", + "description": "自动绕过 Cursor Ai 机制,免费升级使用Pro 功能: You've reached your trial request limit. / Too many free trial accounts used on this machine. Please upgrade to pro. We have this limit in place to prevent abuse. Please let us know if you believe this is a mistake.", + "author": "ItzNotJorz", "language": null, "keyword": "绕过" }, @@ -2061,12 +2070,39 @@ "keyword": "绕过" }, { - "link": "https://github.com/durunsong/kilyicms", - "name": "kilyicms", - "created_at": "2024-07-09T12:57:10Z", - "description": "这是一个国际化全栈中后台解决方案, 支持16种语言切换,前端: vue3, typescript, vite5, pinia, element-plus, unocss, sass, 后端Nodejs, express, MySQL/PostgreSQL, Redis的管理后台项目, ⬇预览: 网络需要绕过大陆⬇", - "author": "durunsong", - "language": "TypeScript", + "link": "https://github.com/byname66/SerializeJava", + "name": "SerializeJava", + "created_at": "2024-12-29T15:11:19Z", + "description": "SerializeJava是用Go语言+GUI库Fyne开发的,展示JAVA序列化流以及集成一键插入脏数据,UTF过长编码绕WAF(Utf OverLoad Encoding),修改类SerializeVersionUID功能的图形化工具。", + "author": "byname66", + "language": "Go", + "keyword": "绕过" + }, + { + "link": "https://github.com/topvpntool/gfw", + "name": "gfw", + "created_at": "2025-01-13T01:18:10Z", + "description": "科学上网,指的是使用特定的软件或工具,以绕过防火长城的方式,从而可以访问被屏蔽的海外网站和资源。在中国,这种方式也被称为“翻墙”,是为了将本地IP地址伪装成外国IP地址,以便访问被屏蔽的资源。", + "author": "topvpntool", + "language": null, + "keyword": "绕过" + }, + { + "link": "https://github.com/pxx917144686/Stay_pxx", + "name": "Stay_pxx", + "created_at": "2025-01-07T15:07:20Z", + "description": "(hook)绕过 Stay 安全机制!许可证检查和其他授权功能,激活。", + "author": "pxx917144686", + "language": "Makefile", + "keyword": "绕过" + }, + { + "link": "https://github.com/passeway/Snell", + "name": "Snell", + "created_at": "2024-04-07T06:01:04Z", + "description": "Snell 协议是一种用于网络代理的加密协议,主要应用于科学上网和数据传输,专门为绕过防火墙和网络审查设计。", + "author": "passeway", + "language": "Shell", "keyword": "绕过" }, { @@ -2079,12 +2115,66 @@ "keyword": "绕过" }, { - "link": "https://github.com/pxx917144686/Surge_pxx", - "name": "Surge_pxx", - "created_at": "2025-01-04T00:06:03Z", - "description": "(hook)绕过 Surge 安全机制!模拟许可证检查和其他授权功能,激活。", - "author": "pxx917144686", - "language": "Logos", + "link": "https://github.com/OnlineMo/Renew_X_Auto_Pardon", + "name": "Renew_X_Auto_Pardon", + "created_at": "2025-01-11T10:19:20Z", + "description": "利用python实现 Microsoft365 E5 Renew X 自动特赦,可绕过自动特赦时间要大于30的限制", + "author": "OnlineMo", + "language": "Python", + "keyword": "绕过" + }, + { + "link": "https://github.com/TXZcombo/-", + "name": "-", + "created_at": "2025-01-11T12:01:52Z", + "description": "虚拟机检测及绕过反检测源代码-Python3", + "author": "TXZcombo", + "language": null, + "keyword": "绕过" + }, + { + "link": "https://github.com/leveryd/x-waf", + "name": "x-waf", + "created_at": "2024-12-04T09:37:29Z", + "description": "让\"WAF绕过\"变得简单", + "author": "leveryd", + "language": null, + "keyword": "绕过" + }, + { + "link": "https://github.com/daijunhaoMinecraft/WPFLauncher_Hook", + "name": "WPFLauncher_Hook", + "created_at": "2024-09-21T03:05:02Z", + "description": "网易我的世界发烧平台绕过,但是Hook盒子方法", + "author": "daijunhaoMinecraft", + "language": "C#", + "keyword": "绕过" + }, + { + "link": "https://github.com/bzym2/MidiPull", + "name": "MidiPull", + "created_at": "2025-01-08T12:22:09Z", + "description": "另类思路绕过MIDISHOW", + "author": "bzym2", + "language": "Python", + "keyword": "绕过" + }, + { + "link": "https://github.com/Qin3Yu/PasteAssistant_v.2.0", + "name": "PasteAssistant_v.2.0", + "created_at": "2024-06-27T16:06:53Z", + "description": "模拟键盘输入的文本粘贴,绕过学习通等网站的禁用复制粘贴检测,支持中英双语粘贴。", + "author": "Qin3Yu", + "language": "Python", + "keyword": "绕过" + }, + { + "link": "https://github.com/pojz/zentao-getshell", + "name": "zentao-getshell", + "created_at": "2025-01-08T09:07:23Z", + "description": "禅道认证绕过后台命令执行Getshell", + "author": "pojz", + "language": "Go", "keyword": "绕过" }, { @@ -2093,7 +2183,25 @@ "created_at": "2025-01-03T08:38:56Z", "description": "绕过免费路径的演练", "author": "K-R-DRUVA", - "language": null, + "language": "Python", + "keyword": "绕过" + }, + { + "link": "https://github.com/durunsong/kilyicms", + "name": "kilyicms", + "created_at": "2024-07-09T12:57:10Z", + "description": "这是一个国际化全栈中后台解决方案, 支持16种语言切换,前端: vue3, typescript, vite5, pinia, element-plus, unocss, sass, 后端Nodejs, express, MySQL/PostgreSQL, Redis的管理后台项目, ⬇预览: 网络需要绕过大陆⬇", + "author": "durunsong", + "language": "TypeScript", + "keyword": "绕过" + }, + { + "link": "https://github.com/pxx917144686/Surge_pxx", + "name": "Surge_pxx", + "created_at": "2025-01-04T00:06:03Z", + "description": "(hook)绕过 Surge 安全机制!模拟许可证检查和其他授权功能,激活。", + "author": "pxx917144686", + "language": "Logos", "keyword": "绕过" }, { @@ -2124,113 +2232,59 @@ "keyword": "绕过" }, { - "link": "https://github.com/chaos198800/Samsung-ji-huo-rao-guo-gong-ju-v2-ban-ben-45", - "name": "Samsung-ji-huo-rao-guo-gong-ju-v2-ban-ben-45", - "created_at": "2024-12-28T23:05:11Z", - "description": "Samsung激活绕过工具v2版本45", - "author": "chaos198800", - "language": null, - "keyword": "绕过" - }, - { - "link": "https://github.com/colorcard/AutoInputTool", - "name": "AutoInputTool", - "created_at": "2024-12-19T09:02:39Z", - "description": "绕过头歌禁止粘贴,模拟键盘输入程序。", - "author": "colorcard", - "language": "Python", - "keyword": "绕过" - }, - { - "link": "https://github.com/huahaoyueyuan4/cdnfly_bypass", - "name": "cdnfly_bypass", - "created_at": "2024-12-24T02:55:55Z", - "description": "CDNFLY 绕过算法", - "author": "huahaoyueyuan4", - "language": "Python", - "keyword": "绕过" - }, - { - "link": "https://github.com/zxj-hub/CVE-2024-41713POC", - "name": "CVE-2024-41713POC", - "created_at": "2024-12-21T02:26:26Z", - "description": "Mitel MiCollab 企业协作平台 任意文件读取漏洞(CVE-2024-41713)由于Mitel MiCollab软件的 NuPoint 统一消息 (NPM) 组件中存在身份验证绕过漏洞,并且输入验证不足,未经身份验证的远程攻击者可利用该漏洞执行路径遍历攻击,成功利用可能...", - "author": "zxj-hub", - "language": "Python", - "keyword": "绕过" - }, - { - "link": "https://github.com/W1ndys/CursorCrackScript", - "name": "CursorCrackScript", - "created_at": "2024-12-20T06:14:21Z", - "description": "绕过cursor设备限制脚本", - "author": "W1ndys", - "language": "Python", - "keyword": "绕过" - }, - { - "link": "https://github.com/Ec3o/Jinia2-Exploit", - "name": "Jinia2-Exploit", - "created_at": "2024-12-19T06:21:37Z", - "description": "用来快速生成Jinja2 SSTI Payload、绕过部分WAF和小部分内存马注入", - "author": "Ec3o", - "language": null, - "keyword": "绕过" - }, - { - "link": "https://github.com/chi111i/fuzzshell", - "name": "fuzzshell", - "created_at": "2024-04-17T07:35:02Z", - "description": "CTF WEB RCE签到题一把梭 自动绕过WAF", - "author": "chi111i", - "language": "Python", - "keyword": "绕过" - }, - { - "link": "https://github.com/xiajiajun516/proxy.pac", - "name": "proxy.pac", - "created_at": "2024-12-15T19:13:23Z", - "description": "绕过MDM", - "author": "xiajiajun516", - "language": "JavaScript", - "keyword": "绕过" - }, - { - "link": "https://github.com/kailous/Figma-UI3-Surge", - "name": "Figma-UI3-Surge", - "created_at": "2024-07-16T07:01:06Z", - "description": "如何使用Surge脚本绕过候选名单,强制开启Figma测试版UI3。", - "author": "kailous", - "language": "Python", - "keyword": "绕过" - }, - { - "link": "https://github.com/baimablog/SamsungAtiveOnkernelsu", - "name": "SamsungAtiveOnkernelsu", - "created_at": "2024-12-11T13:20:41Z", - "description": "oneui5.1绕过激活适配kernelsu", - "author": "baimablog", - "language": "Shell", - "keyword": "绕过" - }, - { - "link": "https://github.com/passeway/Snell", - "name": "Snell", - "created_at": "2024-04-07T06:01:04Z", - "description": "Snell 协议是一种用于网络代理的加密协议,主要应用于科学上网和数据传输,专门为绕过防火墙和网络审查设计。", - "author": "passeway", - "language": "Shell", - "keyword": "绕过" - }, - { - "link": "https://github.com/Michesels/Bitrat-Hvnc-Rat-Remote-Control-Av-Bypass", + "link": "https://github.com/Ripo-s/Bitrat-Hvnc-Rat-Remote-Control-Av-Bypass", "name": "Bitrat-Hvnc-Rat-Remote-Control-Av-Bypass", - "created_at": "2024-11-15T19:03:08Z", + "created_at": "2025-01-14T13:20:33Z", "description": "BitRAT CrackedIt is meticulously constructed utilizing the C++ programming language. It stands as the most recent iteration of the premier PC RAT for the year 2023. Regarded as a prized tool", - "author": "Michesels", + "author": "Ripo-s", "language": "C++", "keyword": "bypass av" }, + { + "link": "https://github.com/webRemi/ghostAccess", + "name": "ghostAccess", + "created_at": "2025-01-14T19:06:58Z", + "description": "Bypassing AV is the goal of the tool actually in build", + "author": "webRemi", + "language": "C", + "keyword": "bypass av" + }, + { + "link": "https://github.com/Easysploit/easysploit-server", + "name": "easysploit-server", + "created_at": "2024-12-13T17:36:14Z", + "description": "Easier to exploit, bypass AV with fileless reverse tcp. (Faster, Easier, More comfortable ever)", + "author": "Easysploit", + "language": "Python", + "keyword": "bypass av" + }, + { + "link": "https://github.com/Easysploit/easysploit-client", + "name": "easysploit-client", + "created_at": "2024-12-16T18:46:14Z", + "description": "Easier to exploit, automated code generation, AV bypass, admin privilege escalation. (Faster, Easier, More comfortable ever)", + "author": "Easysploit", + "language": "Python", + "keyword": "bypass av" + }, + { + "link": "https://github.com/yinsel/BypassAV", + "name": "BypassAV", + "created_at": "2024-08-03T07:17:36Z", + "description": "一款基于PE Patch技术的后渗透免杀工具,支持32位和64位", + "author": "yinsel", + "language": "C++", + "keyword": "bypass av" + }, + { + "link": "https://github.com/Nathanfnt/Berry-Avenue-RP", + "name": "Berry-Avenue-RP", + "created_at": "2025-01-10T07:49:42Z", + "description": "Berry Avenue RP Script Hack Cheat Pastebin No Key OP GUI Keyless 2024 auto farm Macro scriptblox Github Discord BONK HUB Download Roblox Exploit Executor Lua 100% UNC Undetected Byfron Bypass No ban Free Solara Mobile and PC Speed hub redz hub copy and paste Berry Avenue script – (IceHub)", + "author": "Nathanfnt", + "language": null, + "keyword": "bypass av" + }, { "link": "https://github.com/Os-MoZ/BypassAv", "name": "BypassAv", @@ -2249,24 +2303,6 @@ "language": "Python", "keyword": "bypass av" }, - { - "link": "https://github.com/Easysploit/easysploit-client", - "name": "easysploit-client", - "created_at": "2024-12-16T18:46:14Z", - "description": "Easier to exploit, automated code generation, AV bypass, admin privilege escalation. (Faster, Easier, More comfortable ever)", - "author": "Easysploit", - "language": "Python", - "keyword": "bypass av" - }, - { - "link": "https://github.com/Easysploit/easysploit-server", - "name": "easysploit-server", - "created_at": "2024-12-13T17:36:14Z", - "description": "Easier to exploit, bypass AV with fileless reverse tcp. (Faster, Easier, More comfortable ever)", - "author": "Easysploit", - "language": "Python", - "keyword": "bypass av" - }, { "link": "https://github.com/Speeder-bit/Berry-Avenue-RP", "name": "Berry-Avenue-RP", @@ -2366,15 +2402,6 @@ "language": null, "keyword": "bypass av" }, - { - "link": "https://github.com/yinsel/BypassAV", - "name": "BypassAV", - "created_at": "2024-08-03T07:17:36Z", - "description": "一款基于PE Patch技术的后渗透免杀工具,支持32位和64位", - "author": "yinsel", - "language": "C++", - "keyword": "bypass av" - }, { "link": "https://github.com/Th3l3mic/IP_AV_Bypass", "name": "IP_AV_Bypass", @@ -2383,23 +2410,5 @@ "author": "Th3l3mic", "language": null, "keyword": "bypass av" - }, - { - "link": "https://github.com/Xyle0/FUD-Crypter-Undetectable-ESET-NOD32-Antivirus-Bypass-with-Xyle-Shield-Advanced-AV-Evasion", - "name": "FUD-Crypter-Undetectable-ESET-NOD32-Antivirus-Bypass-with-Xyle-Shield-Advanced-AV-Evasion", - "created_at": "2024-11-30T01:44:47Z", - "description": "Bypass Nod32", - "author": "Xyle0", - "language": "C#", - "keyword": "bypass av" - }, - { - "link": "https://github.com/Xyle0/FUD-Crypter-Undetectable-360-Chinese-Antivirus-Bypass-with-Xyle-Shield-Advanced-AV-Evasion", - "name": "FUD-Crypter-Undetectable-360-Chinese-Antivirus-Bypass-with-Xyle-Shield-Advanced-AV-Evasion", - "created_at": "2024-11-30T01:27:56Z", - "description": "360 Chinese Antivirus Bypass", - "author": "Xyle0", - "language": "C#", - "keyword": "bypass av" } ] \ No newline at end of file diff --git a/resources/JSON/github_repo.json b/resources/JSON/github_repo.json index fe45428..02e4eff 100644 --- a/resources/JSON/github_repo.json +++ b/resources/JSON/github_repo.json @@ -83,10 +83,10 @@ { "link": "https://api.github.com/shadow1ng/fscan", "name": "shadow1ng/fscan", - "updated_at": "2024-12-19T15:09:06Z", - "description": "Update release.yml", - "author": "影舞者", - "link_2": "https://github.com/shadow1ng/fscan/commit/9ee51a96d8a22342feeef6ae2211e500a65c3917", + "updated_at": "2025-01-12T13:31:30Z", + "description": "Merge pull request #412 from BaiMeow/patch-1\n\nFix 192.168 should mask 16", + "author": "ZacharyZcR", + "link_2": "https://github.com/shadow1ng/fscan/commit/e2c8dd8b1f57277e914a4bc47689d804a109e6b8", "keyword": "shadow1ng/fscan" }, { diff --git a/resources/JSON/github_user.json b/resources/JSON/github_user.json index 49834aa..bc9b608 100644 --- a/resources/JSON/github_user.json +++ b/resources/JSON/github_user.json @@ -1,4 +1,13 @@ [ + { + "link": "https://github.com/su18/POC", + "name": "POC", + "created_at": "2025-01-08T01:56:47Z", + "description": "收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1400多个poc/exp,长期更新。", + "author": "su18", + "language": null, + "keyword": "su18" + }, { "link": "https://github.com/su18/woodpecker-plugin-template", "name": "woodpecker-plugin-template", @@ -80,15 +89,6 @@ "language": null, "keyword": "su18" }, - { - "link": "https://github.com/su18/agentcrack", - "name": "agentcrack", - "created_at": "2023-11-28T04:39:41Z", - "description": "不那么一样的 Java Agent 内存马", - "author": "su18", - "language": null, - "keyword": "su18" - }, { "link": "https://github.com/BeichenDream/EfsPotato", "name": "EfsPotato", diff --git a/resources/JSON/sougou-wx.json b/resources/JSON/sougou-wx.json index 720fc8b..93e734d 100644 --- a/resources/JSON/sougou-wx.json +++ b/resources/JSON/sougou-wx.json @@ -2,214 +2,214 @@ "银行测试": [ { "title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9uBmqTfM-y4nsoj9xXyjEwFFJocsdI0HMyqzPegXqvHaxeLZkj3zzLA99fw1CidOsG_nLFmHVbh_Bh33KpirDDG_zNb9SpnU8Y0IFy0clsXCxa_sS1YLULmpKDyygnGxOTsJdIvAJj49Eh-WgjUguHdTpKGiCkjLMikGk8ZmcOHfzAjcIGepUqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rhRoqSTHcrfaL8N5x8vCAPh6VHguc5261-VtdLLQb2SJRMcRYLgFVDbbROQWWIBC-knqKSKBUPtL-MHksuAAWCsFtyyOgbRQl0sZD1GQa9Cfclwur7HsaJpxfGUSj8ln68fipKlE57sTgi_-J6M0aPtaUbQMKWkh4GX96hhX83pQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...", "author": "观八闽", "pubDate": "2022-02-22 15:30:56" }, { "title": "央行出手!支付宝们正式被“收编”了!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lk2yA87GAVvPeFd4Kyy9Vc3Rk_ZC3DSg1oIY7qM84PHcvJd27OBShi4sczy_Y_vZH2KhHIxXtjm2_ZbKXKuHsXABUPgshdZk1m7cHkwXbUSTWz0F8cq6L5z0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa2JtvXf_rPEpccH-m52xNFMrALDuNbcuJohjag6wQmP4lAKrSKTMipqb8ldk8u-9o_kaDJrPcV6SvbR3k0huRdG13QnEqoTx1_xoKmG6L3Rd4QyYY49B90hCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...", "author": "人民网", "pubDate": "2017-10-17 11:43:30" }, { "title": "美联储最新消息!要求银行多备“家底”,特别是→", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDEy19L6dBvnOY17CB2hTU9gbvwd9d-c6NSB6ecbdNsQ4-SKziE28OvzLtlyxnUA15QBa8Bl8lvm7LIKac71VBnLKsaFxgZJmQbSlcrASRqo7h7etHpSk9GPFj3x9Nw6p-Fg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbdDtWwd52ceau2FpNciYilkOvNeysKbmy1IfJ5MKkSw_S2HELKfFMbnGqIRBnQB_b5ejG9xDGR1kTcyvEDm34K-3ZBgj81RMxhiB4xSpApRngIpIkHq24uB535pjGOOjYg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...", "author": "央视财经", "pubDate": "2023-07-12 16:15:05" }, { "title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd96AEaSzpLm-rNz9gvH9Mw7juO1CMUmhSqFXgLknzeHBUXPQ5j0cr-_eDz1HsLfvG2Ywukz9KFbK-8yqQvky8vbhGCeGEdSdiwvr_r90No_z720O0TXaFGS_CMpgiX1HtdqotEhit6QfoVqXyr1F2vbA16lkvjcK0V1ACCIW9Z-MhQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9U5OF2ACRxNnLbQxf03q7r8u7XUnVZTeVE4nkSz0PwDTMAjmQuFHTtta7Wr06HIXrWRkZPSoMcd4dcendsmGEdIL1pxyqMm6AO9S6Sq7Sivg9V0SAyE2-JrlQMwu_9WL--z0YjdTGy9qQ4sT_tBFrc3SWY8eHa7foGUB4CxJhmUZQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...", "author": "人民网舆情数据中心", "pubDate": "2022-08-31 19:55:10" }, { "title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lgVQ3PpOdEZvxYy9NN48rT0H7oCiHAjlFkf-gqSl_9O6fE7BXPbWMzx57zv5FbumE6140xqOoX4Z0MyVPXVMDfdF0FVRYe6GmX7v6dNojYT342kEU62ok2NCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPawyX6vkab5SGyZCSYCNNMFuUMJFJtJxVjBC_Gn0KWSdVS9hAcGpvlvNiQIiFV3nkm5Xjy9_0IhCcFYPtNahEBZs9ex4arp3ank-D-3IG9F8zlzoMIQrKewA5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...", "author": "人民网", "pubDate": "2017-05-29 08:02:43" }, { "title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd95gufFuvmFmunuzImDXDgKxIsYyBuv1iylpinM2yJqtal_DwtO966KSvBk1At-veQH3AHVYHsafRaFsWrARuyctj_i9s8VDpeSaeetiSdqofYf4gBRIyEaMg_0k_9xJL_QyrethG4RTaeQ1TbaM3rq4B8-P1hvntGE1gcvUf34arm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rNagPmxwjOE27wtfsirXywKNqtIY_UB-WqOHZguU8Nk00JGnYLXX5uNN56wrmpDKyR25zYI_7M-vy4E2IqX4YAcCCjNjreH6GdMF7d-YKrSG2NkyM0mNfQFQZWPwbdTuVGL8wFNHgbggQCG5y-Dz6m7ah34bClrEHdD_SlPI9xf0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...", "author": "新华网思客", "pubDate": "2023-05-05 13:51:35" }, { "title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd96AEaSzpLm-rNz9gvH9Mw7juO1CMUmhSqFXgLknzeHBUXPQ5j0cr-_c2txhR-1LXVPPx8y0ZBuoE7QzgFPAD5RBkfIoNQhoI0q9it_G6I08gjunphJjtvHsrpS-YG3YD-qJiidS19dgNHwu9Rlke_k90hxgVztir6yBPEnKgzXaECYioxHkzTmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9U5OF2ACRxNnLbQxf03q7r8u7XUnVZTeVE4nkSz0PwDTMAjmQuFHTtkOOwpS7QNWZfj7J2d-Sq079RqJaT8mEwlAdtC1V8Q7GGx7o9yI8-RqiWlJXwXx8NYfxl8f0OsKzKXPVRcPnmANCPpfN-KMeE9dsNuMAAZYbfb4hG0uBhTS54z_tGSZTqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...", "author": "人民网舆情数据中心", "pubDate": "2017-09-14 08:16:46" }, { "title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWINRLn_OoTJmmVgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI37CQEHgmP4AxQAEunkkd7sE4haTNX9yxvEwV32aUJfTCul0Art-alMu75l5qp49P5iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsfy8RImedEk6VgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3xg7PiGc7Ivj3HjkyfweHc4-1qTWZuRONFtzelMgH1Xb1q3oE7vwIwWviUqMB_VCSiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...", "author": "人民网舆情数据中心", "pubDate": "2017-01-12 17:06:08" }, { "title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWINRLn_OoTJmmVgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmM8_xzsJhyuhwsx93e6R5dMXIeLqMttJuPATjtvUTLlEdt98MdG4C0pQJeWmLLAvpeiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsfy8RImedEk6VgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmMscpQq9cKnWTHcnA0HNPYvhXatOQ_n7twwDNqe9-JiCo5nEI8ooTdukLFRUmb0_nziZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...", "author": "央视新闻", "pubDate": "2017-01-14 16:40:10" }, { "title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdss1ul1c2L8NeU6QxTGdVyFqXa8Fplpd95gufFuvmFmunuzImDXDgKxIsYyBuv1iylpinM2yJqtal_DwtO966KS6mwZuB7PscQPhGgEvPCjHcSNYYM3p8CESO9VhvuenI8iEnO9ogE32uPr11cAoqla88cFVDdmyjqt2HFN3UyKHAM5rhbBmAd8eu_k6x-3yzU7poz-7MFGSFW6cwuUnkdA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=2E6C89FCBBC032F5797F52640EFE184979BBBEAF677D16F4", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rNagPmxwjOE27wtfsirXywKNqtIY_UB-WqOHZguU8Nk00JGnYLXX5mquKHp2P9d4DFHRvtXv0UwBOSo32vP6I6GHRClFzPuDBfOOsMhADRkGt7bFflDASUPd_F6FZAJhgskZj9dPSp7GB15iASPu76Qg4k5dpcBM2S7ZA33ujNZj3x9Nw6p-Fg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...", "author": "新华网思客", "pubDate": "2023-03-16 10:44:22" } ], "APP逆向": [ - { - "title": "Python爬虫开发从入门到精通APP逆向班 十一期 语文五哥 写作素养 家长必修课share", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9ULdrNr8Lc1z9HvYjwTeL3gn_T3IIbIxgbouUygTTQzs4BHEj8pPg03_3QlqNu1h_brNoNz0uwl8kw2CoRSc3V7rah1FP3GjLjaPcLcDHESE9fOOeX2sMbZFeltslBrlswC29NObfbjt3yK3k3UilXsLrAO71pqWmmYOiqhDNtuUCYioxHkzTmA..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", - "description": "有Python爬虫开发从入门到精通APP逆向班 十一期 这个课小编唯(^_-):yyywk5 或 yyykc1---------以下是填充----------有Python爬虫开...", - "author": "好学知识园", - "pubDate": "2025-01-02 17:23:55" - }, - { - "title": "路飞爬虫开发App逆向第八期share", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd95oD-toi_5trgSuc9Nels9Ufpilh9FkI9tZOzR5vZ-va5Yd-z66UPgzEwgrxuVxxuHLCD3ujfEjmAA1u2tIYRajsgXqZmofFO2E17uRZxAPevVjLJWD_INMZfh5LcaGPd0BPzZkSkoq2kdN2l4fRiq0FyBPK7jd9TOXdgrCjYo3gCn9lOoZLP2Q..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", - "description": "关注以上公众号,后台回复 课程 即可领取哦~有路飞爬虫开发App逆向第八期share路飞爬虫开发App逆向第八期share### 路飞爬虫开...", - "author": "小马找课呀", - "pubDate": "2025-01-01 05:11:41" - }, { "title": "AndroidApp常见逆向工具和使用技巧", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIrEafOQmfu4uVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AFBTCYE2dpEWhBBUnn1bF2GMpP8Hz7LzzGiz1bAU7yrDxZZI9lCe25afpvcDWXPS6iZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzs0BbZ7TK0caiVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AdH1-6NDlA140Gkrz_XK5XBN2W_mfzAo_O1mvY93dg2FnkWDHcnE8vZJ6fmRI7ixUiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...", "author": "黑白之道", "pubDate": "2016-10-26 10:17:15" }, { "title": "一文了解安卓APP逆向分析与保护机制", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqTc1lE-DUs3abKpdEMyO1qkxmiO5iiQySuf1P6QfCAIB9pIoLm_zlPFiyrfnXnGj4WGxSLPtlacTeeKkREAyrbTA3p1Z72FCvjSVQ64MievCbmN4zhckSicC2Qmj7RgGwQ..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVmWR3iyh-E-4ebAWXFj-gdMsdZTotE4jn5p9icW0XZ_hz_lW_RCWS6NHDI5wyCuJsx39aax8AKZqXPcICIPYbxhN-gifK-Orn5VpOExHfwXWxgg-eeXTzVUSYTqT4eyLmA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...", "author": "FreeBuf", "pubDate": "2018-03-31 18:12:34" }, - { - "title": "FlutterAPP逆向实践", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9qjpA3veeY-KdBJSH508h2ao6GqlcXBkGAI3gNcG9TKSac92MpYRXFwzgf7IxhrbVjLzyYdH-ipMMpqbRANg3RGk6q6RSvFwEotgrdzV1GH2euvubPwgFuFOKSNh0unJQ1P608zgLZkATrTbSmyxa3qP9Fsc-zSV7s5e4tuFMxNBhlgeRt7bSzA..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", - "description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...", - "author": "看雪学苑", - "pubDate": "2022-07-21 17:59:03" - }, { "title": "记某APP登录逆向解密过程", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9TDjn6xUhYtyquFIJ5GlKHgQw2hsa88qvWlDV8Iwt8p_1UD-MDApVoiuFUWTugAQaBoi2SXoGtadFvS2kDJs9ob5vtkRuYVNYI9YT2F7AGQXgy_6NxCsKH0LUV9UmJm042kTBFuUlvaJ8Z879KInFPbPRuc4RqTmbdsc1TMvIXonuL0unUdKkuw..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9II7Vh_mr6GjLFczSpmCFj5fRjzd-z69k9l3xUU8T-UAgP318sWFtg7bVpQUtu0jnX1FTSap7nASbrywFaao_ahDwUGO_xmtrchivfF33Ik0jBk3snXw816lVMm0CHoSnFpS3yJ0UWgvFujz37jCuqJWKuP63a_3ZOWvx9NQnVbJflztgI7RZ1g..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...", "author": "黑白之道", "pubDate": "2024-05-03 08:36:47" }, + { + "title": "FlutterAPP逆向实践", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9SS7O9-TOAQq_aytedZw9y-6rqCRj4gJV1R06K_JHUTp249UCALqkex7EbPx7oKq7dCdvtKXouZB_ezLxDwp7u96RqnipBwzJCqZDAP1de3co9zc0QEe7sp4f6elfYRiRlpFa2UTUcwjrsr1Q6TALaEvedV67UlpLI2IxdELttQX6zvkPgoArRQ..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", + "description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...", + "author": "看雪学苑", + "pubDate": "2022-07-21 17:59:03" + }, + { + "title": "抖音APP逆向:附带抓包与6神算法探索", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9c854Ys4If4OUfsVWxv1m1FOevAHzMpEp-bBVxcGEP4FWu2rRIo5DOiy12-5BsMFNV6Sya2FLqQaBunkDL_vkPmE8h17sIoR-Kc-ztQ_S2-Opa6TnS6aJq1cbrSNYZ9hWDGDWmKJUbXRNcYkVEoeQymnhCGtBRX7pgaIn3-AeUN_zAjcIGepUqA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", + "description": "走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必...", + "author": "彪哥in讲py", + "pubDate": "2025-01-03 13:10:22" + }, { "title": "APP逆向神器之Frida【Android初级篇】", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9MONZWwY2e31Kgj_DEYF3LmznY349dkgnWNMy6EVefBS-zfnhPSV0xRDW6bORJGsH-LxRMwspMJUA8M1V6okWS9rOULS5x2vLMc_rtx9obGs1TtJaggaAp531macUe6gHI4vgVBzc4pJTDGxuVxQMyGL5p-35mzmbkCVfs2z6rRkHpHkoPMgL3A..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9y1Qey4TDHPFnwfED5CCSTC_4FU14Q9qN2bss3Wk2SsLnKFwM74jQ6UKvskh30n8gkqfKCegExufF1_bbt3HTDZFc_htOgCafDVN78Wi2ulTgG7t05BoiW-MGGKazMQtkukp-EXYyhJQOvLmvUokxLqiEPDFDYy4bjJBJ9_QAvV8Y-UZGbO56rA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...", "author": "NightTeam", "pubDate": "2019-07-03 09:00:11" }, { - "title": "APP逆向sign签名算法:Python实战指南", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9jlaxwnjFyK8TgmUewblozGTo0OtWYsiUKVnnYWvLbIaM6xqgnFZas1yqfSvD7qiGXGaUR2EEFQE6Hvzt1-CTfY4oc7mVr2K_GnHt14lk23aePCYX4pIVwjDVfufhGn5nMKEDU_cLiT_2rFBE8yflu6CXvwpBp3wzboZJK_gy8fZ5Nu7CnoSqqg..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", - "description": "在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...", - "author": "雷雷讲py", - "pubDate": "2025-01-03 09:40:29" - }, - { - "title": "APP逆向系列学习(二)", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd92qncWfEbAvtzGcKRzBFPQozLI431gF48Z2U-FsKwQJfFyw9RXdaqWMLuc0Z_V7udSQvOGBgLeCDq04U-bF25vlUzA9mPefOljzWzWppaDmh8Nq3eEfLul5gryq7ZDNBJECSEG2T6U03lguNPgEkgGtD3NsBdVri0rG5zJ7mvUlb6zvkPgoArRQ..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", - "description": "APP逆向系列学习(二)这个章节主要是体验frida进行脱壳,前期有些问题太多了,真是人麻了.android配置:说下遇到的问题,在...", - "author": "呼啦啦安全", - "pubDate": "2024-04-18 13:47:14" + "title": "APP逆向之SO必备分析手法", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9DekuFrSah2MDLH3d1ABtfHiSq42IHf6dIeSPj1pf9G3jmZsNOMQFOpfzTKux7Jnd_xoORBUeoNoXKqDKCw1Qv6JzpsQo0--02RFk0JKQMmEVISvYyNT5d3V6ZCUddf_KT4wP-kBee03XyWSJLlDKHrSyjVUQD3eA4ZFUO1m11YndrgozfSg6bw..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", + "description": "APP逆向过程中,需要对dex文件和elf文件进行分析,又因现在各APP都有各种代码保护手法,因此都需要进行动态分析.今天就分享...", + "author": "编码安全", + "pubDate": "2023-04-07 08:31:00" }, { "title": "对某数藏类app逆向安全分析", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdvkj_YgYPnGpeU6QxTGdVyFqXa8Fplpd9M9zjE8MJhOEZlPmWi2rm3KbJOj4k4ZGisjpqaLZow-9EtQUtJAQzDzU20xoJes1SraT0lYB-kKnHoReqfTbZ3XNyu4hr1xfhZPZSI31v6a4qNr-s0ukZGeMUCsQmLSroj1mwEAyv--q9g2xhNzxY16ZxTwcuOpTpiWTn5J75Lxxf_71bqkOtiw..&type=2&query=APP%E9%80%86%E5%90%91&token=2E6CB8AFC8B340860A0D21167DD33C630B5664C1677D16FA", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9TBe0Cy2M0PMHAsDTkWG1XCgridKRYXPmTOJTEuQ_HkomuFNwiPBMpAZXe8TaJkLqpAXTX02VYshcMw9ShVaDRR_whO3gQ4P4PUM0qhAu7-f8Yal_i9MYUItxgxhVwVI9e1HlnC5bS4eb1ckRRupTKMm-iF2vJ-NCh-QWLvjJh1Zj3x9Nw6p-Fg..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...", "author": "编角料", "pubDate": "2023-03-10 18:32:22" + }, + { + "title": "APP逆向系列(一)", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9wMOpBnCfE3dg3oov0U35WJcchc1r8AswXk0mlXzRDPozNfkwT3nBR1SqqTNqkENWehFUIiOyiinHbYHVHqxzCujUsJzqpdtQaLay1F2XExFt1qOLHbtaCMz4L18n7QXOxbOI6GK54uHq1TKbjPZnVajlf0i46OkVbJS8-NBnSD2TJmCU1UgHwQ..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", + "description": "APP逆向系列(一)最近在解决APP逆向问题,之前都是不系统的学习,知道工具,知道hook,但是跟某些金融比起来还是差点意思...", + "author": "呼啦啦安全", + "pubDate": "2024-04-14 11:12:10" + }, + { + "title": "APP逆向sign签名算法:Python实战指南", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9BFWAUHaIeovflPuJQwjMACirLwaa4ZDc_PA19BDpqx6zWZ2Zqm0u_hD-JaXB6KjOmTKDetHcQqRP5vqUhoVoODGop2kQDwoXCEjwq68bCoNh6DOZnTVbsguXGEFA2NShd4-zsHRToI51fFnTDh0nMaNKfL2_aAVocmGauHRr2wY6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", + "description": "在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...", + "author": "雷雷讲py", + "pubDate": "2025-01-03 09:40:29" } ], "渗透测试": [ { "title": "200万年薪!人民网这个岗位等你来!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_ljlno77iIOd5lcl9F5wsb3Iilf2w089eSCo9KsfpFOwwGqQl_bK-oUDVZc-3WXl5GbcBkEAxO2zSXGrjDvFNuRnXE0XZk4URT_9itp0iK8B6Kk8NxgJ1JKt5Nu7CnoSqqg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa_plC5_ZJUUkLLIU2NwkV0Aty3GmpgU9meXdUReGoasbcmzUULiaWYWq6jIz4UBCCqI1SBeBb3jEb9yTd7cYC2t6KD-nXNjg6dxQ7wKKpsSHrbpSz_G5k61FH6In5Ei3zg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...", "author": "人民网", "pubDate": "2018-08-03 15:22:17" }, { "title": "人社部拟新增10个新职业,看看自己能干点啥", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9efcbaMmiv2GsVuzzmtuIvcbwVbQy5CMYK9EhVSPcXal8GHjOeUZLTJTuQ8dbekr_tW3ZXE-qnvlV5rIPB3AE_GZM1ER0OEB1ABQZp2pJpVsze_Gm84vP5fHdrJOJFabXOh1qi2Y_a9GAz5YdH7cNltW-Y6aOZefDoc2WM7_UIKGfxjh3za6jWA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qDsFRFV-ZzXfCvj94FC6YOCmQFB9BWWWafAk6KRdyQctNO0VF5P6p39phm7usO2ZeyAcvf4A6Wd4e_4QVLFnuk3PkBQYVLsbm0T79C8mbjjstYEBKZzvVUTGSWWaFmuY5XT6GuIMRofAHQAzNZ3vqh4i4P3lNj0cuF15pqZ8V7rS-e4Yz84xMA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...", "author": "人民网海南频道", "pubDate": "2020-05-13 14:27:12" }, { "title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd93OSGFv8EmwpbmU6uHCYRYcvX3pfHaXZWlcOOZa5X0lCTXjKdJveeVO0g5kMAKOpF8o8Fd_QSPgErO-zdfciZKKPXBZ3mjrEfBZLnVImKzUad3Uqo9ItxnBrr8TDSwxt9qrIlIYRzVJ91IchRHgT8pK6S0X5kz0PcjF85E3-plshAe0f8bRARvQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9kG3AVxFmsfwybgm7fy7_melAZgfjVgt8Lho_Dlc2y7w9EjKkgqCWr-ieTiC-MrLHpVnsFUCCq6UET7GzfBZqxfJBmSuZbz95GaKlQDGpiQrNlDqt0p8i-z8Z3F0sIi8oM9GgU6xYxxyFcAiERQFjQXZr5CEtnZSR0RAtzTPdsTXFcvUoAZZH7Q..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...", "author": "新华网", "pubDate": "2017-08-24 14:13:15" }, { "title": "中新网招新了!打工人,速来!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9brqA-2z5sV44YpCsy2p-lvlTHlDECaDYlWimKytQYjBS-roqmgf69-zUQXfJqJ4bdXzfn7Wo3LAU8kteQdFHZaDOowCBoxAnbwG4i7jFUq5fqwBpwKfw6LhLOrRCPyycWLYiC1Y8GocHkRxe7eS-9cLzBeO_khHWn8GSvOWsdJ2fxjh3za6jWA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9j3-2h4QLLOmN4d3w9rfzotkbCZKH75C8KhZsaQycPPuDKoI3EBBOkPDnaE9d67308CCnovBzXpB1ZFnROyLlVvtJ7e0rnko_54Ou1WmjjSqpRKq-qqIJFf8OXmnsprU4zNhWbCKgveYvp_GMRPLf_KUbLHgxM_kObknL--RqEtJf_71bqkOtiw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...", "author": "中国新闻网", "pubDate": "2020-11-03 15:52:39" }, { "title": "人社部拟新增10个新职业,网友疯狂@李佳琦", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9iap-xwd8B2DOWjyowLFx7eyUlNAtStx_hC0VIFtlV6zfQAZaW-UrNEODhAQ2cc_dXUULGvGpybH85xwrDgLgeX8EQfnASsL1DO0FcbJvp1OmDFy70CzZNgl8Aakf0FRSamMqDafxAbPltDzVwa6ppK8D3eH3rOTeEYuK8Y51BXEGX_iHL9MadA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9t4_S6H3nsRQkDz8GIoA1XcSVyrdi1GefED2vttBjAwDfNdktfkUULLz48tTCTLyJpUz1ruE66Obxz8e43aFvDJEDgs-6AxsFj1elB2EJFkR6qQMRQVb0kpA7-hcq6Mx_b4rgEwHlWBzdvsFf_Vri6p4mq2WE0l8BB91IcC7ClCvYl_Q5RRZQjg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "author": "光明网", "pubDate": "2020-05-12 18:12:17" }, - { - "title": "撒贝宁惊现滑雪场!硬核测评来了→", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDE3xedJ0Q-c9YK7OzjYe5rErOVTXm0YuEXeihQmdJDrXz4krcryH80BaDzo36v6augLSvWuqUMT2MlZ1qkxz1YqN4AKju0LLQnudKOXD3w9nMjpSJJYXMuL0NGbbB75bUeA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", - "description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...", - "author": "央视财经", - "pubDate": "2022-12-30 15:14:23" - }, { "title": "柠檬“上海户口、百万房补”?你也不是没有机会!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_lnK--ec5J8Kp0xDK-g8kILLzd12O0HZ4OoFf7W0lSmZ_hasEmvRVeRmKwlZVHhhdipSwrLaCIj1CgAwkQyNvoMHNAHD58iN5TzbZemadBLrGiQxtDpEzXpDP28temKTOwg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa0XkfCGfpKqpmgePJTIT3MqdUyLc8FumCOoy8y2xppMjTLV3Lp47oOiTkE5z_kbRrZL05aGPT2ZF2hRIkOtXU1Gk1hTT4jZEimGzN4JLhucmlO5icazpOGNFH6In5Ei3zg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...", "author": "人民网", "pubDate": "2020-07-10 19:38:53" }, + { + "title": "撒贝宁惊现滑雪场!硬核测评来了→", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbQDIawWPPmTCmRLx9i13LDhoZC1nnZ8bTIywmaIA3dr-5mRrWYDwl14SqEBBVy3mjrtOwbjh66uwKzLmREOCdEnJboCYbSjP5cZ60HYo6flPZe8ahDk5XDsYJSSFPgfogQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", + "description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...", + "author": "央视财经", + "pubDate": "2022-12-30 15:14:23" + }, { "title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9x0RJb1uNorPgftTZLUPMYVlZDZOF-ItpngMjL5_OQhtyJAC1niFDE5DA8b3qGoK07-jKwuNMznSFYIVWmvTtqGJwxqqyTpCtsLGpwshnDWy6SyWI1U8Gf6mjKfhQJa_qNOaC9Y0rrh2ttqNR-Vd-F6CPpUS-HccJg2lh9jDcK9nwdVqCwyPdzA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbUSR-1-pv1BAfcoe0NV0Meyppjk4Y7mnFmRPgqzVOfLQ04mmkbPErrdEp1b3-98VHu5WNkdl3_M1Es8d9IsKXzVFXp5hmztU8Sjhi9w_5QNTnHNQD_cGelJS6t2rFt2rnA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...", "author": "央视财经", "pubDate": "2018-10-09 06:45:24" }, { "title": "李佳琦们要“转正”了!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd9XYIZIG7eRBlVE4y7AnR7_n8_b7nNYyCJyiWZZWbCviMXDGQGjgm_ltmxPJDZA3ERhpvTAtUQIBE-cXd7ILhdSIHwev-v059a5xj_sv3Obo4tmXMwTcXLqdxnSv8TP4L_feTSEGRqOLJUArx4zhhzYjVieNYvjcaea4tdSIGh_YkSYTqT4eyLmA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPazoQbTOwUoq99UzIEhppoaSgTAzQ-AyjiPmq_uzbSQZN30Fx05V91TzDYvQ0aZ5H86QuYT6EkrjNjtdM4OmYdXj8euNgn7zhBFAjftMp0TtS7Oq0HubfG5R6VKrzu_4XKA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "author": "人民网", "pubDate": "2020-05-12 19:02:37" }, { "title": "撒贝宁现身滑雪场,硬核测评“小汉堡”", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdO10X_MYOt9BeU6QxTGdVyFqXa8Fplpd944tfK_MlGkvFg-1wKUtTQBcZrvur5p6CXLTCxDE8mrRRE9Ds1chuwLJBJ1R0W9b8tpzWT-5vinRA58sjDLWe24wVZH5z2zMYbzt72Z3WcYBCJyTB5ZP2nnK9d0H0dd6He199uOB79WpWQM0S06QYlUsmB85WxiIQvqZocoXk1MZe0WC6Sbi7DA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=2E6CE38A10699A5ED1D7F9CDA9FA3FAAD25C92E5677D16FF", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9zlHbF8gxj7EGssOPTd2IvMx5S0ON1zeUFHf1s66aDGU2jlSed1g6RjB7DEtuh3fGfPGVBjuatAKkShHzcHshGcaLuCrCRjtkzCU4ZmphVL1em06lwAJh0NBcqeaI5kje3IGShRIYmsS4-Dgf2jIgYCLp6_GWYKd9YRubsJSyhSOFW6cwuUnkdA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...", "author": "央视新闻", "pubDate": "2022-12-30 18:03:44" @@ -218,70 +218,70 @@ "手机银行漏洞": [ { "title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd96wzNlDGKF74IS5Dmj4VFC_2tomzwFNMNnREdfnK4Mq3rooSKWN4ShnIg7A9Ec5Pb9lyxWlOS2bfFGsfmr5KHQiKvEXuHlqIv6YQqs2HwiTLuJnPeTm57LJpdDwhxMIQkv-7BeYBc8hd4KYJuwRyqMMoQbCQ5xcrut9FubXbdVv8Cn9lOoZLP2Q..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd92qG-YUDuw2cKCKXEijUUwzmJ7LovMb9TK-xo6XmlKI8WTNaY5-SY58cqk1mlByBRCmPmcPx04njC2vGprTRkD8dlexVLDFa83kOaEAU6FbNGDQ6Ms-2LwveLyIsfiaCvFHgfk9SVtXI-wVkb-oMIH8UiAS3ewJf-2uhfP-HNbZo89kyxDwoXvg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...", "author": "木火通明", "pubDate": "2019-04-23 21:42:11" }, { "title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9TqUVhoJQx4ossYz4w_UeJ3L7oAZR8Z4AAVZt_7Vy-3g2rU5fmGOy_evytb21d7yZMgM06UVOBurDxKvIA2FZtHy1-_FzVsLb2tJ_c7MVxYP_5mHhVHd_yHy3b526gsyKBSl7OnbFIInI7cn8DwrViUZLkM8XabKSCqSEW5uEDWz1AfaFW2DefQ..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9OtUjCS5QQKGyCdvG4y99pRo-WqXYr6-ax5N0Jf357hkjlFfw28s2lD-RSafLbG5nzUq4wcC3SrLNZu0SGOdOZfqitEq8tNyDcatItR0cA20o1k5CdHmld6EmeBFgDejKW0S6bFRcljrDp2eUqkg7nsweMqTwzNZ0kv_xxLnZsMYtPujwwRB2Pw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...", "author": "支付百科", "pubDate": "2020-03-19 19:33:50" }, { "title": "手机银行漏洞:五行代码可转走银行250亿美元存款", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYszliFOwjwLat5Gy4WXFwhaO2-P3TkgG_OCcmIvT_QvXpzcATxy1SWMo-tM0mwVyUniZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYsaE49eEpb7wvr3Rkj_eAguhj133NVu3yhIj5FQbbvpHHSidwJi73JtZF04wix2W4iiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...", "author": "安全牛", "pubDate": "2016-05-19 11:48:56" }, { "title": "黑客攻击发现:多家手机银行APP存漏洞", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9Y09V-oQCQ__TOSZRUgUKweX_Rt2UzbkANv7DcsH7oyEfniYKmGysiT0PgF57dXMXiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9TbuA-A-b-ksJTIujAoBVrQqBy-CpHX8pLpuaQb-j6CrT4CIew68eseJhFYuDAG71iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...", "author": "E安全", "pubDate": "2016-09-05 11:36:23" }, { "title": "某银行手机APP现支付漏洞3天被盗刷40多万", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzzudrNNAcr6Uwh9bUJ-aLkndXx7A2o1ZW57bvlGLCwufwxQJ7_x-gBFrDKCo0G_yIiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzkxnNXBuILBBup8Cqq7Tsq0zd7F6ZsjUO5DyPzMFB0eYVGVIycMg0zvxqYKydtZc1iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...", "author": "支付界", "pubDate": "2016-06-16 09:00:18" }, { "title": "警惕!手机银行APP也会存在高危漏洞", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksuAHTGFmi4QCtrwWPkBFO3yFjBPhEC83LpmH5c393FrSnlu5XmLNrwmVkOkEYBrOUiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksQEagkS3beCUFZ-6USo-pcP3YXwdKGmIrE6pSepaYL_0U7_cMO2EAHzFkUu3Dh9ZpiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...", "author": "中国信通院CAICT", "pubDate": "2017-03-15 14:13:34" }, { "title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9KtxJ0CIOoVXVkQ168esAVbejdCKMQ0FErz14KHaT7XQ4eT-q3Be8p4txAAAFbIaPO3sC7tA4_PC_hRf5lpXh0RSxBLs1Z5YlsV__SfftHP-kiBuTt6c1KA7mKF7WdjMTO3VqKezJItSaGlY-UkeddGu8es5-jWvZZpyR_RtNzk2jotuuiAmOIg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9GBNTUPO0R_T1uK-TpcR0Bpu5tyFGgFGabdsxGeNBjZscAx0srPykO-jFxlpJmL6CHFCH7b0T7_Dao4r1RuSFARZR6sEhR2uM4QHMGXXpow0ZHJCKf7YPzRrKsSSd6_t2hzUiMbPE4Y_atdDVE02jnoNRKcOqRaUZngDNBeNYhFbvzHZXxeLdyg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...", "author": "银行科技研究社", "pubDate": "2019-10-23 12:18:17" }, { "title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9f9Spk8cQFi90pjUVtGTOH7dH1KeyQoJ1ag2aKmG_lshrXmY3kYK2lrY83F76rJ7bkr5pZhbFSpdPgkQZb1NjZTdXIadwXNND5dhCAhnzcKptUaLRlAD0sXg4ZU0yq5FjbSpIpjrhRbYiMWb52mVqw72OhhJA1but1wxyjIpC5kXuL0unUdKkuw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9zQ1Vfqmm-833UlHLfkNjzraYNmow7gfQmhjTiJYywxSBp4A1AXuwxHaBnQweacTo8BgpwSEM0esRY43HDD6H0sHvmxudJZVfQE8mVKkPxfDACOc0_w9fHNzPSlF9tbrFhHMSkqA0u9vyQW_hZTHYpimwwS9gbx_6K4hWq-4Y9RjvzHZXxeLdyg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...", "author": "乐享崇仁", "pubDate": "2019-09-12 22:35:10" }, { "title": "警惕!有人利用手机银行漏洞疯狂作案30余起……", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbddhl-xymxtsxeU6QxTGdVyFqXa8Fplpd9tWMpXSnRp5DF2fLqyrs0ORhZXGUEm6kR-IdIVZqgmiwRIeZVFf-LbKjZ-cVB4efOtU-sPWzWKza7vz-4v_yXQSa51uoJaZK87V7EaDi3zFHhG_Av5MuP0ksy8zr8iMcBsJcwvzJQuaChAVdIO9S55tYomrtJ4xsQ10PqKwej0dpOJBjQH7pCxQ..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd92UMYIjv1iSdywM-d1jO8jVz8qtKI5XppALPBGF_O0lOaS_nggT-x5nPHuERm3UQI85pQvAcRNSTGc0OsJafSPvWDMBXpZF72LkaSgKQ9j4cKTIdMQ5rvbDa9Z72L5IvFRctUFDBUAIMWYL5vjawE6l4JjSkg4W7XackzCZ8OpCUCYioxHkzTmA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...", "author": "玉山生活", "pubDate": "2019-09-15 17:21:04" }, { "title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWIbqyrIV2Am4aVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUanMkpA6ZSJLMFU71W6gTYwdefTnWcBudO3Oc0O14ztlN9E9V_7fMzmy2CmBrRDzpDiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D10726319EB2DA1A68ABDD9DA9A59A197DBE5677D1704", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUatIqQYOMlGNW_Nssy-N7jJGR4EThcddlYvn2S8hUmzX9fukBQSbS2WWHASkWj7QcqiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...", "author": "集宁佰事通", "pubDate": "2017-01-20 11:26:29" @@ -290,145 +290,145 @@ "银行漏洞": [ { "title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9gWPGT2YFt0MRSMKl_hVc-wGTiVPjNHbKazFOBPgpqyq1-YmPnEZuty7Dv5WNsgVeEDaUgTtevmTqtWVlfiO6DWDkqJN8BqgAdlluIVCSnYfC89S8nJkok255_aqO-DCgSI1PFwt6aLqFdleiiOKEp3C8CzUwWsCZABWmPOSX_4ZQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9JadOgJUn_cP8GAl9hK6Y1jFwJ10FWq43ADKxbwPz4Uzx6mrWihNQyc1QX4yHiGB8jnlg5VwUZy5nIrh6vOGmPrBqKmj-8_K1xvJoQOw2OtZndFOY8w1g84aB4nyJGzThfDp7B90uj-4T7HWqSO4TurrmuQZ4koNDokQ3i8LRUW0GX_iHL9MadA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...", "author": "测试届的LV", "pubDate": "2019-06-10 08:18:15" }, { "title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9ciUS0Af6iifXpaqWUC3uErufLBF5RcFUARX5kV3Oft-HAWOaUoc3BIYdhzRhF1EQVj3bfxjyLZFkbT2uK6CeOAVU8PAqyxtzvoKVLwz5zmIonsj0F_o7SGEicbor4sAZxqEKRV7ptLFh5ustzG-uZO9OpX5NCDMhC-73szG0dGlQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9lbKl1LtAgbuGgpPqiNV98ZDA9ZSaP_XCG1nCi7ePS-J80bi7j6ZYbXmowfSmYevXA7zm-UoFK8Dk5FkcwzYXS2penyy_0A1JAf7ES2ut_gBAtcbba6_bWek-3C_YxSBRGH4OYLoX6vXq25pByv6TQ8yBbDScTooWKFKREtfiTv0SYTqT4eyLmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...", "author": "新浪财经", "pubDate": "2020-07-21 15:52:31" }, { "title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9OOw8_9mc-EQXpPeuC6_q4OIqmBrisCMegr5A7FCAxlWQ8ooTNyrcgJJMFngN_0e8dF6ItmxI1Ze2-sAuum6HNV5T8egjGSmQq7NjSGgd1tooa3s_iTlxFhzkGp3e1caodCXw3iawr2hdlYvNM3veArVLzwcuyj1VDWKBf2DH4vjRtmyIGw2VAg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9G4iCENSnZxzQN71udtIzF6CypZJDmx9Yj1F70e5NFjzB-NNXpNbpmunGkuH2h81rd8wsFckKXkivY-NC6JPLDhRa3jidUF9sIYJclzs9biBOF9qfxB1vfPwQK2gMSpyZ_cGzfCfl18K8BFrYLKFp118oXs8ZO03NIvuzW8iKuNz6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...", "author": "纽扣资讯网", "pubDate": "2018-08-21 19:29:05" }, { "title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9bMbVZh9G-lAyg6D15CQudGl36ycyUxQn7klg_G3Pnvjd7Bw05tJxwbeMN5xjTcZc8SkK8H_DQG1djWxlJdPzMyJcsBvoN0E6-y7Cal_KdOGNhrSDVDSzS6qpSxR1zTpUINKNpEXNycHXjTeLBig7jLb5Gnd7QQJ-O6QCJf9EXnU5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9lJpbiLZRH1vJjkV2aUakzvX5OFviL3lBHM6YWh_8dMwKoOkW4r62CKhpB_4JiXwcS6YIdN73PWzIdGs7tj5w9V8Sxe0KJVQOIX0L3godNsUNS1jaO2HRWZ8d-6Sar66KBec9xHpcOQKmJKzgFk6tqd9zkhIm-rLiRcc-qHtrsLxCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...", "author": "外交之声", "pubDate": "2017-12-03 23:54:42" }, { "title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9tdbu_BCHj7gmdtoqTtPjoSiSJBviI1AQwHcC_7PrOmM4BOKrgb4aVxzRL_R6aO8zHIjezUqftVn3aiFIHfJxCJpOOD3pdXrx71Zv5EwW2MEju3GdmUn8etx3YQk6RGx2Im1VetVSPME6lm6Ga8YquvNDggsNUKufMbs_NBw5xqX6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9y2wKLqRggIyzmeffQqYe13XJ6dtFD2G71eQ2qvIYnDDD3dk9eb2AxEIQCxY5dE5io8WO73JpBStJ98pXJgPyqwUk8743zTfjdaCDrfC8a-MFlkXPozZ_g5GrGfJGNuCgpC_Ug21LArhJ1mqDatK7rjpZQcqK9aDdnj8v5JdY6SXuL0unUdKkuw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...", "author": "知书局", "pubDate": "2023-02-03 18:20:39" }, { "title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9CXy-yCeecAnXBp1uj5JxMvi5z9rQIf3ATdmLZ1at7xjp8x3_Xk047tAdz6SA_wGn18dbFWdON5PYrQVPpGYpJm7-uaYawjuFKT4XLncW_H1cYD_J3zPIvpwJL2n7syTthDpURfL9cC70Tj4k0liD8pJmBS3T1-y56tKEgcMwF7O00NVofL2iDw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9vYcBvx1zJw63CYtjC1V6_G1kXfzCdKKVb304kNFKJqRUuH0ulnaip3W2KCb6ilLLVE1YaBtaAuJB7X2EoB1uUDFfqYTybAeqW7d3-nRV_tlesjIeWJAwQzqtrOeVq06ze1TxxZBCFasGyq4Phd0Eq8KDSebBf4R8aaNLkw7bRFSTJmCU1UgHwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...", "author": "澳网", "pubDate": "2017-12-04 23:18:55" }, { "title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd97RQlw9ARSObMmAMST-tMYHm5H8PwHV5MtMOqMXMaiZMy2xBM1tUCTdJDYByc78GD_WCvHsSJv4w1uTTX67R0h2ahlO3eM2OvKwCqXBtJuxQuUop5MkL35ZFCUy586Jr-V5s1FVwtdW642-ABsmQwQ-w0MuWxN0GbYPtB6uQN9XpFH6In5Ei3zg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9s4sxFwHnY-mZ7rORgFcvuJHZOSn9Y9ofAuB3bjswFCtMIDjlcpPf49ujNF-6ZvNvWTJjIGBIydChijs5IuKNlfQgjWmEn0fxZnEXBwp2y29qzNJHqB1a-X3E6klvu60E64_-cVYUjtwjlJmP1P7VBgKRoSa7IcUREFcBDG-HD3R5LU3lqtPw9g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...", "author": "火绒安全", "pubDate": "2017-09-11 17:23:47" }, { "title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9JWIii1OV4DeupK5w1LZdS3aKg6DiTzSGUIEe63-1x2dVEpo7HsSHq0WTk3o0pRu0CYzj1CeYZxM8gtOVbJ3r1CrIQPNy23Klq25un2nkFVaLV3crQEQ_CaGU7UhG4M4h01NBKQJ__ziP_bwu7BCADP5WQf9ocWE-piDaYUNx_z1Q_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9zEhlbpNEfHY-AuiMNOlDLxiKs5O8wU6Q-HGnidyEihvA-WKuTsXxPKeRhsrWmXsaOEk4c8j87rLpFi63dh0fMGXmBZQjBCKgBOPhkjHowbabTPPJ84MKbtT64GwcYcsk4V7L-8HqOap1EFLj9DxdOUoOXGcmVOO9uT7BOin834MY-UZGbO56rA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...", "author": "灵枫历史阁", "pubDate": "2023-06-04 17:49:26" }, { "title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9hcsF-n47gQuRy0e9Yr0mNOs3CYncPzlszK9CJvS0lH3S0SeTk2yaoDvzg9ACC-gIlAA7WO-UEIS0LMOX7DAq_hoscBAwzHg7hlxDFXFzetAD-_KD0-hCBQLgvKP9eiodDKJvKnwZ0WkwQrD-EodvSwONeKcgqwu1qlUJUhk2iBVQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9mi7Ny_FFnhA35xtFluzDpc9Mnd4BayZPwaUQuq5PkS9hYHtYumuTWNuCI4e_8uEUZOc29w-gL7JAdZdAJr8mGthtpLK7cqq7OglLTOYQ_d9F82_zh1Z3SO7Pjy2TErlBkVhQbn5XNomsYV1ZA7Xf8Sh9hxqKbgYsuXsZeXhCXboC2Qmj7RgGwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...", "author": "城市知道温哥华", "pubDate": "2023-10-09 06:55:35" }, { - "title": "这几种套现方式钻了银行漏洞!竟没有被封…", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdzm-C344bMwleU6QxTGdVyFqXa8Fplpd9aAGWbb4TAN9RhbkWboIST0VbhdfgzrPfN6ym34UZ4cWeR3LKTWam7NRzPN8kJ4jjfXGR3kktRId9pcv9KYpkSnhvZ_qJL7JjiAor7BWcD3tYjgSrM5ii__7dKWW95dVBqtEv-jlnEYD8ierLzdRYuv3JbcJua58Xpeoi6bu8Tv4Cn9lOoZLP2Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=2E6D3BFD84FE0DC945406D5A3D8D90DE4654E7F8677D1709", - "description": "不过随着银行监管越来越严,很多卡友也受到了处罚,卡姐有个朋友,堪称“套现小行家”,用信用卡套现了5万元.仍然在银行保持...", - "author": "来谈钱", - "pubDate": "2024-03-17 18:02:42" + "title": "黑产利用光大银行漏洞,信用卡1万额度可提15万", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9BqvK6Z-gNoxdE3Z1UMK1yh6KokykBVd5aqVHSBL4qhwHmyxsIJ-rhoezSniIPwMSTzzfN9WS84y1gnqNKJT7WbhmaoboULN0288W2vjafoMy9Sy9-i6VClOpXjHAIDq1oc6nNNdwPQ1ysqG0V9ugFnvKoptJa0x2S9SuzsiQTlr0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", + "description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...", + "author": "可转债摊大饼", + "pubDate": "2018-05-26 13:15:31" } ], "支付漏洞": [ { "title": "史上最全移动支付漏洞案例 谁动了银行卡里的钱?", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgzjtdQnSq0TvpYxUSn2SWuSQM4RtqS0rAYm6SIZ_Y8Di1eENg0LGTN6UZDNPA5PaEiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgOTsSRz0nQ00TUwMBAIJ2LWq6e1bdhc6Lq8hJPgc9_8ruk899HhLU56D7-o7QYbF_iZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "雷锋网硬创公开课-移动支付漏洞案例@GeekPwn随着移动支付的普及,我们的生活变得越来越便利.我们甚至已经可以不带钱包、现...", "author": "GeekPwn", "pubDate": "2016-04-19 09:35:10" }, { "title": "手机支付漏洞已成盗刷之源!小编教你如何防范!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZGd3u2FRtBg_TPwWOr1utChU56Fq8cOajnpbA21TbCMRlHDkHEkzycMpeUPCA-4pxiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZAWN8qVBnpvQgp_1IxmUlipVisxxFjLhCrWaIgwh9rxuPTIk9hsOYS7KLSgGDqDXfiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...", "author": "电脑爱好者", "pubDate": "2016-05-20 17:30:26" }, { "title": "就一加手机支付漏洞讨论在线支付中的安全风险", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqcxtcMtoMGVI0FPHpPppGIPZ6N8Ry8WRM4dEwMyV7gNJejzSauxOOWCQQhHpymInuNtGHXfK3osV6y8Z2YTUAaW6mOqWu7JVEcsjFMvTzhv5UAckkOmnE22rCDCayYmfpA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVv4tUOz9mk7i35ahnk4wJ4gBkt60u4fwSX4pvTILJ4MV1MhMdhz2hK6VGJjBsQPvUdYg359zA9hdJ2vpxyUFwKCOpp54ysB73v7LjRQ1nacz2I7qH2LW_RdhWLv6O878UA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...", "author": "FreeBuf", "pubDate": "2018-02-12 19:17:27" }, { "title": "天融信:《电子支付漏洞报告》重磅发布!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9zWZZE-CJlhxBllPbnGftsuo2yzQQ7DoYaDAc35Wc1gHG4zEx24qN38avdW_nVTmJJasOsiGxpjAhLRLR_bWnYXSmQAJ4RYHZusjo8fsF3as-7bxMCRNYGBt2gP4F13EF2BVetJ1ic-KA3iBkc47k3waZ61g6kc6p3rW5u1uPassNGbbB75bUeA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9pwOF7W4LO9YG42hf3dXZ7wLt6ZXX2ax1DJBQkJYXQQZ2Ghq_9DpFokvj30buiTN-M248XSLRtNDu95gN6rV-oCl3EoPh7K2PfOGfax10mhaOz9VeLjIX9P3B9DOhIHwSI07Bkc5dqdgohKvssMgIIENslEQGQB6qpd86wVG0vTJAe0f8bRARvQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...", "author": "天融信", "pubDate": "2023-07-12 18:21:06" }, { "title": "银行卡免密支付漏洞这么大!", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DJNedgPdnBWItiB2hNdosImVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xb7RsigplhBUo_xhNO4jppq1LRZiE0127V9uNpApYrOpd7dWJLorCgjQt21IQKWxPiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xugmhPFf39qNiyzOA8nyyAhMUkUEAIKcD2qktE1GEASs6Yeb1pDEr6wdVlCoRH7zfiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...", "author": "犀牛生意经", "pubDate": "2016-08-29 09:23:44" }, { "title": "敏付科技存“支付漏洞”被约谈整改", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9ZG6ahmSu_TZtqLkv3mqVjj-0qnUDQGbIbLKGI3lkUNYD3QVubl9Q9uPOIrdYB-Goe_HVonN362zKOf3iI4fk0Acp47FblPvt4M5GW4TCy9es8t0XIeOITzENXDz4EVTsxYuoZGSM05JXTC6QorS_ZbXDgN3hd_aCZRpPBzAnE29j32-j2KiwUw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd90g7ytJnszwpoA2XHs14-DshlLc5NoF66KKS10bs5pCTls0RqriNvKevbnO3KqLBmiMM1smp5Gjsj_64n288Won2GJ2OZgpFZNV1FrZPPeKIyM_9ZK3WVdZRrwqu4LHqIsYeADMok3Cv-ffgsiuaLezybxOV590y8rSjRWG7ci2QtPujwwRB2Pw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...", "author": "支付之家网", "pubDate": "2022-01-24 08:00:21" }, - { - "title": "聚合支付漏洞被利用,新模式主犯获刑", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9kplfVXQebeHfZxhQ4pYSosUiELUgx_-egE2_6OaZMIGwTxmAQc6RsY3k1QC-YTOGcZZ2bM3Tid9EPPmnw1K2S6wchB0dB0GfAAO29TkBgnUmXcLybh-yLBVkyCSurjpOj9tdoocz-kxUrMl_1_2KpqRFL0D6g93EQD_NLMygZzz0OK9DLfgmPA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", - "description": "一些不法分子利用这一漏洞,通过搭建非法的支付通道,进行如信用卡套现、信用卡代还等非法活动,严重危害金融市场的稳定.信用...", - "author": "蓬博看支付", - "pubDate": "2024-12-10 12:00:18" - }, { "title": "利用支付漏洞套现1300万被判15年", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9TqUVhoJQx4ossYz4w_UeJ3L7oAZR8Z4AAVZt_7Vy-3g2rU5fmGOy_Xgwm5Tzklzx4lq-owNROYVnB0lcTKZnRREuFG6mTp-dhFEoI-_XQho4W-IkK57ivSR7_erNh1nU3HilLm2tdz7_6-uKAsofK0kvkjXafyOf88NRua3oSAo5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9OtUjCS5QQKGyCdvG4y99pRo-WqXYr6-ax5N0Jf357hkjlFfw28s2lHfJvTC3R4-g4Vtcsh5eJx4V8-tVXle8FIItaeKUkXaappFjFMl4mqMeskHOcOJwW8YI_v2U33hgGTXau5AOkvqkEQ4c6iHYbpc7TeD2tyWvL07C4C3Vb_QO8fIRwtipOg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...", "author": "支付百科", "pubDate": "2022-01-03 13:54:08" }, { "title": "某小程序的支付漏洞+任意地址删除", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9GU3OPDb_otSqQiEv8MR3-NGCLvsqrVRWAPiv9Wk6CinqHRXRRzfpTkGgPGCEeEIqyClz1EMAHPUktnugMohsXOs8oTkiEy4JH08zucA2JuYY1E4GoLNKjIumVKzvDtdIb7bBjJmb_hd5QGDTiv5a0vlqdAix_fBzlEfPY8Ym1_KjotuuiAmOIg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd91wWSLqcexsaWc-yS2fJ--ozdXJqgjj86FPU4WTzEtOVKzj7BokQtUN8n_eGfesnzmGAB8Em7yXuaEoB-2LUFCT4aSxx6GEqu7h6B6xOVQyke6My65F2w6R3NG0yNpno_ZHs_UN-ymwo-m3C6e-AKDULxiFrch55K8O-Z5kiqoSItPujwwRB2Pw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...", "author": "狐狸说安全", "pubDate": "2023-09-14 14:25:44" }, { "title": "从最近的微信支付看XXE漏洞", - "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3JcflSRgzbdUFxQ7Lsz-IJeU6QxTGdVyFqXa8Fplpd9LsR8mCWefbx3cRV0BDuy9-sdS8Et4AYhxzRiOWF_GvxKIWXmCO8iqSIGjvA8cRBT9cyf8EbLF5XocZLHa0NElvNOSTb7gjfMYezZnNj-RBSQGxQWzOeKs5UWmGELAwG3v2qgz-KRtuu4A640RVoCI4PkDSCfsq54aFTA8pFs_v0Cn9lOoZLP2Q..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=2E6D692FA8D221E6696F41761077C0B96A65F32B677D170F", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVsRR2i5XL2ATXVR0OJ9ZW3VvBSGZtjdT6ORbZ2QSNz6CkoHsAsYvqdz-fl66PY31qY_PcjMrBMtzQs7clvFSBdZVnk4ZyS3yYgllYE2mV7qzHiLciCJDfm_s46dn8Efgxg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...", "author": "FreeBuf", "pubDate": "2018-07-08 18:03:00" + }, + { + "title": "渗透测试之支付逻辑漏洞", + "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9II7Vh_mr6GjLFczSpmCFj5fRjzd-z69k9l3xUU8T-UAgP318sWFtg17m99svulstGUrPdpb6msrqD4IgbxNi4gCXJrw5GYzkc-H1kCIkyd9U8TrjirUCOSrMqHVIq14eVNYhNS2u4HC7ilu69LTuGQgedGth5C2sAiW1yIYOpK7S-e4Yz84xMA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", + "description": "支付逻辑漏洞分类:1、支付过程中可直接修改数据包中的支付金额这种漏洞应该是支付漏洞中最常见的,主要针对支付宝等需要第三...", + "author": "黑白之道", + "pubDate": "2020-05-03 10:23:30" } ] } \ No newline at end of file diff --git a/resources/db/github.db b/resources/db/github.db new file mode 100644 index 0000000..9a85eee Binary files /dev/null and b/resources/db/github.db differ diff --git a/resources/db/sougou-wx.db b/resources/db/sougou-wx.db new file mode 100644 index 0000000..bd1afa6 Binary files /dev/null and b/resources/db/sougou-wx.db differ diff --git a/resources/history/github.md b/resources/history/github.md index e69de29..f5ffd9e 100644 --- a/resources/history/github.md +++ b/resources/history/github.md @@ -0,0 +1,31 @@ +#### 大佬 su18 上传了一个新工具:[POC](https://github.com/su18/POC) +**项目描述**:收集整理漏洞EXP/POC,大部分漏洞来源网络,目前收集整理了1400多个poc/exp,长期更新。 +**上传时间**:2025-01-08 09:56:47 + +---------- +#### 大佬 su18 上传了一个新工具:[woodpecker-plugin-template](https://github.com/su18/woodpecker-plugin-template) +**项目描述**:woodpecker-plugin-template +**上传时间**:2024-12-13 16:47:27 + +---------- +#### 大佬 su18 上传了一个新工具:[closure-compiler](https://github.com/su18/closure-compiler) +**项目描述**:A JavaScript checker and optimizer. +**上传时间**:2024-12-08 13:13:17 + +---------- +#### 大佬 projectdiscovery 上传了一个新工具:[nuclei-templates-ai](https://github.com/projectdiscovery/nuclei-templates-ai) +**项目描述**:Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage 👾 +**上传时间**:2024-12-04 09:46:51 + +---------- +#### 大佬 projectdiscovery 上传了一个新工具:[nuclei-templates-test](https://github.com/projectdiscovery/nuclei-templates-test) +**项目描述**:Nuclei Templates test +**上传时间**:2024-11-18 18:30:37 + +---------- +#### 关键词【Python】发现新项目:[wxapkg_infosearch](https://github.com/GrassWorkshop/wxapkg_infosearch) +**项目描述**:一款微信小程序源码包信息收集工具,根据已有项目改编 +**上传时间**:2025-01-15 09:05:22 +**开发语言**:信息收集 **作者**:GrassWorkshop + +---------- diff --git a/resources/history/wx_news.md b/resources/history/wx_news.md index e69de29..3be9da9 100644 --- a/resources/history/wx_news.md +++ b/resources/history/wx_news.md @@ -0,0 +1,14 @@ +#### 文章:[抖音APP逆向:附带抓包与6神算法探索](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9c854Ys4If4OUfsVWxv1m1FOevAHzMpEp-bBVxcGEP4FWu2rRIo5DOiy12-5BsMFNV6Sya2FLqQaBunkDL_vkPmE8h17sIoR-Kc-ztQ_S2-Opa6TnS6aJq1cbrSNYZ9hWDGDWmKJUbXRNcYkVEoeQymnhCGtBRX7pgaIn3-AeUN_zAjcIGepUqA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72) +描述:走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必... +**上传时间**:2025-01-03 13:10:22 +**作者**:彪哥in讲py +**关键词**:APP逆向 + +---------------------------------------- +#### 文章:[APP逆向sign签名算法:Python实战指南](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9BFWAUHaIeovflPuJQwjMACirLwaa4ZDc_PA19BDpqx6zWZ2Zqm0u_hD-JaXB6KjOmTKDetHcQqRP5vqUhoVoODGop2kQDwoXCEjwq68bCoNh6DOZnTVbsguXGEFA2NShd4-zsHRToI51fFnTDh0nMaNKfL2_aAVocmGauHRr2wY6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72) +描述:在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准... +**上传时间**:2025-01-03 09:40:29 +**作者**:雷雷讲py +**关键词**:APP逆向 + +---------------------------------------- diff --git a/resources/log/app.log b/resources/log/app.log index e69de29..fef138d 100644 --- a/resources/log/app.log +++ b/resources/log/app.log @@ -0,0 +1,316 @@ +2025-01-15 10:19:21,951 - INFO - [31m[1mWARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.[0m + * Running on http://127.0.0.1:5000 +2025-01-15 10:19:21,951 - INFO - [33mPress CTRL+C to quit[0m +2025-01-15 10:19:21,951 - INFO - * Restarting with stat +2025-01-15 10:19:22,119 - WARNING - * Debugger is active! +2025-01-15 10:19:22,119 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:19:30,188 - INFO - ҳ +2025-01-15 10:19:30,196 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:30] "GET / HTTP/1.1" 200 - +2025-01-15 10:19:31,328 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:19:31,329 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:31] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:19:31,798 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:31] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:19:35,469 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:19:35,469 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:35] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:19:38,041 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:19:38,041 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:38] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:19:38,569 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:19:38,569 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:38] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:19:38,977 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:19:38,977 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:38] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:19:39,305 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:19:39,305 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:39] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:19:39,585 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:19:39,585 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:39] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:19:39,816 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:19:39,816 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:39] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:19:40,024 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:19:40,024 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:40] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:19:40,217 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:19:40,217 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:40] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:19:40,385 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:19:40,385 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:40] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:19:40,577 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:19:40,577 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:40] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:19:40,768 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:19:40,768 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:40] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:19:40,977 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:19:40,977 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:40] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:19:41,185 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:19:41,185 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:41] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:19:46,954 - INFO - Դ־ļ: e:\Self-Tool-Code\PyBot\resources\log\core.log +2025-01-15 10:19:46,956 - INFO - 127.0.0.1 - - [15/Jan/2025 10:19:46] "GET /log HTTP/1.1" 200 - +2025-01-15 10:31:52,205 - INFO - [31m[1mWARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.[0m + * Running on http://127.0.0.1:5000 +2025-01-15 10:31:52,205 - INFO - [33mPress CTRL+C to quit[0m +2025-01-15 10:31:52,205 - INFO - * Restarting with stat +2025-01-15 10:31:52,380 - WARNING - * Debugger is active! +2025-01-15 10:31:52,384 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:31:55,998 - INFO - Դ־ļ: e:\Self-Tool-Code\PyBot\resources\log\core.log +2025-01-15 10:31:56,004 - INFO - 127.0.0.1 - - [15/Jan/2025 10:31:56] "GET /log HTTP/1.1" 200 - +2025-01-15 10:32:28,110 - INFO - ԴWebӦ־ļ: e:\Self-Tool-Code\PyBot\resources\log\app.log +2025-01-15 10:32:28,116 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:28] "[35m[1mGET /weblog HTTP/1.1[0m" 500 - +2025-01-15 10:32:28,395 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:28] "GET /weblog?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1" 200 - +2025-01-15 10:32:28,395 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:28] "GET /weblog?__debugger__=yes&cmd=resource&f=style.css HTTP/1.1" 200 - +2025-01-15 10:32:28,416 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:28] "GET /weblog?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1" 200 - +2025-01-15 10:32:28,472 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:28] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:32:28,480 - INFO - ҳ +2025-01-15 10:32:28,482 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:28] "GET /?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1" 200 - +2025-01-15 10:32:50,531 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:32:50,550 - INFO - * Restarting with stat +2025-01-15 10:32:50,739 - WARNING - * Debugger is active! +2025-01-15 10:32:50,743 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:32:52,742 - INFO - ԴWebӦ־ļ: e:\Self-Tool-Code\PyBot\resources\log\app.log +2025-01-15 10:32:52,758 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:52] "[35m[1mGET /weblog HTTP/1.1[0m" 500 - +2025-01-15 10:32:52,997 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:52] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=style.css HTTP/1.1[0m" 304 - +2025-01-15 10:32:52,997 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:52] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1[0m" 304 - +2025-01-15 10:32:53,018 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:53] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:32:53,071 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:53] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:32:53,077 - INFO - ҳ +2025-01-15 10:32:53,079 - INFO - 127.0.0.1 - - [15/Jan/2025 10:32:53] "GET /?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1" 200 - +2025-01-15 10:32:59,768 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:32:59,783 - INFO - * Restarting with stat +2025-01-15 10:32:59,941 - WARNING - * Debugger is active! +2025-01-15 10:32:59,957 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:33:08,982 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:33:09,004 - INFO - * Restarting with stat +2025-01-15 10:33:09,146 - WARNING - * Debugger is active! +2025-01-15 10:33:09,146 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:33:13,652 - INFO - ԴWebӦ־ļ: e:\Self-Tool-Code\PyBot\resources\log\app.log +2025-01-15 10:33:13,652 - INFO - 127.0.0.1 - - [15/Jan/2025 10:33:13] "GET /weblog HTTP/1.1" 200 - +2025-01-15 10:33:31,896 - INFO - Դ־ļ: e:\Self-Tool-Code\PyBot\resources\log\core.log +2025-01-15 10:33:31,900 - INFO - 127.0.0.1 - - [15/Jan/2025 10:33:31] "[35m[1mGET /log HTTP/1.1[0m" 500 - +2025-01-15 10:33:32,138 - INFO - 127.0.0.1 - - [15/Jan/2025 10:33:32] "GET /log?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1" 200 - +2025-01-15 10:33:32,139 - INFO - 127.0.0.1 - - [15/Jan/2025 10:33:32] "GET /log?__debugger__=yes&cmd=resource&f=style.css HTTP/1.1" 200 - +2025-01-15 10:33:32,146 - INFO - 127.0.0.1 - - [15/Jan/2025 10:33:32] "GET /log?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1" 200 - +2025-01-15 10:33:32,199 - INFO - 127.0.0.1 - - [15/Jan/2025 10:33:32] "[36mGET /log?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:33:32,204 - INFO - ҳ +2025-01-15 10:33:32,206 - INFO - 127.0.0.1 - - [15/Jan/2025 10:33:32] "GET /?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1" 200 - +2025-01-15 10:34:03,315 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:34:03,341 - INFO - * Restarting with stat +2025-01-15 10:34:03,506 - WARNING - * Debugger is active! +2025-01-15 10:34:03,510 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:34:28,064 - INFO - Դ־ļ: e:\Self-Tool-Code\PyBot\resources\log\core.log +2025-01-15 10:34:28,074 - INFO - 127.0.0.1 - - [15/Jan/2025 10:34:28] "[35m[1mGET /log HTTP/1.1[0m" 500 - +2025-01-15 10:34:28,363 - INFO - 127.0.0.1 - - [15/Jan/2025 10:34:28] "[36mGET /log?__debugger__=yes&cmd=resource&f=style.css HTTP/1.1[0m" 304 - +2025-01-15 10:34:28,363 - INFO - 127.0.0.1 - - [15/Jan/2025 10:34:28] "[36mGET /log?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1[0m" 304 - +2025-01-15 10:34:28,375 - INFO - 127.0.0.1 - - [15/Jan/2025 10:34:28] "[36mGET /log?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:34:28,439 - INFO - 127.0.0.1 - - [15/Jan/2025 10:34:28] "[36mGET /log?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:34:28,600 - INFO - ҳ +2025-01-15 10:34:28,603 - INFO - 127.0.0.1 - - [15/Jan/2025 10:34:28] "GET /?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1" 200 - +2025-01-15 10:34:53,674 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:34:53,681 - INFO - * Restarting with stat +2025-01-15 10:34:53,851 - WARNING - * Debugger is active! +2025-01-15 10:34:53,851 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:35:52,060 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:35:52,077 - INFO - * Restarting with stat +2025-01-15 10:35:52,243 - WARNING - * Debugger is active! +2025-01-15 10:35:52,243 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:35:54,471 - INFO - Դ־ļ: e:\Self-Tool-Code\PyBot\resources\log\core.log +2025-01-15 10:35:54,471 - INFO - 127.0.0.1 - - [15/Jan/2025 10:35:54] "GET /log HTTP/1.1" 200 - +2025-01-15 10:36:02,686 - INFO - ԴWebӦ־ļ: e:\Self-Tool-Code\PyBot\resources\log\app.log +2025-01-15 10:36:02,691 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:02] "[35m[1mGET /weblog HTTP/1.1[0m" 500 - +2025-01-15 10:36:02,928 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:02] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=style.css HTTP/1.1[0m" 304 - +2025-01-15 10:36:02,938 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:02] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1[0m" 304 - +2025-01-15 10:36:02,944 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:02] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:36:02,999 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:02] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:36:03,004 - INFO - ҳ +2025-01-15 10:36:03,005 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:03] "GET /?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1" 200 - +2025-01-15 10:36:27,336 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:36:27,354 - INFO - * Restarting with stat +2025-01-15 10:36:27,520 - WARNING - * Debugger is active! +2025-01-15 10:36:27,520 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:36:38,732 - INFO - ԴWebӦ־ļ: e:\Self-Tool-Code\PyBot\resources\log\app.log +2025-01-15 10:36:38,732 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:38] "[35m[1mGET /weblog HTTP/1.1[0m" 500 - +2025-01-15 10:36:39,005 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:39] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1[0m" 304 - +2025-01-15 10:36:39,005 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:39] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=style.css HTTP/1.1[0m" 304 - +2025-01-15 10:36:39,028 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:39] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:36:39,087 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:39] "[36mGET /weblog?__debugger__=yes&cmd=resource&f=console.png HTTP/1.1[0m" 304 - +2025-01-15 10:36:39,235 - INFO - ҳ +2025-01-15 10:36:39,237 - INFO - 127.0.0.1 - - [15/Jan/2025 10:36:39] "GET /?__debugger__=yes&cmd=resource&f=debugger.js HTTP/1.1" 200 - +2025-01-15 10:37:00,599 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:37:00,607 - INFO - * Restarting with stat +2025-01-15 10:37:00,773 - WARNING - * Debugger is active! +2025-01-15 10:37:00,773 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:37:02,151 - INFO - ԴWebӦ־ļ: e:\Self-Tool-Code\PyBot\resources\log\app.log +2025-01-15 10:37:02,151 - INFO - 127.0.0.1 - - [15/Jan/2025 10:37:02] "GET /weblog HTTP/1.1" 200 - +2025-01-15 10:37:41,500 - INFO - ҳ +2025-01-15 10:37:41,502 - INFO - 127.0.0.1 - - [15/Jan/2025 10:37:41] "GET / HTTP/1.1" 200 - +2025-01-15 10:37:41,563 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:37:41,563 - INFO - 127.0.0.1 - - [15/Jan/2025 10:37:41] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:37:45,931 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:37:45,931 - INFO - 127.0.0.1 - - [15/Jan/2025 10:37:45] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:37:47,322 - INFO - Դٶʷļ: e:\Self-Tool-Code\PyBot\resources\history\baidu_news.md +2025-01-15 10:37:47,322 - INFO - 127.0.0.1 - - [15/Jan/2025 10:37:47] "GET /get-baidu-news HTTP/1.1" 200 - +2025-01-15 10:37:48,338 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:37:48,338 - INFO - 127.0.0.1 - - [15/Jan/2025 10:37:48] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:37:56,235 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\wx_news.md +2025-01-15 10:37:56,235 - INFO - 127.0.0.1 - - [15/Jan/2025 10:37:56] "GET /get-wx-news HTTP/1.1" 200 - +2025-01-15 10:38:02,107 - INFO - Դٶʷļ: e:\Self-Tool-Code\PyBot\resources\history\baidu_news.md +2025-01-15 10:38:02,107 - INFO - 127.0.0.1 - - [15/Jan/2025 10:38:02] "GET /get-baidu-news HTTP/1.1" 200 - +2025-01-15 10:38:03,250 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:38:03,250 - INFO - 127.0.0.1 - - [15/Jan/2025 10:38:03] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:38:04,034 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:38:04,034 - INFO - 127.0.0.1 - - [15/Jan/2025 10:38:04] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:38:05,131 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:38:05,131 - INFO - 127.0.0.1 - - [15/Jan/2025 10:38:05] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:39:43,155 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:39:43,155 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:43] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:39:43,826 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:39:43,826 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:43] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:39:44,571 - INFO - Դٶʷļ: e:\Self-Tool-Code\PyBot\resources\history\baidu_news.md +2025-01-15 10:39:44,571 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:44] "GET /get-baidu-news HTTP/1.1" 200 - +2025-01-15 10:39:45,346 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:39:45,346 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:45] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:39:46,011 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\wx_news.md +2025-01-15 10:39:46,011 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:46] "GET /get-wx-news HTTP/1.1" 200 - +2025-01-15 10:39:46,739 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:39:46,739 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:46] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:39:49,491 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\wx_news.md +2025-01-15 10:39:49,491 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:49] "GET /get-wx-news HTTP/1.1" 200 - +2025-01-15 10:39:55,812 - INFO - Դٶʷļ: e:\Self-Tool-Code\PyBot\resources\history\baidu_news.md +2025-01-15 10:39:55,812 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:55] "GET /get-baidu-news HTTP/1.1" 200 - +2025-01-15 10:39:56,562 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:39:56,564 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:56] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:39:57,002 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:39:57,002 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:57] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:39:57,467 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:39:57,467 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:57] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:39:57,769 - INFO - Դٶʷļ: e:\Self-Tool-Code\PyBot\resources\history\baidu_news.md +2025-01-15 10:39:57,769 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:57] "GET /get-baidu-news HTTP/1.1" 200 - +2025-01-15 10:39:58,122 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:39:58,122 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:58] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:39:58,667 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\wx_news.md +2025-01-15 10:39:58,667 - INFO - 127.0.0.1 - - [15/Jan/2025 10:39:58] "GET /get-wx-news HTTP/1.1" 200 - +2025-01-15 10:40:26,089 - INFO - ҳ +2025-01-15 10:40:26,089 - INFO - 127.0.0.1 - - [15/Jan/2025 10:40:26] "GET / HTTP/1.1" 200 - +2025-01-15 10:40:30,767 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:40:30,768 - INFO - 127.0.0.1 - - [15/Jan/2025 10:40:30] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:40:32,210 - INFO - 127.0.0.1 - - [15/Jan/2025 10:40:32] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:40:33,485 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\tech_passage.md +2025-01-15 10:40:33,485 - INFO - 127.0.0.1 - - [15/Jan/2025 10:40:33] "GET /get-tech-passage HTTP/1.1" 200 - +2025-01-15 10:40:34,187 - INFO - Դٶʷļ: e:\Self-Tool-Code\PyBot\resources\history\baidu_news.md +2025-01-15 10:40:34,187 - INFO - 127.0.0.1 - - [15/Jan/2025 10:40:34] "GET /get-baidu-news HTTP/1.1" 200 - +2025-01-15 10:40:34,915 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:40:34,915 - INFO - 127.0.0.1 - - [15/Jan/2025 10:40:34] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:41:25,868 - INFO - [31m[1mWARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.[0m + * Running on http://127.0.0.1:5000 +2025-01-15 10:41:25,869 - INFO - [33mPress CTRL+C to quit[0m +2025-01-15 10:41:25,870 - INFO - * Restarting with stat +2025-01-15 10:41:26,031 - WARNING - * Debugger is active! +2025-01-15 10:41:26,035 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:41:28,785 - INFO - ҳ +2025-01-15 10:41:28,787 - INFO - 127.0.0.1 - - [15/Jan/2025 10:41:28] "GET / HTTP/1.1" 200 - +2025-01-15 10:41:28,839 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:41:28,839 - INFO - 127.0.0.1 - - [15/Jan/2025 10:41:28] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:41:30,509 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:41:30,510 - INFO - 127.0.0.1 - - [15/Jan/2025 10:41:30] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:44:14,440 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:44:14,458 - INFO - * Restarting with stat +2025-01-15 10:44:14,628 - WARNING - * Debugger is active! +2025-01-15 10:44:14,632 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:49:41,358 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:49:41,371 - INFO - * Restarting with stat +2025-01-15 10:49:41,547 - WARNING - * Debugger is active! +2025-01-15 10:49:41,550 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:49:49,573 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:49:49,594 - INFO - * Restarting with stat +2025-01-15 10:49:49,753 - WARNING - * Debugger is active! +2025-01-15 10:49:49,756 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:50:06,796 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:50:06,809 - INFO - * Restarting with stat +2025-01-15 10:50:06,967 - WARNING - * Debugger is active! +2025-01-15 10:50:06,983 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:50:20,016 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:50:20,041 - INFO - * Restarting with stat +2025-01-15 10:50:20,202 - WARNING - * Debugger is active! +2025-01-15 10:50:20,206 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:50:41,828 - INFO - [31m[1mWARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.[0m + * Running on http://127.0.0.1:5000 +2025-01-15 10:50:41,828 - INFO - [33mPress CTRL+C to quit[0m +2025-01-15 10:50:41,829 - INFO - * Restarting with stat +2025-01-15 10:50:41,989 - WARNING - * Debugger is active! +2025-01-15 10:50:42,005 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:50:44,977 - INFO - ҳ +2025-01-15 10:50:44,977 - INFO - 127.0.0.1 - - [15/Jan/2025 10:50:44] "GET / HTTP/1.1" 200 - +2025-01-15 10:50:45,047 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:50:45,047 - INFO - 127.0.0.1 - - [15/Jan/2025 10:50:45] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:50:47,188 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:50:47,188 - INFO - 127.0.0.1 - - [15/Jan/2025 10:50:47] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:51:11,628 - INFO - ҳ +2025-01-15 10:51:11,628 - INFO - 127.0.0.1 - - [15/Jan/2025 10:51:11] "GET / HTTP/1.1" 200 - +2025-01-15 10:52:55,338 - INFO - ҳ +2025-01-15 10:52:55,338 - INFO - 127.0.0.1 - - [15/Jan/2025 10:52:55] "GET / HTTP/1.1" 200 - +2025-01-15 10:52:56,822 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:52:56,823 - INFO - 127.0.0.1 - - [15/Jan/2025 10:52:56] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:52:58,209 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:52:58,209 - INFO - 127.0.0.1 - - [15/Jan/2025 10:52:58] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:53:27,380 - INFO - [31m[1mWARNING: This is a development server. Do not use it in a production deployment. Use a production WSGI server instead.[0m + * Running on http://127.0.0.1:5000 +2025-01-15 10:53:27,380 - INFO - [33mPress CTRL+C to quit[0m +2025-01-15 10:53:27,380 - INFO - * Restarting with stat +2025-01-15 10:53:27,547 - WARNING - * Debugger is active! +2025-01-15 10:53:27,547 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:53:30,325 - INFO - ҳ +2025-01-15 10:53:30,328 - INFO - 127.0.0.1 - - [15/Jan/2025 10:53:30] "GET / HTTP/1.1" 200 - +2025-01-15 10:53:31,491 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:53:31,492 - INFO - 127.0.0.1 - - [15/Jan/2025 10:53:31] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:53:31,888 - INFO - 127.0.0.1 - - [15/Jan/2025 10:53:31] "[33mGET /static/favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:54:17,749 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:54:17,771 - INFO - * Restarting with stat +2025-01-15 10:54:17,930 - WARNING - * Debugger is active! +2025-01-15 10:54:17,933 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:54:20,908 - INFO - ҳ +2025-01-15 10:54:20,912 - INFO - 127.0.0.1 - - [15/Jan/2025 10:54:20] "GET / HTTP/1.1" 200 - +2025-01-15 10:54:21,912 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:54:21,913 - INFO - 127.0.0.1 - - [15/Jan/2025 10:54:21] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:54:31,567 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:54:31,567 - INFO - 127.0.0.1 - - [15/Jan/2025 10:54:31] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:54:55,273 - INFO - ҳ +2025-01-15 10:54:55,273 - INFO - 127.0.0.1 - - [15/Jan/2025 10:54:55] "GET / HTTP/1.1" 200 - +2025-01-15 10:54:56,226 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:54:56,226 - INFO - 127.0.0.1 - - [15/Jan/2025 10:54:56] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:54:56,640 - INFO - 127.0.0.1 - - [15/Jan/2025 10:54:56] "[33mGET /static/favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:54:58,021 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:54:58,021 - INFO - 127.0.0.1 - - [15/Jan/2025 10:54:58] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 10:55:09,953 - INFO - 127.0.0.1 - - [15/Jan/2025 10:55:09] "[33mGET /static/favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:55:10,267 - INFO - 127.0.0.1 - - [15/Jan/2025 10:55:10] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:56:09,173 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:56:09,189 - INFO - * Restarting with stat +2025-01-15 10:56:09,358 - WARNING - * Debugger is active! +2025-01-15 10:56:09,358 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:56:12,610 - INFO - 127.0.0.1 - - [15/Jan/2025 10:56:12] "[33mGET /static/favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:56:21,177 - INFO - 127.0.0.1 - - [15/Jan/2025 10:56:21] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:56:31,416 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:56:31,440 - INFO - * Restarting with stat +2025-01-15 10:56:31,596 - WARNING - * Debugger is active! +2025-01-15 10:56:31,600 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:57:57,879 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:57:57,900 - INFO - * Restarting with stat +2025-01-15 10:57:58,047 - WARNING - * Debugger is active! +2025-01-15 10:57:58,047 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:58:39,569 - INFO - 127.0.0.1 - - [15/Jan/2025 10:58:39] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:58:40,057 - INFO - 127.0.0.1 - - [15/Jan/2025 10:58:40] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:58:40,309 - INFO - 127.0.0.1 - - [15/Jan/2025 10:58:40] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:58:40,557 - INFO - 127.0.0.1 - - [15/Jan/2025 10:58:40] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:58:40,753 - INFO - 127.0.0.1 - - [15/Jan/2025 10:58:40] "[33mGET /favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:58:44,306 - INFO - 127.0.0.1 - - [15/Jan/2025 10:58:44] "[33mGET /static/favicon.ico HTTP/1.1[0m" 404 - +2025-01-15 10:59:25,233 - INFO - * Detected change in 'e:\\Self-Tool-Code\\PyBot\\web\\app.py', reloading +2025-01-15 10:59:25,254 - INFO - * Restarting with stat +2025-01-15 10:59:25,414 - WARNING - * Debugger is active! +2025-01-15 10:59:25,417 - INFO - * Debugger PIN: 177-640-518 +2025-01-15 10:59:28,366 - INFO - 127.0.0.1 - - [15/Jan/2025 10:59:28] "GET /static/favicon.ico HTTP/1.1" 200 - +2025-01-15 10:59:33,459 - INFO - ҳ +2025-01-15 10:59:33,461 - INFO - 127.0.0.1 - - [15/Jan/2025 10:59:33] "GET / HTTP/1.1" 200 - +2025-01-15 10:59:34,361 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 10:59:34,362 - INFO - 127.0.0.1 - - [15/Jan/2025 10:59:34] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 10:59:53,927 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\wx_news.md +2025-01-15 10:59:53,928 - INFO - 127.0.0.1 - - [15/Jan/2025 10:59:53] "GET /get-wx-news HTTP/1.1" 200 - +2025-01-15 10:59:54,854 - INFO - ԴGitHubʷļ: e:\Self-Tool-Code\PyBot\resources\history\github.md +2025-01-15 10:59:54,855 - INFO - 127.0.0.1 - - [15/Jan/2025 10:59:54] "GET /get-github-news HTTP/1.1" 200 - +2025-01-15 11:00:12,588 - INFO - ҳ +2025-01-15 11:00:12,588 - INFO - 127.0.0.1 - - [15/Jan/2025 11:00:12] "GET / HTTP/1.1" 200 - +2025-01-15 11:00:21,321 - INFO - Դȫʷļ: e:\Self-Tool-Code\PyBot\resources\history\sec_news.md +2025-01-15 11:00:21,321 - INFO - 127.0.0.1 - - [15/Jan/2025 11:00:21] "GET /get-sec-news HTTP/1.1" 200 - +2025-01-15 11:00:21,708 - INFO - 127.0.0.1 - - [15/Jan/2025 11:00:21] "GET /static/favicon.ico HTTP/1.1" 200 - +2025-01-15 11:00:23,182 - INFO - Դʷļ: e:\Self-Tool-Code\PyBot\resources\history\wx_news.md +2025-01-15 11:00:23,198 - INFO - 127.0.0.1 - - [15/Jan/2025 11:00:23] "GET /get-wx-news HTTP/1.1" 200 - diff --git a/resources/log/core.log b/resources/log/core.log index e69de29..f51fd72 100644 --- a/resources/log/core.log +++ b/resources/log/core.log @@ -0,0 +1,75 @@ +2025-01-15 10:24:33 - INFO - __main__::279 - 程序正在运行当中。 +2025-01-15 10:24:43 - INFO - __main__:send_first_message:255 - 飞书发送 程序信息 成功 +2025-01-15 10:24:44 - INFO - __main__:send_first_message:257 - 飞书发送 首次运行提醒 成功 +2025-01-15 10:24:44 - INFO - __main__:main_job:195 - 发送程序启动,当前时间为:2025-01-15 10:24:44 +2025-01-15 10:24:44 - INFO - __main__:main_job:196 - 正在启动各爬虫并获取资源中... +2025-01-15 10:24:45 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【银行测试】的微信公众号-Sogou搜索内容保存成功。 +2025-01-15 10:24:50 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【APP逆向】的微信公众号-Sogou搜索内容保存成功。 +2025-01-15 10:24:56 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【渗透测试】的微信公众号-Sogou搜索内容保存成功。 +2025-01-15 10:25:01 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【手机银行漏洞】的微信公众号-Sogou搜索内容保存成功。 +2025-01-15 10:25:07 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【银行漏洞】的微信公众号-Sogou搜索内容保存成功。 +2025-01-15 10:25:12 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【支付漏洞】的微信公众号-Sogou搜索内容保存成功。 +2025-01-15 10:25:18 - INFO - __main__:check_avaliable:65 - 飞书发送 微信公众号关键词相关内容 成功 +2025-01-15 10:25:33 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【sql注入】获取开始。 +2025-01-15 10:25:39 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【cnvd】获取开始。 +2025-01-15 10:25:45 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【未授权】获取开始。 +2025-01-15 10:25:52 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【漏洞POC】获取开始。 +2025-01-15 10:25:59 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【RCE】获取开始。 +2025-01-15 10:26:05 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【渗透测试】获取开始。 +2025-01-15 10:26:11 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【反序列化】获取开始。 +2025-01-15 10:26:17 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【攻防】获取开始。 +2025-01-15 10:26:24 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【webshell】获取开始。 +2025-01-15 10:26:31 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【红队】获取开始。 +2025-01-15 10:26:37 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【redteam】获取开始。 +2025-01-15 10:26:44 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【信息收集】获取开始。 +2025-01-15 10:26:50 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【绕过】获取开始。 +2025-01-15 10:26:56 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【bypass av】获取开始。 +2025-01-15 10:27:02 - INFO - spider.github:github_main_repo:108 - github_repo:项目【BeichenDream/Godzilla】更新情况获取开始。 +2025-01-15 10:27:08 - INFO - spider.github:github_main_repo:108 - github_repo:项目【rebeyond/Behinder】更新情况获取开始。 +2025-01-15 10:27:14 - INFO - spider.github:github_main_repo:108 - github_repo:项目【AntSwordProject/antSword】更新情况获取开始。 +2025-01-15 10:27:19 - INFO - spider.github:github_main_repo:108 - github_repo:项目【j1anFen/shiro_attack】更新情况获取开始。 +2025-01-15 10:27:20 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1 +2025-01-15 10:27:25 - INFO - spider.github:github_main_repo:108 - github_repo:项目【yhy0/github-cve-monitor】更新情况获取开始。 +2025-01-15 10:27:31 - INFO - spider.github:github_main_repo:108 - github_repo:项目【gentilkiwi/mimikatz】更新情况获取开始。 +2025-01-15 10:27:37 - INFO - spider.github:github_main_repo:108 - github_repo:项目【ehang-io/nps】更新情况获取开始。 +2025-01-15 10:27:43 - INFO - spider.github:github_main_repo:108 - github_repo:项目【chaitin/xray】更新情况获取开始。 +2025-01-15 10:27:48 - INFO - spider.github:github_main_repo:108 - github_repo:项目【FunnyWolf/pystinger】更新情况获取开始。 +2025-01-15 10:27:54 - INFO - spider.github:github_main_repo:108 - github_repo:项目【L-codes/Neo-reGeorg】更新情况获取开始。 +2025-01-15 10:28:00 - INFO - spider.github:github_main_repo:108 - github_repo:项目【shadow1ng/fscan】更新情况获取开始。 +2025-01-15 10:28:05 - INFO - spider.github:github_main_repo:108 - github_repo:项目【SafeGroceryStore/MDUT】更新情况获取开始。 +2025-01-15 10:28:11 - INFO - spider.github:github_main_repo:108 - github_repo:项目【EdgeSecurityTeam/Vulnerability】更新情况获取开始。 +2025-01-15 10:28:12 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1 +2025-01-15 10:28:17 - INFO - spider.github:github_main_repo:108 - github_repo:项目【Vme18000yuan/FreePOC】更新情况获取开始。 +2025-01-15 10:28:23 - INFO - spider.github:github_main_repo:108 - github_repo:项目【wy876/POC】更新情况获取开始。 +2025-01-15 10:28:28 - INFO - spider.github:github_main_release:153 - github_repo:项目【BeichenDream/Godzilla】发版情况获取开始。 +2025-01-15 10:28:34 - INFO - spider.github:github_main_release:153 - github_repo:项目【rebeyond/Behinder】发版情况获取开始。 +2025-01-15 10:28:40 - INFO - spider.github:github_main_release:153 - github_repo:项目【AntSwordProject/antSword】发版情况获取开始。 +2025-01-15 10:28:46 - INFO - spider.github:github_main_release:153 - github_repo:项目【j1anFen/shiro_attack】发版情况获取开始。 +2025-01-15 10:28:46 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1 +2025-01-15 10:28:51 - INFO - spider.github:github_main_release:153 - github_repo:项目【yhy0/github-cve-monitor】发版情况获取开始。 +2025-01-15 10:28:52 - WARNING - spider.github:github_main_release:160 - github_repo:项目【yhy0/github-cve-monitor】不存在版本发布情况。 +2025-01-15 10:28:57 - INFO - spider.github:github_main_release:153 - github_repo:项目【gentilkiwi/mimikatz】发版情况获取开始。 +2025-01-15 10:29:03 - INFO - spider.github:github_main_release:153 - github_repo:项目【ehang-io/nps】发版情况获取开始。 +2025-01-15 10:29:09 - INFO - spider.github:github_main_release:153 - github_repo:项目【chaitin/xray】发版情况获取开始。 +2025-01-15 10:29:14 - INFO - spider.github:github_main_release:153 - github_repo:项目【FunnyWolf/pystinger】发版情况获取开始。 +2025-01-15 10:29:20 - INFO - spider.github:github_main_release:153 - github_repo:项目【L-codes/Neo-reGeorg】发版情况获取开始。 +2025-01-15 10:29:26 - INFO - spider.github:github_main_release:153 - github_repo:项目【shadow1ng/fscan】发版情况获取开始。 +2025-01-15 10:29:32 - INFO - spider.github:github_main_release:153 - github_repo:项目【SafeGroceryStore/MDUT】发版情况获取开始。 +2025-01-15 10:29:37 - INFO - spider.github:github_main_release:153 - github_repo:项目【EdgeSecurityTeam/Vulnerability】发版情况获取开始。 +2025-01-15 10:29:38 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1 +2025-01-15 10:29:43 - INFO - spider.github:github_main_release:153 - github_repo:项目【Vme18000yuan/FreePOC】发版情况获取开始。 +2025-01-15 10:29:44 - WARNING - spider.github:github_main_release:160 - github_repo:项目【Vme18000yuan/FreePOC】不存在版本发布情况。 +2025-01-15 10:29:49 - INFO - spider.github:github_main_release:153 - github_repo:项目【wy876/POC】发版情况获取开始。 +2025-01-15 10:29:55 - INFO - spider.github:github_main_user:188 - github_user:作者【su18】更新情况获取开始。 +2025-01-15 10:30:00 - INFO - spider.github:github_main_user:188 - github_user:作者【BeichenDream】更新情况获取开始。 +2025-01-15 10:30:06 - INFO - spider.github:github_main_user:188 - github_user:作者【phith0n】更新情况获取开始。 +2025-01-15 10:30:12 - INFO - spider.github:github_main_user:188 - github_user:作者【zhzyker】更新情况获取开始。 +2025-01-15 10:30:18 - INFO - spider.github:github_main_user:188 - github_user:作者【lijiejie】更新情况获取开始。 +2025-01-15 10:30:23 - INFO - spider.github:github_main_user:188 - github_user:作者【projectdiscovery】更新情况获取开始。 +2025-01-15 10:30:29 - INFO - spider.github:github_main_user:188 - github_user:作者【HavocFramework】更新情况获取开始。 +2025-01-15 10:30:36 - INFO - __main__:check_avaliable:65 - 飞书发送 Github项目监控-关键词监控 成功 +2025-01-15 10:30:51 - INFO - __main__:check_avaliable:88 - Github项目监控-项目更新情况数据为空,跳过执行。 +2025-01-15 10:30:51 - INFO - __main__:check_avaliable:65 - 飞书发送 Github项目监控-大佬工具 成功 +2025-01-15 10:31:06 - INFO - __main__:check_avaliable:88 - Github项目监控-项目版本发布监测数据为空,跳过执行。 +2025-01-15 10:31:06 - INFO - __main__:main_job:205 - 单次运行结束,等待下一次运行... +2025-01-15 10:31:50 - INFO - __main__:signal_handler:51 - 接收到退出信号,程序即将退出... diff --git a/spider/__pycache__/baidu.cpython-312.pyc b/spider/__pycache__/baidu.cpython-312.pyc new file mode 100644 index 0000000..bb5d3d6 Binary files /dev/null and b/spider/__pycache__/baidu.cpython-312.pyc differ diff --git a/spider/github.py b/spider/github.py index f34218a..d338d04 100644 --- a/spider/github.py +++ b/spider/github.py @@ -57,7 +57,7 @@ def github_main_keyword(key, black_words): api_node = "https://api.github.com/search/repositories?q={}&sort=updated&per_page=20".format(keyword) result = fetch_rss(api_node) if result == None: - time.sleep(5) + time.sleep(1) continue n = len(result['items']) for i in range(0, n): @@ -96,7 +96,7 @@ def github_main_keyword(key, black_words): } # print(project_info) all_results.append(project_info) - time.sleep(5) + time.sleep(1) # 将所有结果写入JSON文件 save_to_json(all_results, './resources/JSON/github_keyword.json') @@ -109,7 +109,7 @@ def github_main_repo(key): api_node = "https://api.github.com/repos/{}/commits?per_page=1".format(keyword) result = fetch_rss(api_node) if result == None: - time.sleep(5) + time.sleep(1) continue commit = result[0] # 获取最新的提交记录 @@ -142,7 +142,7 @@ def github_main_repo(key): } # print(project_info) all_results.append(project_info) - time.sleep(5) + time.sleep(1) # 将所有结果写入JSON文件 save_to_json(all_results, './resources/JSON/github_repo.json') @@ -154,11 +154,11 @@ def github_main_release(key): api_node = "https://api.github.com/repos/{}/releases?per_page=1".format(keyword) result = fetch_rss(api_node) if result == None: - time.sleep(5) + time.sleep(1) continue if not result: logger.warning(f"github_repo:项目【{keyword}】不存在版本发布情况。") - time.sleep(5) + time.sleep(1) continue # print(result) @@ -177,7 +177,7 @@ def github_main_release(key): } # print(project_info) all_results.append(project_info) - time.sleep(5) + time.sleep(1) # 将所有结果写入JSON文件 save_to_json(all_results, './resources/JSON/github_release.json') @@ -189,7 +189,7 @@ def github_main_user(key, black_words): api_node = "https://api.github.com/users/{}/repos?sort=created&per_page=10".format(keyword) result = fetch_rss(api_node) if result == None: - time.sleep(5) + time.sleep(1) continue for i in range(0, len(result)): description = result[i]['description'] @@ -227,7 +227,7 @@ def github_main_user(key, black_words): } # print(project_info) all_results.append(project_info) - time.sleep(5) + time.sleep(1) # 将所有结果写入JSON文件 save_to_json(all_results, './resources/JSON/github_user.json') diff --git a/web/app.py b/web/app.py index 6e2d947..87c224a 100644 --- a/web/app.py +++ b/web/app.py @@ -1,4 +1,5 @@ from flask import Flask, jsonify, render_template +from flask import send_from_directory from collections import deque import os import logging @@ -10,6 +11,9 @@ BASE_DIR = os.path.dirname(os.path.abspath(__file__)) PARENT_DIR = os.path.dirname(BASE_DIR) # 上一个文件夹 SEC_NEWS_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'sec_news.md') TECH_PASSAGE_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'tech_passage.md') +BAIDU_NEWS_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'baidu_news.md') +GITHUB_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'github.md') +WX_NEWS_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'wx_news.md') CORE_LOG_PATH = os.path.join(PARENT_DIR, 'resources', 'log', 'core.log') WEB_LOG_PATH = os.path.join(PARENT_DIR, 'resources', 'log', 'app.log') @@ -17,23 +21,25 @@ WEB_LOG_PATH = os.path.join(PARENT_DIR, 'resources', 'log', 'app.log') logging.basicConfig( filename=WEB_LOG_PATH, level=logging.INFO, - format= '%(asctime)s - %(levelname)s - %(message)s' + format='%(asctime)s - %(levelname)s - %(message)s' ) -def replace_content(content): - content = content.replace('####', '###') - content = content.replace(r"e:\Self-Tool-Code\PyBot", '.') # 修改: 使用原始字符串避免转义问题 - return content - @app.route('/') def index(): logging.info("访问主页") return render_template('index.html') +@app.route('/static/favicon.ico') +def favicon(): + return send_from_directory(os.path.join(app.root_path, 'templates/static'), 'favicon.ico') + +def replace_content(content): + content = content.replace('####', '###') + content = content.replace(r"e:\Self-Tool-Code\PyBot", '.') # 修改: 使用原始字符串避免转义问题 + return content + def get_records(content, num_records=20, delimiter='-'*40): records = content.split(delimiter) - # 去除空字符串,去除之后MD格式会混乱 - # records = [record.strip() for record in records if record.strip()] selected_records = records[:num_records] return delimiter.join(selected_records) @@ -41,37 +47,20 @@ def read_last_lines(file_path, num_lines=100): with open(file_path, 'r', encoding='utf-8') as file: return deque(file, maxlen=num_lines) -@app.route('/get-sec-news') -def get_sec_news(): - logging.info(f"尝试打开安全新闻历史推送文件: {SEC_NEWS_PATH}") +def read_md_file(file_path): try: - with open(SEC_NEWS_PATH, 'r', encoding='utf-8') as file: + with open(file_path, 'r', encoding='utf-8') as file: content = file.read() content = replace_content(content) content = get_records(content) - return jsonify({'content': content}), 200 + return content, 200 except FileNotFoundError: - logging.error(f"文件缺失: {SEC_NEWS_PATH}") - return jsonify({'error': '安全新闻历史推送文件缺失!'}), 404 + logging.error(f"文件缺失: {file_path}") + return f"{os.path.basename(file_path)} 文件缺失!", 404 except Exception as e: - logging.error(f"读取时出错: {SEC_NEWS_PATH}, 原因: {str(e)}") - return jsonify({'error': str(e)}), 500 + logging.error(f"读取时出错: {file_path}, 原因: {str(e)}") + return str(e), 500 -@app.route('/get-tech-passage') -def get_tech_passage(): - logging.info(f"尝试打开技术文章历史推送文件: {TECH_PASSAGE_PATH}") - try: - with open(TECH_PASSAGE_PATH, 'r', encoding='utf-8') as file: - content = file.read() - content = replace_content(content) - content = get_records(content) - return jsonify({'content': content}), 200 - except FileNotFoundError: - logging.error(f"文件缺失: {TECH_PASSAGE_PATH}") - return jsonify({'error': '技术文章历史推送文件缺失!'}), 404 - except Exception as e: - logging.error(f"读取时出错: {TECH_PASSAGE_PATH}, 原因: {str(e)}") - return jsonify({'error': str(e)}), 500 @app.route('/log') def get_log(): @@ -85,11 +74,42 @@ def get_log(): @app.route('/weblog') def get_weblog(): logging.info(f"尝试打开Web应用日志文件: {WEB_LOG_PATH}") - log_content = read_last_lines(WEB_LOG_PATH) + with open(WEB_LOG_PATH, 'r') as file: + log_content = deque(file, maxlen=100) log_content = '\n'.join(log_content) log_content = replace_content(log_content) return render_template('log.html', log_content=log_content) +@app.route('/get-sec-news') +def get_sec_news(): + logging.info(f"尝试打开安全新闻历史推送文件: {SEC_NEWS_PATH}") + content, status_code = read_md_file(SEC_NEWS_PATH) + return jsonify({'content': content}), status_code + +@app.route('/get-tech-passage') +def get_tech_passage(): + logging.info(f"尝试打开技术文章历史推送文件: {TECH_PASSAGE_PATH}") + content, status_code = read_md_file(TECH_PASSAGE_PATH) + return jsonify({'content': content}), status_code + +@app.route('/get-baidu-news') +def get_baidu_news(): + logging.info(f"尝试打开百度新闻历史推送文件: {BAIDU_NEWS_PATH}") + content, status_code = read_md_file(BAIDU_NEWS_PATH) + return jsonify({'content': content}), status_code + +@app.route('/get-github-news') +def get_github_news(): + logging.info(f"尝试打开GitHub历史推送文件: {GITHUB_PATH}") + content, status_code = read_md_file(GITHUB_PATH) + return jsonify({'content': content}), status_code + +@app.route('/get-wx-news') +def get_wx_news(): + logging.info(f"尝试打开微信历史推送文件: {WX_NEWS_PATH}") + content, status_code = read_md_file(WX_NEWS_PATH) + return jsonify({'content': content}), status_code + def run_server(): app.run(host='0.0.0.0', port=5000) diff --git a/web/templates/index.html b/web/templates/index.html index cc8f62a..f9412f8 100644 --- a/web/templates/index.html +++ b/web/templates/index.html @@ -4,6 +4,7 @@ 资讯推送Web端 + @@ -75,7 +76,13 @@ 历史推送读取 - 切换读取源 + + 安全新闻 + 技术文章 + 百度新闻 + GitHub新闻 + 微信新闻 + 为保证网页运作性能,默认仅读取前20条记录,若您有需求可自行更改app.py @@ -88,26 +95,38 @@