修复签名不会更新的错误

This commit is contained in:
MasonLiu 2024-12-05 12:20:37 +08:00
parent baea7a6006
commit dfe30f4776
26 changed files with 289 additions and 249 deletions

177
Core.py
View File

@ -4,8 +4,8 @@ import sys
import time
import yaml
import requests
from SendBot import SendToFeishu
from media.common import run
from SendBot import SendToFeishu, gen_sign
from media.common import run, seebug_main, M_4hou_main, anquanke_main, sec_wiki_main, huawei_main, doonsec_main, qianxin_main
from media.freebuf import freebuf_main
from media.xianzhi import xianzhi_main
from GotoSend_4hou import Src_4hou
@ -16,26 +16,95 @@ from GotoSend_freebuf import Src_freebuf
from GotoSend_qianxin import Src_qianxin
# 加载参数
with open('./config.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file)
# sleep_time = int(f"{config['sleep_time']}")
e_hour = int(f"{config['e_hour']}")
def crab_job():
webhook_url_once, timestamp_once, sign_once = gen_sign()
def send_job(time_1):
# 爬取数据
print("正在启动各爬虫并获取资源中...")
run()
xianzhi_main()
freebuf_main()
xianzhi_main()
def send_job(time_1):
Src_4hou(time_1)
Src_anquanke(time_1)
Src_doonsec(time_1)
Src_xianzhi(time_1)
Src_freebuf(time_1)
Src_qianxin(time_1)
# 分析各个数据源的结果
reslt_4hou = Src_4hou(time_1)
reslt_anquanke = Src_anquanke(time_1)
reslt_doonsec = Src_doonsec(time_1)
reslt_xianzhi = Src_xianzhi(time_1)
reslt_freebuf = Src_freebuf(time_1)
reslt_qianxin = Src_qianxin(time_1)
webhook_url, timestamp, sign = gen_sign()
# 发送嘶吼资讯
if reslt_4hou:
print("-" * 40)
print("嘶吼资讯递送中:")
SendToFeishu(reslt_4hou, "嘶吼资讯递送", webhook_url, timestamp, sign)
print("-" * 40 + "\n")
time.sleep(60)
else:
print("-" * 40)
print("嘶吼数据为空,跳过执行。")
# 发送安全客资讯
if reslt_anquanke:
print("-" * 40)
print("安全客资讯递送中:")
SendToFeishu(reslt_anquanke, "安全客资讯递送", webhook_url, timestamp, sign)
print("-" * 40 + "\n")
time.sleep(60)
else:
print("-" * 40)
print("安全客数据为空,跳过执行。")
# 发送洞见微信安全资讯
if reslt_doonsec:
print("-" * 40)
print("洞见微信安全资讯递送中:")
SendToFeishu(reslt_doonsec, "洞见微信安全资讯递送", webhook_url, timestamp, sign)
print("-" * 40 + "\n")
time.sleep(60)
else:
print("-" * 40)
print("洞见微信安全数据为空,跳过执行。")
# 发送先知社区资讯
if reslt_xianzhi:
print("-" * 40)
print("先知社区资讯递送中:")
SendToFeishu(reslt_xianzhi, "先知社区资讯递送", webhook_url, timestamp, sign)
print("-" * 40 + "\n")
time.sleep(60)
else:
print("-" * 40)
print("先知社区数据为空,跳过执行。")
# 发送FreeBuf资讯
if reslt_freebuf:
print("-" * 40)
print("FreeBuf资讯递送中")
SendToFeishu(reslt_freebuf, "FreeBuf资讯递送", webhook_url, timestamp, sign)
print("-" * 40 + "\n")
time.sleep(60)
else:
print("-" * 40)
print("FreeBuf数据为空跳过执行。")
# 发送奇安信攻防社区资讯
if reslt_qianxin:
print("-" * 40)
print("奇安信攻防社区资讯递送中:")
SendToFeishu(reslt_qianxin, "奇安信攻防社区资讯递送", webhook_url, timestamp, sign)
print("-" * 40 + "\n")
time.sleep(60)
else:
print("-" * 40)
print("奇安信攻防社区数据为空,跳过执行。")
def signal_handler(sig, frame):
print("接收到退出信号,程序即将退出...")
@ -52,11 +121,10 @@ def main_loop():
try:
# 执行任务
print(f"{n}次执行,当前时间为:{datetime.now().strftime('%Y-%m-%d %H:%M:%S')}")
crab_job()
send_job(e_hour)
print("执行完毕,等待下一次执行...")
n += 1
time.sleep(e_hour * 60 * 60 - 3 * 60)
time.sleep(e_hour * 60 * 60 - 5 * 60)
except Exception as e:
print(f"发生错误: {e}, 程序已暂停")
@ -75,61 +143,27 @@ def check_rss_status(url):
return f"请求异常: {str(e)}"
def test_rss_source():
rss_sources = {
"奇安信": "https://forum.butian.net/Rss",
"洞见": "https://wechat.doonsec.com/bayes_rss.xml",
# "华为": "https://www.huawei.com/cn/rss-feeds/psirt/rss",
# "安全维基": "https://www.sec_wiki.com/news/rss",
"安全客": "https://api.anquanke.com/data/v1/rss",
"嘶吼": "https://www.4hou.com/feed",
# "Seebug社区": "https://paper.seebug.org/rss/",
"FreeBuf社区": "https://www.freebuf.com/feed",
"先知社区": "https://xz.aliyun.com/feed"
}
rss_info = ""
url_1 = check_rss_status("https://forum.butian.net/Rss")
if url_1 == True:
rss_info += "奇安信 源正常\n"
else:
rss_info += f"奇安信 源异常: {url_1}\n"
url_2 = check_rss_status("https://wechat.doonsec.com/bayes_rss.xml")
if url_2 == True:
rss_info += "洞见 源正常\n"
else:
rss_info += f"洞见 源异常: {url_2}\n"
url_3 = check_rss_status("https://www.huawei.com/cn/rss-feeds/psirt/rss")
if url_3 == True:
rss_info += "华为 源正常\n"
else:
rss_info += f"华为 源异常: {url_3}\n"
# url_4 = check_rss_status("https://www.sec_wiki.com/news/rss")
# if url_4 == True:
# rss_info += "安全维基 源正常\n"
# else:
# rss_info += f"安全维基 源异常: {url_4}\n"
url_5 = check_rss_status("https://api.anquanke.com/data/v1/rss")
if url_5 == True:
rss_info += "安全客 源正常\n"
else:
rss_info += f"安全客 源异常: {url_5}\n"
url_6 = check_rss_status("https://www.4hou.com/feed")
if url_6 == True:
rss_info += "嘶吼 源正常\n"
else:
rss_info += f"嘶吼 源异常: {url_6}\n"
url_7 = check_rss_status("https://paper.seebug.org/rss/")
if url_7 == True:
rss_info += "Seebug社区 源正常\n"
else:
rss_info += f"Seebug社区 源异常: {url_7}\n"
url_8 = check_rss_status("https://www.freebuf.com/feed")
if url_8 == True:
rss_info += "FreeBuf社区 源正常\n"
else:
rss_info += f"FreeBuf社区 源异常: {url_8}\n"
url_9 = check_rss_status("https://xz.aliyun.com/feed")
if url_9 == True:
rss_info += "先知社区 源正常\n"
else:
rss_info += f"先知社区 源异常: {url_9}\n"
for name, url in rss_sources.items():
status = check_rss_status(url)
if status:
rss_info += f"{name} 源正常\n"
else:
rss_info += f"{name} 源异常: {status}\n"
return rss_info
if __name__ == "__main__":
@ -139,10 +173,9 @@ if __name__ == "__main__":
start_info += "程序已启动,当前时间为:" + datetime.now().strftime("%Y-%m-%d %H:%M:%S") + "\n"
start_info += "程序作者MasonLiu \t 开源地址:[GM-gitea](https://git.masonliu.com/MasonLiu/PyBot)" + "\n"
start_info += "时间配置:每隔" + str(e_hour) + "小时执行一次推送\n"
start_info += "可启用源:\n嘶吼\n洞见微信安全资讯\n安全客\n先知社区\n"
SendToFeishu(start_info, "程序信息")
SendToFeishu(start_info, "程序信息", webhook_url_once, timestamp_once, sign_once)
# print(start_info)
SendToFeishu(rss_info, "RSS源状态")
SendToFeishu(rss_info, "RSS源状态", webhook_url_once, timestamp_once, sign_once)
# print(rss_info)
# 首次运行先暂停两分钟

View File

@ -121,14 +121,16 @@ def Src_4hou(e_hour):
if filtered_articles:
results = get_filtered_articles(filtered_articles)
print("嘶吼资讯递送中:")
SendToFeishu(results, "嘶吼资讯递送")
print("-" * 40 + "\n")
# print(results)
return results
else:
# 如果为空,则跳过执行
print("嘶吼数据为空,跳过执行。")
# print(results)
return ""
if __name__ == "__main__":
Src_4hou(4)
reslts = Src_4hou(4)
if reslts != "":
print(reslts)
else:
# 如果为空,则跳过执行
print("-" * 40)
print("嘶吼数据为空,跳过执行。")

View File

@ -114,14 +114,15 @@ def Src_anquanke(e_hour):
if filtered_articles:
results = get_filtered_articles(filtered_articles)
print("安全客资讯递送中:")
SendToFeishu(results, "安全客资讯递送")
print("-" * 40 + "\n")
# print(results)
return results
else:
# 如果为空,则跳过执行
print("安全客数据为空,跳过执行。")
# print(results)
return False
if __name__ == "__main__":
Src_anquanke(4)
reslts = Src_anquanke(4)
if reslts != False:
print(reslts)
else:
# 如果为空,则跳过执行
print("-" * 40)
print("安全客数据为空,跳过执行。")

View File

@ -122,14 +122,15 @@ def Src_doonsec(e_hour):
if filtered_articles:
results = get_filtered_articles(filtered_articles)
print("洞见微信安全资讯递送中:")
SendToFeishu(results, "洞见微信安全资讯递送")
print("-" * 40 + "\n")
# print(results)
return results
else:
# 如果为空,则跳过执行
print("洞见数据为空,跳过执行。")
# print(results)
return False
if __name__ == "__main__":
Src_doonsec(4)
reslts = Src_doonsec(4)
if reslts != False:
print(reslts)
else:
# 如果为空,则跳过执行
print("-" * 40)
print("洞见微信安全数据为空,跳过执行。")

View File

@ -121,14 +121,15 @@ def Src_freebuf(e_hour):
if filtered_articles:
results = get_filtered_articles(filtered_articles)
print("Freebuf资讯递送中")
SendToFeishu(results, "Freebuf资讯递送")
print("-" * 40 + "\n")
# print(results)
return results
else:
# 如果为空,则跳过执行
print("Freebuf数据为空跳过执行。")
# print(results)
return False
if __name__ == "__main__":
Src_freebuf(4)
reslts = Src_freebuf(4)
if reslts != False:
print(reslts)
else:
# 如果为空,则跳过执行
print("-" * 40)
print("Freebuf数据为空跳过执行。")

View File

@ -113,14 +113,15 @@ def Src_qianxin(e_hour):
if filtered_articles:
results = get_filtered_articles(filtered_articles)
print("奇安信攻防社区资讯递送中:")
SendToFeishu(results, "奇安信攻防社区资讯递送")
print("-" * 40 + "\n")
# print(results)
return results
else:
# 如果为空,则跳过执行
print("奇安信攻防社区数据为空,跳过执行。")
# print(results)
return False
if __name__ == "__main__":
Src_qianxin(4)
reslts = Src_qianxin(4)
if reslts != False:
print(reslts)
else:
# 如果为空,则跳过执行
print("-" * 40)
print("奇安信攻防社区数据为空,跳过执行。")

View File

@ -118,14 +118,15 @@ def Src_xianzhi(e_hour):
if filtered_articles:
results = get_filtered_articles(filtered_articles)
print("先知社区资讯递送中:")
SendToFeishu(results, "先知社区资讯递送")
print("-" * 40 + "\n")
# print(results)
return results
else:
# 如果为空,则跳过执行
print("先知社区数据为空,跳过执行。")
# print(results)
return False
if __name__ == "__main__":
Src_xianzhi(100)
reslts = Src_xianzhi(4)
if reslts != False:
print(reslts)
else:
# 如果为空,则跳过执行
print("-" * 40)
print("先知社区数据为空,跳过执行。")

File diff suppressed because one or more lines are too long

View File

@ -1,4 +1,28 @@
[
{
"guid": "https://www.anquanke.com/post/id/302456",
"title": "当心 Celestial Stealer新的 MaaS 针对浏览器和加密钱包",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2024-12-05 11:24:53"
},
{
"guid": "https://www.anquanke.com/post/id/302453",
"title": "Akira v2 出现: 基于 Rust 的勒索软件提高了风险",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2024-12-05 11:12:32"
},
{
"guid": "https://www.anquanke.com/post/id/302450",
"title": "新的 Andromeda/Gamarue 命令和控制集群以亚太地区为目标",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2024-12-05 11:02:51"
},
{
"guid": "https://www.anquanke.com/post/id/302432",
"title": "AI全新赋能360开启终端All in One 5.0时代",
@ -134,29 +158,5 @@
"description": null,
"source": "securityonline",
"pubDate": "2024-12-03 11:35:47"
},
{
"guid": "https://www.anquanke.com/post/id/302374",
"title": "德国联邦司法部发布计算机刑法草案,白帽黑客迎来合法曙光",
"author": " 安全客",
"description": null,
"source": "安全客",
"pubDate": "2024-12-03 11:14:52"
},
{
"guid": "https://www.anquanke.com/post/id/302371",
"title": "关于开展“清朗·网络平台算法典型问题治理”专项行动的通知",
"author": " 安全客",
"description": null,
"source": "国家网信办",
"pubDate": "2024-12-03 10:58:19"
},
{
"guid": "https://www.anquanke.com/post/id/302368",
"title": "新型 Ymir 勒索软件利用内存进行隐蔽攻击;目标是企业网络",
"author": " 安全客",
"description": null,
"source": "TheHackersNews",
"pubDate": "2024-12-03 10:49:26"
}
]

View File

@ -1,4 +1,76 @@
[
{
"title": "CVE-2024-31317 复现",
"link": "https://mp.weixin.qq.com/s?__biz=MzIxMDYyNTk3Nw==&mid=2247515004&idx=1&sn=49ef9432fd64ba81064c5af61066efee",
"description": "最近做一个测试的项目刚好是安卓车机于是想起来了这篇写一半的博客,赶紧趁着还能想起一点东西赶紧记录了下来。",
"author": "白帽100安全攻防实验室",
"category": "白帽100安全攻防实验室",
"pubDate": "2024-12-05T11:30:33"
},
{
"title": "APT 组织之间的对抗:俄罗斯 APT Turla 窃取了巴基斯坦 APT 组织的数据",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492849&idx=2&sn=a268b43ec7ef3072d0da2c731b8c43a9",
"description": null,
"author": "独眼情报",
"category": "独眼情报",
"pubDate": "2024-12-05T11:11:06"
},
{
"title": "Zabbix 漏洞CVE-2024-42327 (CVSS 9.9)的 PoC 发布",
"link": "https://mp.weixin.qq.com/s?__biz=MzkzNDIzNDUxOQ==&mid=2247492849&idx=4&sn=a3441c1ca8c3aba877ceebd7454b594c",
"description": null,
"author": "独眼情报",
"category": "独眼情报",
"pubDate": "2024-12-05T11:11:06"
},
{
"title": "从赛门铁克管理代理(又名 Altiris中提取账户连接凭据ACCs",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247485607&idx=1&sn=6686b6ca661897c4b5d84f044d0095b8",
"description": null,
"author": "securitainment",
"category": "securitainment",
"pubDate": "2024-12-05T10:24:37"
},
{
"title": "【免杀】向日葵密码、todesk密码命令行版本一键提取工具",
"link": "https://mp.weixin.qq.com/s?__biz=MzkwOTIzODg0MA==&mid=2247491260&idx=1&sn=d2998f3b46a506b8711bf523b7733a50",
"description": "向日葵、todesk提取工具\\\\x0d\\\\x0a基于fscan二开的xlscan\\\\x0d\\\\x0a过360、火绒等杀软",
"author": "爱喝酒烫头的曹操",
"category": "爱喝酒烫头的曹操",
"pubDate": "2024-12-05T10:06:33"
},
{
"title": "版本更新 | 单文件一键击溃火绒进程 v1.1发布!",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4Mzg4OTIyMA==&mid=2247485849&idx=1&sn=951f8f326995324daa476fe117c2b15e",
"description": "单文件一键击溃火绒进程 v1.1发布!\\\\x0d\\\\x0a使用资源文件嵌入驱动避免直接依赖外部文件\\\\x0d\\\\x0a替换旧版本驱动文件旧版本驱动证书已过期",
"author": "威零安全实验室",
"category": "威零安全实验室",
"pubDate": "2024-12-05T10:04:27"
},
{
"title": "微信4.0聊天记录数据库文件解密分析",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604505&idx=4&sn=e59a2078c09bc1db7d2094cf014dfd4a",
"description": null,
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2024-12-05T10:03:19"
},
{
"title": "安卓逆向之第二代:函数抽取型壳",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyODY3NjkyNQ==&mid=2247484355&idx=1&sn=a0fd336b796484a0e7abf6d02f246b06",
"description": null,
"author": "Ting的安全笔记",
"category": "Ting的安全笔记",
"pubDate": "2024-12-05T10:01:18"
},
{
"title": "【翻译】CORS - 错误配置和绕过",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg4NzgzMjUzOA==&mid=2247485324&idx=1&sn=edbf22ad696def57e27f4d38b81d689d",
"description": null,
"author": "安全视安",
"category": "安全视安",
"pubDate": "2024-12-05T09:56:43"
},
{
"title": "【Linux运维】宝塔环境升级HTTP/3",
"link": "https://mp.weixin.qq.com/s?__biz=MzkxMzIwNTY1OA==&mid=2247509575&idx=1&sn=94ea87716de2777f60f8187050014cfb",
@ -431,6 +503,14 @@
"category": "securitainment",
"pubDate": "2024-12-04T10:30:23"
},
{
"title": "【全国职业技能大赛“信息安全与评估”赛项】Linux系统入侵排查与应急响应技术",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485913&idx=1&sn=d11bcfbb72d32f8f9a4808c0b6ba001f",
"description": null,
"author": "神农Sec",
"category": "神农Sec",
"pubDate": "2024-12-04T10:11:41"
},
{
"title": "CVE-2017-7504 JBOSS反序列化漏洞复现",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2Mzg1MTA5MQ==&mid=2247484544&idx=1&sn=edccc83fdc6c490a2e6fea3dca97653f",
@ -1518,85 +1598,5 @@
"author": "励行安全",
"category": "励行安全",
"pubDate": "2024-12-01T19:22:27"
},
{
"title": "Python实现Telegram自动签到脚本",
"link": "https://mp.weixin.qq.com/s?__biz=MzkyNzUzMjM1NQ==&mid=2247484729&idx=1&sn=2c1a9677e1dd45759aba9526ff7b2d84",
"description": "Python脚本实现Telegram Bot自动签到",
"author": "在下小白",
"category": "在下小白",
"pubDate": "2024-12-01T18:02:20"
},
{
"title": "知名工业WiFi接入点被曝存在20多个漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604309&idx=2&sn=da7af306259f84bf1d1eb30c34fe1963",
"description": null,
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2024-12-01T15:57:17"
},
{
"title": "记一次异常艰难的渗透测试",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650604309&idx=3&sn=1c41c06a6de2a958d41cc4f4502e8c83",
"description": null,
"author": "黑白之道",
"category": "黑白之道",
"pubDate": "2024-12-01T15:57:17"
},
{
"title": "NTLM 中继到 LDAP - The Hail Mary of Network Compromise",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525038&idx=1&sn=b063f27e3a567ec530e2a6b25923a759",
"description": null,
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2024-12-01T15:34:53"
},
{
"title": "SuperMega 是一个 shellcode 加载器,通过将其注入到真正的可执行文件(.exe 或 .dll中来实现",
"link": "https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247525038&idx=3&sn=b09654d60553ff0ce8ec87cbe74e1614",
"description": null,
"author": "Ots安全",
"category": "Ots安全",
"pubDate": "2024-12-01T15:34:53"
},
{
"title": "利用条件竞争绕过邮箱验证",
"link": "https://mp.weixin.qq.com/s?__biz=MzI4NTcxMjQ1MA==&mid=2247614380&idx=1&sn=9c3b12946589d075bb2aef12392ea667",
"description": null,
"author": "白帽子左一",
"category": "白帽子左一",
"pubDate": "2024-12-01T12:03:04"
},
{
"title": "记一次接口fuzz+逻辑漏洞拿下证书站高危",
"link": "https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247545552&idx=1&sn=b685a20e7273ec1ae2e5a2282c2e475d",
"description": null,
"author": "掌控安全EDU",
"category": "掌控安全EDU",
"pubDate": "2024-12-01T12:00:34"
},
{
"title": "记录灯塔收集学校信息攻击薄弱点站点拿到5K+的敏感信息",
"link": "https://mp.weixin.qq.com/s?__biz=Mzk0Mzc1MTI2Nw==&mid=2247485848&idx=1&sn=222a41a8479327fc886af5455fa8149a",
"description": "人若无名,便可专心练剑!",
"author": "神农Sec",
"category": "神农Sec",
"pubDate": "2024-12-01T11:51:40"
},
{
"title": "CVE-2024-42327Zabbix SQL注入漏洞",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485713&idx=1&sn=de263c85dbef17756b944853870cf207",
"description": "CVE-2024-42327Zabbix SQL注入漏洞",
"author": "信安百科",
"category": "信安百科",
"pubDate": "2024-12-01T09:30:50"
},
{
"title": "CVE-2024-114777-Zip代码执行漏洞POC",
"link": "https://mp.weixin.qq.com/s?__biz=Mzg2ODcxMjYzMA==&mid=2247485713&idx=2&sn=6b514f8a63ef9950e23b2b6671d555c2",
"description": "CVE-2024-114777-Zip代码执行漏洞",
"author": "信安百科",
"category": "信安百科",
"pubDate": "2024-12-01T09:30:50"
}
]

View File

@ -1,4 +1,20 @@
[
{
"title": "谷歌浏览器类型混淆漏洞让攻击者能够执行远程代码",
"link": "https://www.freebuf.com/news/416908.html",
"description": "攻击者可能利用此漏洞在受影响的系统上执行远程代码,从而导致系统受损和数据盗窃。",
"body": "<p>据Cyber Security News消息最近独立研究人员在谷歌Chrome 的 V8 JavaScript 引擎中发现了一个严重性较高的类型混淆漏洞。</p><p><img src=\"https://image.3001.net/images/20241205/1733369423_67511e4f50258033a7e83.png!small\" width=\"690\" height",
"category": "资讯",
"pubDate": "Thu, 05 Dec 2024 11:29:27 +0800"
},
{
"title": "警惕这类黑产,近百万老年机被远程控制,每月莫名扣费……",
"link": "https://www.freebuf.com/news/416899.html",
"description": "初步统计显示全国竟有98万部手机遭遇莫名扣费情况金额高达500多万元。不法分子如何盯上老人机",
"body": "<div>在大多数人的观念里,“老人机”功能简单,不能上网购物、玩游戏,只能打电话、收短信,使用起来也相对安全。果真如此吗?</div><div>近期,江苏常州检察机关披露一起案件:当地不少老人机没有开通任何手机增值业务,却被自动订购增值服务,每月秘密扣取资费。警方接到报案后调查发现,这些老人机均被不法分子通过一款代码远程控制了。</div><div>初步统计显示全国竟有98万部手机遭遇莫名扣费",
"category": "资讯",
"pubDate": "Thu, 05 Dec 2024 10:46:34 +0800"
},
{
"title": "FreeBuf早报 | 今年黑客已窃取 14.9 亿美元加密货币Cloudflare开发人员域正被滥用",
"link": "https://www.freebuf.com/news/416863.html",
@ -142,21 +158,5 @@
"body": "<p>各位 Buffer 周末好以下是本周「FreeBuf周报」我们总结推荐了本周的热点资讯、安全事件、一周好文和省心工具保证大家不错过本周的每一个重点<img style=\"border-width:0px;line-height:inherit;max-width:635px;height:auto;\" src=\"https://image.3001.net/images/202209",
"category": "资讯",
"pubDate": "Fri, 29 Nov 2024 14:02:37 +0800"
},
{
"title": "渗透测试 | 入门必备的 JavaScript 基础知识",
"link": "https://www.freebuf.com/articles/web/416515.html",
"description": "了解如何格式化.js文件、设置断点以及动态更改脚本的逻辑在使用 Web 应用程序时非常有用。",
"body": "<h3 id=\"h3-1\">渗透测试入门必备的JS基础</h3><p>JavaScript 在几乎所有现代 Web 应用程序中都得到了广泛使用。了解如何格式化<code>.js</code>文件、设置断点以及动态更改脚本的逻辑,在使用 Web 应用程序时非常有用。</p><h2 id=\"h2-1\">1. 浏览器开发者工具概述</h2><p>首先,让我们导航到一个网站并查看应用程序的资源。在我们的示",
"category": "Web安全",
"pubDate": "Fri, 29 Nov 2024 13:22:42 +0800"
},
{
"title": "为抵御风险投资低迷,以色列加大网络安全市场投资",
"link": "https://www.freebuf.com/news/416501.html",
"description": "持续的投资表明,以色列仍然是美国硅谷之外最强大的科技创新中心之一。",
"body": "<p>尽管全球针对网络安全公司的投资在 2022 年底开始放缓,但以色列网络安全产业的强劲表现超出了当地预期和全球经济挑战,即便该国还面临加沙地区局势不断升温的背景。</p><p><img src=\"https://image.3001.net/images/20241129/1732851509_674937350dad0e86a3396.png!small\" width=\"690\" heigh",
"category": "资讯",
"pubDate": "Fri, 29 Nov 2024 11:34:47 +0800"
}
]

View File

@ -36,7 +36,7 @@ def gen_sign():
webhook_url, timestamp, sign = gen_sign()
# 主函数
def SendToFeishu(body, header):
def SendToFeishu(body, header, webhook_url, timestamp, sign):
msg = {
"timestamp": f"{timestamp}",
"sign": f"{sign}",

Binary file not shown.

View File

@ -1,4 +1,4 @@
key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74
secret: 4tq65T4jm1MO2IlxvHxBWe
# 结算时间范围
e_hour: 4 # 程序运行时间间隔
e_hour: 5 # 程序运行时间间隔

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.

Binary file not shown.