大型更新优化
This commit is contained in:
parent
71cc3b4d22
commit
fd7a51f24b
143
Core.py
143
Core.py
@ -58,103 +58,130 @@ webhook_url_once, timestamp_once, sign_once = gen_sign()
|
|||||||
e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config()
|
e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config()
|
||||||
|
|
||||||
|
|
||||||
def check_avaliable(info_long, info_short, title, webhook_url, timestamp, sign):
|
def check_avaliable(info_long, info_short, title):
|
||||||
if info_long: # 发送完整文章相关内容
|
if info_long: # 发送完整文章相关内容
|
||||||
|
if fs_activate == "True":
|
||||||
# logger.info(f"{title} 递送中(飞书):")
|
# logger.info(f"{title} 递送中(飞书):")
|
||||||
|
webhook_url, timestamp, sign = gen_sign()
|
||||||
result = SendToFeishu(info_long, title, webhook_url, timestamp, sign)
|
result = SendToFeishu(info_long, title, webhook_url, timestamp, sign)
|
||||||
logger.info(result)
|
logger.info(result)
|
||||||
time.sleep(15)
|
time.sleep(15)
|
||||||
else:
|
|
||||||
pass
|
|
||||||
if info_short: # 发送精简文章相关内容
|
if info_short: # 发送精简文章相关内容
|
||||||
# 企业微信相关
|
# 企业微信相关
|
||||||
if wx_activate == "True":
|
if wx_activate == "True":
|
||||||
# logger.info(f"{title} 递送中(企业微信):")
|
# logger.info(f"{title} 递送中(企业微信):")
|
||||||
result = SendToWX(info_short, title)
|
for info in info_short:
|
||||||
|
result = SendToWX(info, title)
|
||||||
logger.info(result)
|
logger.info(result)
|
||||||
time.sleep(15)
|
time.sleep(15)
|
||||||
else:
|
|
||||||
pass
|
|
||||||
|
|
||||||
# 钉钉相关
|
# 钉钉相关
|
||||||
if ding_activate == "True":
|
if ding_activate == "True":
|
||||||
# logger.info(f"{title} 递送中(钉钉):")
|
# logger.info(f"{title} 递送中(钉钉):")
|
||||||
# result = SendToWX(info_short, title) # 待完善
|
# for info in info_short: # 开发中,暂未实现
|
||||||
logger.info(result)
|
# result = SendToDD(info, title)
|
||||||
|
# logger.info(result)
|
||||||
time.sleep(15)
|
time.sleep(15)
|
||||||
else:
|
|
||||||
pass
|
|
||||||
if not info_long and not info_short:
|
|
||||||
logger.info(f"{title}数据为空,跳过执行。")
|
|
||||||
|
|
||||||
def send_job_RSS(time_1):
|
def send_job_RSS(time_1):
|
||||||
Doonsec_switch, Doonsec = get_kewords_config('Doonsec')
|
Doonsec_switch, Doonsec = get_kewords_config('Doonsec')
|
||||||
# print(f"当前配置信息:Doonsec_switch:{Doonsec_switch}")
|
|
||||||
# 爬取数据
|
# Seebug数据获取分发
|
||||||
seebug_main()
|
seebug_main()
|
||||||
|
seebug_results = Src_seebug(time_1)
|
||||||
|
if seebug_results != False:
|
||||||
|
result_seebug_long, result_seebug_short = seebug_results
|
||||||
|
check_avaliable(result_seebug_long, result_seebug_short, "Seebug社区资讯")
|
||||||
|
else:
|
||||||
|
logger.info("Seebug数据为空,跳过执行。")
|
||||||
|
|
||||||
|
# 安全客数据获取分发
|
||||||
anquanke_main()
|
anquanke_main()
|
||||||
|
anquanke_results = Src_anquanke(time_1)
|
||||||
|
if anquanke_results != False:
|
||||||
|
result_anquanke_long, result_anquanke_short = anquanke_results
|
||||||
|
check_avaliable(result_anquanke_long, result_anquanke_short, "安全客资讯")
|
||||||
|
else:
|
||||||
|
logger.info("安全客数据为空,跳过执行。")
|
||||||
|
|
||||||
|
# 华为数据获取分发
|
||||||
huawei_main()
|
huawei_main()
|
||||||
doonsec_main()
|
|
||||||
|
# 奇安信数据获取分发
|
||||||
qianxin_main()
|
qianxin_main()
|
||||||
|
qianxin_results = Src_qianxin(time_1)
|
||||||
|
if qianxin_results != False:
|
||||||
|
result_qianxin_long, result_qianxin_short = qianxin_results
|
||||||
|
check_avaliable(result_qianxin_long, result_qianxin_short, "奇安信攻防社区资讯")
|
||||||
|
else:
|
||||||
|
logger.info("奇安信数据为空,跳过执行。")
|
||||||
|
|
||||||
|
# FreeBuf数据获取分发
|
||||||
freebuf_main()
|
freebuf_main()
|
||||||
|
freebuf_results = Src_freebuf(time_1)
|
||||||
|
if freebuf_results != False:
|
||||||
|
result_freebuf_long, result_freebuf_short = freebuf_results
|
||||||
|
check_avaliable(result_freebuf_long, result_freebuf_short, "FreeBuf资讯")
|
||||||
|
else:
|
||||||
|
logger.info("FreeBuf数据为空,跳过执行。")
|
||||||
|
|
||||||
|
# 先知数据获取分发
|
||||||
xianzhi_main()
|
xianzhi_main()
|
||||||
|
xianzhi_results = Src_xianzhi(time_1)
|
||||||
|
if xianzhi_results != False:
|
||||||
|
result_xianzhi_long, result_xianzhi_short = xianzhi_results
|
||||||
|
check_avaliable(result_xianzhi_long, result_xianzhi_short, "先知社区资讯")
|
||||||
|
else:
|
||||||
|
logger.info("先知数据为空,跳过执行。")
|
||||||
|
|
||||||
|
# 4hou数据获取分发
|
||||||
M_4hou_main()
|
M_4hou_main()
|
||||||
|
M_4hou_results = Src_4hou(time_1)
|
||||||
|
if M_4hou_results != False:
|
||||||
|
result_4hou_long, result_4hou_short = M_4hou_results
|
||||||
|
check_avaliable(result_4hou_long, result_4hou_short, "嘶吼资讯")
|
||||||
|
else:
|
||||||
|
logger.info("嘶吼数据为空,跳过执行。")
|
||||||
|
|
||||||
# 分析各个数据源的结果(输出长结果)
|
# 洞见微信安全数据获取分发
|
||||||
result_4hou_long = Src_4hou(time_1, False)
|
doonsec_main()
|
||||||
result_anquanke_long = Src_anquanke(time_1, False)
|
doonsec_results = Src_doonsec(False, Doonsec_switch, Doonsec)
|
||||||
result_doonsec_long = Src_doonsec(False, Doonsec_switch, Doonsec)
|
if doonsec_results != False:
|
||||||
# print(result_doonsec_long)
|
result_doonsec_long, result_doonsec_short = doonsec_results
|
||||||
result_xianzhi_long = Src_xianzhi(time_1, False)
|
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯")
|
||||||
result_freebuf_long = Src_freebuf(time_1, False)
|
else:
|
||||||
result_qianxin_long = Src_qianxin(time_1, False)
|
logger.info("洞见微信安全数据为空,跳过执行。")
|
||||||
result_seebug_long = Src_seebug(time_1, False)
|
|
||||||
# 分析各个数据源的结果(输出短结果)
|
|
||||||
result_4hou_short = Src_4hou(time_1, True)
|
|
||||||
result_anquanke_short = Src_anquanke(time_1, True)
|
|
||||||
result_doonsec_short = Src_doonsec(True, Doonsec_switch, Doonsec)
|
|
||||||
result_xianzhi_short = Src_xianzhi(time_1, True)
|
|
||||||
result_freebuf_short = Src_freebuf(time_1, True)
|
|
||||||
result_qianxin_short = Src_qianxin(time_1, True)
|
|
||||||
result_seebug_short = Src_seebug(time_1, True)
|
|
||||||
|
|
||||||
webhook_url, timestamp, sign = gen_sign()
|
|
||||||
|
|
||||||
check_avaliable(result_4hou_long, result_4hou_short, "嘶吼资讯", webhook_url, timestamp, sign)
|
|
||||||
check_avaliable(result_anquanke_long, result_anquanke_short, "安全客资讯", webhook_url, timestamp, sign)
|
|
||||||
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯", webhook_url, timestamp, sign)
|
|
||||||
check_avaliable(result_xianzhi_long, result_xianzhi_short, "先知社区资讯", webhook_url, timestamp, sign)
|
|
||||||
check_avaliable(result_freebuf_long, result_freebuf_short, "FreeBuf资讯", webhook_url, timestamp, sign)
|
|
||||||
check_avaliable(result_qianxin_long, result_qianxin_short, "奇安信攻防社区资讯", webhook_url, timestamp, sign)
|
|
||||||
check_avaliable(result_seebug_long, result_seebug_short, "Seebug社区资讯", webhook_url, timestamp, sign)
|
|
||||||
|
|
||||||
def send_job_SX():
|
def send_job_SX():
|
||||||
Sogou_WX = get_kewords_config('Sogou-WX')
|
Sogou_WX = get_kewords_config('Sogou-WX')
|
||||||
sougou_wx_main(Sogou_WX)
|
sougou_wx_main(Sogou_WX)
|
||||||
result_sx_long = Src_sougou_wx(False)
|
result_sx_long, result_sx_short = Src_sougou_wx()
|
||||||
result_sx_short = Src_sougou_wx(True)
|
check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容")
|
||||||
webhook_url, timestamp, sign = gen_sign()
|
|
||||||
check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容", webhook_url, timestamp, sign)
|
|
||||||
|
|
||||||
def send_job_github(time_1):
|
def send_job_github(time_1):
|
||||||
keyword_list, tool_list, user_list, black_words = load_github_config()
|
keyword_list, tool_list, user_list, black_words = load_github_config()
|
||||||
github_main(keyword_list, tool_list, user_list, black_words)
|
github_main(keyword_list, tool_list, user_list, black_words)
|
||||||
result_github_1_long, result_github_2_long, result_github_3_long, result_github_4_long = Src_github(time_1, False)
|
results = Src_github(time_1)
|
||||||
result_github_1_short, result_github_2_short, result_github_3_short, result_github_4_short = Src_github(time_1, True)
|
|
||||||
webhook_url, timestamp, sign = gen_sign()
|
# 解构返回的结果
|
||||||
check_avaliable(result_github_1_long, result_github_1_short, "Github项目监控-关键词监控", webhook_url, timestamp, sign)
|
result_github_1_long, result_github_1_short = results[0]
|
||||||
check_avaliable(result_github_2_long, result_github_2_short, "Github项目监控-项目更新情况", webhook_url, timestamp, sign)
|
result_github_2_long, result_github_2_short = results[1]
|
||||||
webhook_url, timestamp, sign = gen_sign()
|
result_github_3_long, result_github_3_short = results[2]
|
||||||
check_avaliable(result_github_3_long, result_github_3_short, "Github项目监控-大佬工具", webhook_url, timestamp, sign)
|
result_github_4_long, result_github_4_short = results[3]
|
||||||
check_avaliable(result_github_4_long, result_github_4_short, "Github项目监控-项目版本发布监测", webhook_url, timestamp, sign)
|
|
||||||
|
# 检查并处理结果
|
||||||
|
check_avaliable(result_github_1_long, result_github_1_short, "Github项目监控-关键词监控")
|
||||||
|
check_avaliable(result_github_2_long, result_github_2_short, "Github项目监控-项目更新情况")
|
||||||
|
check_avaliable(result_github_3_long, result_github_3_short, "Github项目监控-大佬工具")
|
||||||
|
check_avaliable(result_github_4_long, result_github_4_short, "Github项目监控-项目版本发布监测")
|
||||||
|
|
||||||
def send_job_baidu():
|
def send_job_baidu():
|
||||||
Baidu = get_kewords_config('Baidu')
|
Baidu = get_kewords_config('Baidu')
|
||||||
baidu_main(Baidu)
|
baidu_main(Baidu)
|
||||||
result_baidu_long = Src_baidu(False)
|
result_baidu_long, result_baidu_short = Src_baidu()
|
||||||
result_baidu_short = Src_baidu(True)
|
check_avaliable(result_baidu_long, result_baidu_short, "百度搜索关键词相关内容")
|
||||||
webhook_url, timestamp, sign = gen_sign()
|
|
||||||
check_avaliable(result_baidu_long, result_baidu_short, "百度搜索关键词相关内容", webhook_url, timestamp, sign)
|
|
||||||
|
|
||||||
# 探测rss源状态
|
# 探测rss源状态
|
||||||
def check_rss_status(url):
|
def check_rss_status(url):
|
||||||
|
132
Dev_test.py
132
Dev_test.py
@ -0,0 +1,132 @@
|
|||||||
|
# -*- coding: utf-8 -*-
|
||||||
|
"""
|
||||||
|
@Author: MasonLiu
|
||||||
|
@Description: 本程序可以爬取各安全资讯源,并发送到飞书群组。
|
||||||
|
"""
|
||||||
|
|
||||||
|
import schedule
|
||||||
|
import os
|
||||||
|
import signal
|
||||||
|
import sys
|
||||||
|
import time
|
||||||
|
import yaml
|
||||||
|
import requests
|
||||||
|
from datetime import datetime, timedelta
|
||||||
|
from SendCore.FeishuSendBot import SendToFeishu, gen_sign
|
||||||
|
from SendCore.QiweiSendBot import SendToWX
|
||||||
|
from spider.common import run, seebug_main, M_4hou_main, anquanke_main, sec_wiki_main, huawei_main, doonsec_main, qianxin_main
|
||||||
|
from spider.freebuf import freebuf_main
|
||||||
|
from spider.xianzhi import xianzhi_main
|
||||||
|
from spider.sougou_wx import sougou_wx_main
|
||||||
|
from spider.github import github_main, load_github_config
|
||||||
|
from spider.baidu import baidu_main
|
||||||
|
from GotoSend.M_4hou import Src_4hou
|
||||||
|
from GotoSend.anquanke import Src_anquanke
|
||||||
|
from GotoSend.doonsec import Src_doonsec
|
||||||
|
from GotoSend.xianzhi import Src_xianzhi
|
||||||
|
from GotoSend.freebuf import Src_freebuf
|
||||||
|
from GotoSend.qianxin import Src_qianxin
|
||||||
|
from GotoSend.seebug import Src_seebug
|
||||||
|
from GotoSend.sougou_wx import Src_sougou_wx
|
||||||
|
from GotoSend.github import Src_github
|
||||||
|
from GotoSend.baidu import Src_baidu
|
||||||
|
from config.check_config import get_core_config, get_debug_config, get_kewords_config
|
||||||
|
from loguru import logger
|
||||||
|
|
||||||
|
# 清除所有已有的日志记录器配置
|
||||||
|
logger.remove()
|
||||||
|
|
||||||
|
logger.add("./resources/log/core.log",
|
||||||
|
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
|
||||||
|
rotation="100 MB",
|
||||||
|
compression="zip",
|
||||||
|
encoding="utf-8")
|
||||||
|
# shell终端打印日志
|
||||||
|
debug = get_debug_config()
|
||||||
|
if debug == "True":
|
||||||
|
logger.add(lambda msg: print(msg),
|
||||||
|
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}")
|
||||||
|
|
||||||
|
def signal_handler(sig, frame):
|
||||||
|
logger.info("接收到退出信号,程序即将退出...")
|
||||||
|
sys.exit(0)
|
||||||
|
|
||||||
|
# 全局变量
|
||||||
|
signal.signal(signal.SIGINT, signal_handler) # Ctrl+C
|
||||||
|
signal.signal(signal.SIGTERM, signal_handler) # kill命令
|
||||||
|
webhook_url_once, timestamp_once, sign_once = gen_sign()
|
||||||
|
e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config()
|
||||||
|
|
||||||
|
|
||||||
|
def check_avaliable(info_long, info_short, title):
|
||||||
|
if info_short: # 发送精简文章相关内容
|
||||||
|
# 企业微信相关
|
||||||
|
if wx_activate == "True":
|
||||||
|
# logger.info(f"{title} 递送中(企业微信):")
|
||||||
|
print("正在发送精简文章内容...")
|
||||||
|
for info in info_short:
|
||||||
|
result = SendToWX(info, title)
|
||||||
|
print(result)
|
||||||
|
logger.info(result)
|
||||||
|
time.sleep(15)
|
||||||
|
else:
|
||||||
|
print("精简文章内容为空,跳过执行。")
|
||||||
|
pass
|
||||||
|
|
||||||
|
if info_long: # 发送完整文章相关内容
|
||||||
|
if fs_activate == "True":
|
||||||
|
# logger.info(f"{title} 递送中(飞书):")
|
||||||
|
webhook_url, timestamp, sign = gen_sign()
|
||||||
|
result = SendToFeishu(info_long, title, webhook_url, timestamp, sign)
|
||||||
|
logger.info(result)
|
||||||
|
time.sleep(15)
|
||||||
|
else:
|
||||||
|
pass
|
||||||
|
|
||||||
|
if not info_long and not info_short:
|
||||||
|
logger.info(f"{title}数据为空,跳过执行。")
|
||||||
|
|
||||||
|
def send_job_RSS(time_1):
|
||||||
|
Doonsec_switch, Doonsec = get_kewords_config('Doonsec')
|
||||||
|
results = Src_doonsec(Doonsec_switch, Doonsec)
|
||||||
|
if results != False:
|
||||||
|
result_doonsec_long, result_doonsec_short = results
|
||||||
|
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯")
|
||||||
|
|
||||||
|
|
||||||
|
def main_job(e_hour):
|
||||||
|
logger.info(f"发送程序启动,当前时间为:{datetime.now().strftime('%Y-%m-%d %H:%M:%S')}")
|
||||||
|
logger.info("正在启动各爬虫并获取资源中...")
|
||||||
|
if 0 in choice:
|
||||||
|
send_job_RSS(e_hour)
|
||||||
|
logger.info("单次运行结束,等待下一次运行...")
|
||||||
|
|
||||||
|
def main_loop(time_choice):
|
||||||
|
if time_choice == 1:
|
||||||
|
while True:
|
||||||
|
try:
|
||||||
|
# 执行任务
|
||||||
|
main_job(e_hour)
|
||||||
|
time.sleep(e_hour * 60 * 60 - 3 * 60)
|
||||||
|
|
||||||
|
except Exception as e:
|
||||||
|
logger.error(f"发生错误: {e}, 程序已暂停")
|
||||||
|
# result = SendToFeishu(f"发生错误: {e}, 程序已退出", "报错信息")
|
||||||
|
exit()
|
||||||
|
|
||||||
|
elif time_choice == 0:
|
||||||
|
# 设置每天的特定时间点执行job函数
|
||||||
|
schedule.every().day.at("09:00").do(main_job, 12)
|
||||||
|
schedule.every().day.at("12:00").do(main_job, 3)
|
||||||
|
schedule.every().day.at("15:00").do(main_job, 3)
|
||||||
|
schedule.every().day.at("18:00").do(main_job, 3)
|
||||||
|
schedule.every().day.at("21:00").do(main_job, 3)
|
||||||
|
|
||||||
|
while True:
|
||||||
|
schedule.run_pending()
|
||||||
|
time.sleep(60) # 每分钟检查一次是否有任务需要执行
|
||||||
|
|
||||||
|
if __name__ == "__main__":
|
||||||
|
logger.info("程序正在运行当中。")
|
||||||
|
|
||||||
|
main_loop(time_choice)
|
@ -107,28 +107,45 @@ def record_md(result, filename="./resources/history/sec_news.md"):
|
|||||||
# 写回文件
|
# 写回文件
|
||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[5]}\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[5]}\n"
|
||||||
result += f"上传时间:{entry[4]}\n"
|
result_long += f"上传时间:{entry[4]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
if Is_short == True:
|
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"链接:{entry[2]}\n上传时间:{entry[4]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:[{entry[1]}]({entry[2]})\n"
|
||||||
|
f"链接:{entry[2]}\n上传时间:{entry[4]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
||||||
record += f"**作者**:{entry[5]}\n"
|
record += f"**作者**:{entry[5]}\n"
|
||||||
record += f"**上传时间**:{entry[4]}\n"
|
record += f"**上传时间**:{entry[4]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
record_md(record)
|
record_md(record)
|
||||||
return result
|
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
def Src_4hou(e_hour, Is_short):
|
def Src_4hou(e_hour):
|
||||||
if not os.path.exists('./resources/db/4hou.db'):
|
if not os.path.exists('./resources/db/4hou.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -147,17 +164,27 @@ def Src_4hou(e_hour, Is_short):
|
|||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return ""
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_4hou(4, False)
|
results = Src_4hou(4)
|
||||||
if reslts != "":
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 打印长文本结果
|
||||||
|
print("长文本结果:")
|
||||||
|
print(result_long)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 打印分块的短文本结果
|
||||||
|
print("分块的短文本结果:")
|
||||||
|
for short_result in short_results:
|
||||||
|
print(short_result)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
print("嘶吼数据为空,跳过执行。")
|
print("嘶吼数据为空,跳过执行。")
|
||||||
|
|
||||||
|
Binary file not shown.
Binary file not shown.
@ -102,29 +102,46 @@ def record_md(result, filename="./resources/history/sec_news.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[6]}\n来源:{entry[3]}\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[6]}\n来源:{entry[3]}\n"
|
||||||
result += f"上传时间:{entry[5]}\n"
|
result_long += f"上传时间:{entry[5]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
elif Is_short == True:
|
|
||||||
result += f"文章:{entry[1]}\n"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"链接:{entry[2]}\n上传时间:{entry[5]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:{entry[1]}\n"
|
||||||
|
f"链接:{entry[2]}\n上传时间:{entry[5]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
||||||
record += f"**作者**:{entry[6]}\n"
|
record += f"**作者**:{entry[6]}\n"
|
||||||
record += f"**来源**:{entry[3]}\n"
|
record += f"**来源**:{entry[3]}\n"
|
||||||
record += f"**上传时间**:{entry[5]}\n"
|
record += f"**上传时间**:{entry[5]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
record_md(record)
|
record_md(record)
|
||||||
return result
|
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
def Src_anquanke(e_hour, Is_short):
|
def Src_anquanke(e_hour):
|
||||||
if not os.path.exists('./resources/db/anquanke.db'):
|
if not os.path.exists('./resources/db/anquanke.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -143,15 +160,26 @@ def Src_anquanke(e_hour, Is_short):
|
|||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_anquanke(4, False)
|
results = Src_anquanke(4)
|
||||||
if reslts != False:
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 打印长文本结果
|
||||||
|
print("长文本结果:")
|
||||||
|
print(result_long)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 打印分块的短文本结果
|
||||||
|
print("分块的短文本结果:")
|
||||||
|
for short_result in short_results:
|
||||||
|
print(short_result)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
|
@ -137,30 +137,48 @@ def record_md(result, filename="./resources/history/baidu_news.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
|
||||||
result += f"发布时间:{entry[4]}\n"
|
result_long += f"发布时间:{entry[4]}\n"
|
||||||
result += f"来源:{entry[5]}\n"
|
result_long += f"来源:{entry[5]}\n"
|
||||||
result += f"关键词:{entry[6]}\n"
|
result_long += f"关键词:{entry[6]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
if Is_short == True:
|
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"上传时间:{entry[4]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:[{entry[1]}]({entry[2]})"
|
||||||
|
f"上传时间:{entry[4]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
|
||||||
record += f"**上传时间**:{entry[4]}\n"
|
record += f"**上传时间**:{entry[4]}\n"
|
||||||
record += f"**来源**:{entry[5]}\n"
|
record += f"**来源**:{entry[5]}\n"
|
||||||
record += f"**关键词**:{entry[6]}\n"
|
record += f"**关键词**:{entry[6]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
record_md(record)
|
|
||||||
return result
|
|
||||||
|
|
||||||
def Src_baidu(Is_short):
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
|
record_md(record)
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
|
def Src_baidu():
|
||||||
if not os.path.exists('./resources/db/baidu.db'):
|
if not os.path.exists('./resources/db/baidu.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -179,16 +197,27 @@ def Src_baidu(Is_short):
|
|||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_baidu(False)
|
results = Src_baidu()
|
||||||
if reslts != False:
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 打印长文本结果
|
||||||
|
print("长文本结果:")
|
||||||
|
print(result_long)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 打印分块的短文本结果
|
||||||
|
print("分块的短文本结果:")
|
||||||
|
for short_result in short_results:
|
||||||
|
print(short_result)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
print("微信公众号数据为空,跳过执行。")
|
print("百度数据为空,跳过执行。")
|
||||||
|
@ -147,31 +147,49 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n"
|
||||||
result += f"作者:{entry[5]}\n"
|
result_long += f"作者:{entry[5]}\n"
|
||||||
result += f"上传时间:{entry[4]}\n"
|
result_long += f"上传时间:{entry[4]}\n"
|
||||||
result += f"简介:{entry[3]}\n"
|
result_long += f"简介:{entry[3]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
if Is_short == True:
|
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"上传时间:{entry[4]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:[{entry[1]}]({entry[2]})\n"
|
||||||
|
f"上传时间:{entry[4]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
||||||
record += f"**作者**:{entry[5]}\n"
|
record += f"**作者**:{entry[5]}\n"
|
||||||
record += f"**上传时间**:{entry[4]}\n"
|
record += f"**上传时间**:{entry[4]}\n"
|
||||||
record += f"**简介**:{entry[3]}\n"
|
record += f"**简介**:{entry[3]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
record_md(record)
|
record_md(record)
|
||||||
return result
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
|
|
||||||
def Src_doonsec(Is_short, Doonsec_switch, Doonsec):
|
def Src_doonsec(Doonsec_switch, Doonsec):
|
||||||
if not os.path.exists('./resources/db/doonsec.db'):
|
if not os.path.exists('./resources/db/doonsec.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -180,25 +198,36 @@ def Src_doonsec(Is_short, Doonsec_switch, Doonsec):
|
|||||||
# clear_table()
|
# clear_table()
|
||||||
|
|
||||||
# 获取 JSON 数据
|
# 获取 JSON 数据
|
||||||
M_doonsec_data = get_doonsec_json()
|
doonsec_data = get_doonsec_json()
|
||||||
|
|
||||||
# 插入数据到数据库
|
# 插入数据到数据库
|
||||||
insert_data(M_doonsec_data)
|
insert_data(doonsec_data)
|
||||||
|
|
||||||
# 查询指定时间段内的数据
|
# 查询指定时间段内的数据
|
||||||
filtered_articles = select_articles(Doonsec_switch, Doonsec)
|
filtered_articles = select_articles(Doonsec_switch, Doonsec)
|
||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_doonsec(False, False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"] )
|
results = Src_doonsec(False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"])
|
||||||
if reslts != False:
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 写入长文本结果
|
||||||
|
with open("./1.txt", "a", encoding="utf-8") as f:
|
||||||
|
f.write(result_long)
|
||||||
|
f.write("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 写入分块的短文本结果
|
||||||
|
for short_result in short_results:
|
||||||
|
with open("./2.txt", "a", encoding="utf-8") as f:
|
||||||
|
f.write(short_result)
|
||||||
|
f.write("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
|
@ -108,28 +108,45 @@ def record_md(result, filename="./resources/history/sec_news.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[5]}\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[5]}\n"
|
||||||
result += f"上传时间:{entry[4]}\n"
|
result_long += f"上传时间:{entry[4]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
elif Is_short == True:
|
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"上传时间:{entry[4]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:[{entry[1]}]({entry[2]})\n"
|
||||||
|
f"上传时间:{entry[4]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
||||||
record += f"**类型**:{entry[5]}\n"
|
record += f"**类型**:{entry[5]}\n"
|
||||||
record += f"**上传时间**:{entry[4]}\n"
|
record += f"**上传时间**:{entry[4]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
record_md(record)
|
record_md(record)
|
||||||
return result
|
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
def Src_freebuf(e_hour, Is_short):
|
def Src_freebuf(e_hour):
|
||||||
if not os.path.exists('./resources/db/freebuf.db'):
|
if not os.path.exists('./resources/db/freebuf.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -148,15 +165,26 @@ def Src_freebuf(e_hour, Is_short):
|
|||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_freebuf(4, False)
|
results = Src_freebuf(24)
|
||||||
if reslts != False:
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 打印长文本结果
|
||||||
|
print("长文本结果:")
|
||||||
|
print(result_long)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 打印分块的短文本结果
|
||||||
|
print("分块的短文本结果:")
|
||||||
|
for short_result in short_results:
|
||||||
|
print(short_result)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
|
@ -297,59 +297,81 @@ def record_md(result, filename="./resources/history/github.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short, choice):
|
def get_filtered_articles(entries, choice):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
|
||||||
if choice == 1:
|
if choice == 1:
|
||||||
result += f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
|
# 构建长文本结果
|
||||||
result += f"项目描述:{entry[3]}\n"
|
result_long += f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
|
||||||
result += f"上传时间:{entry[4]}\n"
|
result_long += f"项目描述:{entry[3]}\n"
|
||||||
result += f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n"
|
result_long += f"上传时间:{entry[4]}\n"
|
||||||
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
result_long += f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n"
|
||||||
|
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 构建短文本结果并进行分块处理
|
||||||
|
current_entry = (
|
||||||
|
f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
|
||||||
|
f"上传时间:{entry[4]}\n"
|
||||||
|
f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
elif choice == 2:
|
elif choice == 2:
|
||||||
result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
# 构建长文本结果
|
||||||
result += f"更新描述:{entry[3]}\n"
|
result_long += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
||||||
result += f"更新时间:{entry[4]}\n"
|
result_long += f"更新描述:{entry[3]}\n"
|
||||||
result += f"提交者:{entry[5]},[点此查看提交详情]({entry[7]})\n"
|
result_long += f"更新时间:{entry[4]}\n"
|
||||||
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
result_long += f"提交者:{entry[5]},[点此查看提交详情]({entry[7]})\n"
|
||||||
|
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 构建短文本结果并进行分块处理
|
||||||
|
current_entry = (
|
||||||
|
f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
||||||
|
f"更新时间:{entry[4]}\n"
|
||||||
|
f"提交者:{entry[5]},[点此查看提交详情]({entry[7]})\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
elif choice == 3:
|
elif choice == 3:
|
||||||
result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
# 构建长文本结果
|
||||||
result += f"项目描述:{entry[3]}\n"
|
result_long += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
||||||
result += f"上传时间:{entry[4]}\n"
|
result_long += f"项目描述:{entry[3]}\n"
|
||||||
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
result_long += f"上传时间:{entry[4]}\n"
|
||||||
|
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 构建短文本结果并进行分块处理
|
||||||
|
current_entry = (
|
||||||
|
f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
||||||
|
f"上传时间:{entry[4]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
elif choice == 4:
|
elif choice == 4:
|
||||||
result += f"【{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n"
|
# 构建长文本结果
|
||||||
result += f"发布时间:{entry[2]}\n"
|
result_long += f"【{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n"
|
||||||
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
result_long += f"发布时间:{entry[2]}\n"
|
||||||
elif Is_short == True:
|
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
||||||
if choice == 1:
|
|
||||||
result += f"关键词【{entry[7]}】发现新项目:[{entry[1]}]({entry[2]})\n"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"上传时间:{entry[4]}\n"
|
current_entry = (
|
||||||
result += f"开发语言:{entry[6]}\t\t作者:{entry[5]}\n"
|
f"【{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n"
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"发布时间:{entry[2]}\n"
|
||||||
elif choice == 2:
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
)
|
||||||
result += f"更新描述:{entry[3]}\n"
|
|
||||||
result += f"更新时间:{entry[4]}\n"
|
temp_result = result_short + current_entry
|
||||||
result += f"提交者:{entry[5]},[点此查看提交详情]({entry[7]})\n"
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
short_results.append(result_short)
|
||||||
elif choice == 3:
|
result_short = current_entry
|
||||||
result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
|
else:
|
||||||
result += f"项目描述:{entry[3]}\n"
|
result_short = temp_result
|
||||||
result += f"上传时间:{entry[4]}\n"
|
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
|
||||||
elif choice == 4:
|
|
||||||
result += f"【{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n"
|
|
||||||
result += f"发布时间:{entry[2]}\n"
|
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
|
||||||
|
|
||||||
if choice == 1:
|
if choice == 1:
|
||||||
record += f"#### 关键词【{entry[7]}】发现新项目:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
|
||||||
record += f"**项目描述**:{entry[3]}\n"
|
record += f"**项目描述**:{entry[3]}\n"
|
||||||
record += f"**上传时间**:{entry[4]}\n"
|
record += f"**上传时间**:{entry[4]}\n"
|
||||||
record += f"**开发语言**:{entry[6]}\n**作者**:{entry[5]}\n"
|
record += f"**开发语言**:{entry[7]}\n**作者**:{entry[5]}\n"
|
||||||
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
||||||
elif choice == 2:
|
elif choice == 2:
|
||||||
record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
|
||||||
@ -367,11 +389,15 @@ def get_filtered_articles(entries, Is_short, choice):
|
|||||||
record += f"**发布时间**:{entry[2]}\n"
|
record += f"**发布时间**:{entry[2]}\n"
|
||||||
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
record_md(record)
|
record_md(record)
|
||||||
return result
|
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
def Src_github(e_hour, Is_short):
|
def Src_github(e_hour):
|
||||||
if not os.path.exists('./resources/db/github.db'):
|
if not os.path.exists('./resources/db/github.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -385,35 +411,48 @@ def Src_github(e_hour, Is_short):
|
|||||||
# 查询指定时间段内的数据
|
# 查询指定时间段内的数据
|
||||||
keyword_data, repo_data, user_data, release_data = select_articles(e_hour)
|
keyword_data, repo_data, user_data, release_data = select_articles(e_hour)
|
||||||
|
|
||||||
|
results = []
|
||||||
if keyword_data:
|
if keyword_data:
|
||||||
result_1 = get_filtered_articles(keyword_data, Is_short, 1)
|
result_long_1, short_results_1 = get_filtered_articles(keyword_data, 1)
|
||||||
|
results.append((result_long_1, short_results_1))
|
||||||
else:
|
else:
|
||||||
result_1 = ""
|
results.append(("", []))
|
||||||
|
|
||||||
if repo_data:
|
if repo_data:
|
||||||
result_2 = get_filtered_articles(repo_data, Is_short, 2)
|
result_long_2, short_results_2 = get_filtered_articles(repo_data, 2)
|
||||||
|
results.append((result_long_2, short_results_2))
|
||||||
else:
|
else:
|
||||||
result_2 = ""
|
results.append(("", []))
|
||||||
|
|
||||||
if user_data:
|
if user_data:
|
||||||
result_3 = get_filtered_articles(user_data, Is_short, 3)
|
result_long_3, short_results_3 = get_filtered_articles(user_data, 3)
|
||||||
|
results.append((result_long_3, short_results_3))
|
||||||
else:
|
else:
|
||||||
result_3 = ""
|
results.append(("", []))
|
||||||
|
|
||||||
if release_data:
|
if release_data:
|
||||||
result_4 = get_filtered_articles(release_data, Is_short, 4)
|
result_long_4, short_results_4 = get_filtered_articles(release_data, 4)
|
||||||
|
results.append((result_long_4, short_results_4))
|
||||||
else:
|
else:
|
||||||
result_4 = ""
|
results.append(("", []))
|
||||||
return result_1, result_2, result_3, result_4
|
|
||||||
|
return results
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
result_1, result_2, result_3, result_4 = Src_github(240, False)
|
results = Src_github(240)
|
||||||
if result_1 != "":
|
for i, (result_long, short_results) in enumerate(results, start=1):
|
||||||
print(result_1)
|
if result_long != "":
|
||||||
if result_2 != "":
|
print(f"长文本结果 {i}:")
|
||||||
print(result_2)
|
print(result_long)
|
||||||
if result_3 != "":
|
print("\n" + "-" * 10 + "\n")
|
||||||
print(result_3)
|
|
||||||
if result_4 != "":
|
if short_results:
|
||||||
print(result_4)
|
print(f"分块的短文本结果 {i}:")
|
||||||
if result_1 == "" and result_2 == "" and result_3 == "" and result_4 == "":
|
for short_result in short_results:
|
||||||
|
print(short_result)
|
||||||
|
print("\n" + "-" * 10 + "\n")
|
||||||
|
|
||||||
|
if all(result_long == "" and not short_results for result_long, short_results in results):
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 10)
|
print("-" * 10)
|
||||||
print("github数据为空,跳过执行。")
|
print("github数据为空,跳过执行。")
|
@ -99,30 +99,47 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n来源:{entry[3]}\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n来源:{entry[3]}\n"
|
||||||
result += f"上传时间:{entry[5]}\n"
|
result_long += f"上传时间:{entry[5]}\n"
|
||||||
result += f"描述:{entry[4]}\n"
|
result_long += f"描述:{entry[4]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
if Is_short == True:
|
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"上传时间:{entry[5]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:[{entry[1]}]({entry[2]})\n"
|
||||||
|
f"上传时间:{entry[5]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
||||||
record += f"**来源**:{entry[3]}\n"
|
record += f"**来源**:{entry[3]}\n"
|
||||||
record += f"**上传时间**:{entry[5]}\n"
|
record += f"**上传时间**:{entry[5]}\n"
|
||||||
record += f"**描述**:{entry[4]}\n"
|
record += f"**描述**:{entry[4]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
record_md(record)
|
record_md(record)
|
||||||
return result
|
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
def Src_qianxin(e_hour, Is_short):
|
def Src_qianxin(e_hour):
|
||||||
if not os.path.exists('./resources/db/qianxin.db'):
|
if not os.path.exists('./resources/db/qianxin.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -141,15 +158,26 @@ def Src_qianxin(e_hour, Is_short):
|
|||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_qianxin(4, False)
|
results = Src_qianxin(4)
|
||||||
if reslts != False:
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 打印长文本结果
|
||||||
|
print("长文本结果:")
|
||||||
|
print(result_long)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 打印分块的短文本结果
|
||||||
|
print("分块的短文本结果:")
|
||||||
|
for short_result in short_results:
|
||||||
|
print(short_result)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
|
@ -106,30 +106,47 @@ def record_md(result, filename="./resources/history/sec_news.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[3]}\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[3]}\n"
|
||||||
result += f"上传时间:{entry[5]}\n"
|
result_long += f"上传时间:{entry[5]}\n"
|
||||||
result += f"{entry[4]}\n"
|
result_long += f"{entry[4]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
if Is_short == True:
|
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"上传时间:{entry[5]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:[{entry[1]}]({entry[2]})\n"
|
||||||
|
f"上传时间:{entry[5]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
||||||
record += f"**类型**:{entry[3]}\n"
|
record += f"**类型**:{entry[3]}\n"
|
||||||
record += f"**上传时间**:{entry[5]}\n"
|
record += f"**上传时间**:{entry[5]}\n"
|
||||||
record += f"{entry[4]}\n"
|
record += f"{entry[4]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
record_md(record)
|
record_md(record)
|
||||||
return result
|
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
def Src_seebug(e_hour, Is_short):
|
def Src_seebug(e_hour):
|
||||||
if not os.path.exists('./resources/db/seebug.db'):
|
if not os.path.exists('./resources/db/seebug.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -148,15 +165,26 @@ def Src_seebug(e_hour, Is_short):
|
|||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_seebug(100, False)
|
results = Src_seebug(100)
|
||||||
if reslts != False:
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 打印长文本结果
|
||||||
|
print("长文本结果:")
|
||||||
|
print(result_long)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 打印分块的短文本结果
|
||||||
|
print("分块的短文本结果:")
|
||||||
|
for short_result in short_results:
|
||||||
|
print(short_result)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
|
@ -139,30 +139,48 @@ def record_md(result, filename="./resources/history/wx_news.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
|
||||||
result += f"上传时间:{entry[4]}\n"
|
result_long += f"上传时间:{entry[4]}\n"
|
||||||
result += f"作者:{entry[5]}\n"
|
result_long += f"作者:{entry[5]}\n"
|
||||||
result += f"关键词:{entry[6]}\n"
|
result_long += f"关键词:{entry[6]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
if Is_short == True:
|
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"上传时间:{entry[4]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:[{entry[1]}]({entry[2]})"
|
||||||
|
f"上传时间:{entry[4]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
|
||||||
record += f"**上传时间**:{entry[4]}\n"
|
record += f"**上传时间**:{entry[4]}\n"
|
||||||
record += f"**作者**:{entry[5]}\n"
|
record += f"**作者**:{entry[5]}\n"
|
||||||
record += f"**关键词**:{entry[6]}\n"
|
record += f"**关键词**:{entry[6]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
record_md(record)
|
|
||||||
return result
|
|
||||||
|
|
||||||
def Src_sougou_wx(Is_short):
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
|
record_md(record)
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
|
def Src_sougou_wx():
|
||||||
if not os.path.exists('./resources/db/sougou-wx.db'):
|
if not os.path.exists('./resources/db/sougou-wx.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -181,15 +199,26 @@ def Src_sougou_wx(Is_short):
|
|||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_sougou_wx(False)
|
results = Src_sougou_wx()
|
||||||
if reslts != False:
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 写入长文本结果
|
||||||
|
with open("./1.txt", "a", encoding="utf-8") as f:
|
||||||
|
f.write(result_long)
|
||||||
|
f.write("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 写入分块的短文本结果
|
||||||
|
for short_result in short_results:
|
||||||
|
with open("./2.txt", "a", encoding="utf-8") as f:
|
||||||
|
f.write(short_result)
|
||||||
|
f.write("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
|
@ -105,27 +105,44 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
|
|||||||
with open(filename, 'w', encoding='utf-8') as file:
|
with open(filename, 'w', encoding='utf-8') as file:
|
||||||
file.write(new_content)
|
file.write(new_content)
|
||||||
|
|
||||||
def get_filtered_articles(entries, Is_short):
|
def get_filtered_articles(entries):
|
||||||
result = ""
|
result_long = ""
|
||||||
|
result_short = ""
|
||||||
record = ""
|
record = ""
|
||||||
|
short_results = []
|
||||||
|
|
||||||
for entry in entries:
|
for entry in entries:
|
||||||
if Is_short == False:
|
# 构建长文本结果
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n"
|
result_long += f"文章:[{entry[1]}]({entry[2]})\n"
|
||||||
result += f"上传时间:{entry[3]}\n"
|
result_long += f"上传时间:{entry[3]}\n"
|
||||||
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
if Is_short == False:
|
|
||||||
result += f"文章:[{entry[1]}]({entry[2]})\n"
|
# 构建短文本结果并进行分块处理
|
||||||
result += f"上传时间:{entry[3]}\n"
|
current_entry = (
|
||||||
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
f"文章:[{entry[1]}]({entry[2]})\n"
|
||||||
|
f"上传时间:{entry[3]}\n"
|
||||||
|
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
)
|
||||||
|
temp_result = result_short + current_entry
|
||||||
|
if len(temp_result.encode('utf-8')) > 4096:
|
||||||
|
short_results.append(result_short)
|
||||||
|
result_short = current_entry
|
||||||
|
else:
|
||||||
|
result_short = temp_result
|
||||||
|
|
||||||
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
|
||||||
record += f"**上传时间**:{entry[3]}\n"
|
record += f"**上传时间**:{entry[3]}\n"
|
||||||
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
|
||||||
|
|
||||||
|
# 处理最后一个结果
|
||||||
|
if result_short:
|
||||||
|
short_results.append(result_short)
|
||||||
|
|
||||||
record_md(record)
|
record_md(record)
|
||||||
return result
|
|
||||||
|
|
||||||
|
return result_long, short_results
|
||||||
|
|
||||||
def Src_xianzhi(e_hour, Is_short):
|
def Src_xianzhi(e_hour):
|
||||||
if not os.path.exists('./resources/db/xianzhi.db'):
|
if not os.path.exists('./resources/db/xianzhi.db'):
|
||||||
# 创建数据库和表
|
# 创建数据库和表
|
||||||
create_database()
|
create_database()
|
||||||
@ -144,15 +161,26 @@ def Src_xianzhi(e_hour, Is_short):
|
|||||||
# print(filtered_articles)
|
# print(filtered_articles)
|
||||||
|
|
||||||
if filtered_articles:
|
if filtered_articles:
|
||||||
results = get_filtered_articles(filtered_articles, Is_short)
|
result_long, short_results = get_filtered_articles(filtered_articles)
|
||||||
return results
|
return result_long, short_results
|
||||||
else:
|
else:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
if __name__ == "__main__":
|
if __name__ == "__main__":
|
||||||
reslts = Src_xianzhi(4, False)
|
results = Src_xianzhi(124)
|
||||||
if reslts != False:
|
if results != False:
|
||||||
print(reslts)
|
result_long, short_results = results
|
||||||
|
|
||||||
|
# 打印长文本结果
|
||||||
|
print("长文本结果:")
|
||||||
|
print(result_long)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
|
|
||||||
|
# 打印分块的短文本结果
|
||||||
|
print("分块的短文本结果:")
|
||||||
|
for short_result in short_results:
|
||||||
|
print(short_result)
|
||||||
|
print("\n" + "-" * 40 + "\n")
|
||||||
else:
|
else:
|
||||||
# 如果为空,则跳过执行
|
# 如果为空,则跳过执行
|
||||||
print("-" * 40)
|
print("-" * 40)
|
||||||
|
@ -2,7 +2,7 @@
|
|||||||
- 准点发送的文章在定点推送模式下可能会被遗漏推送
|
- 准点发送的文章在定点推送模式下可能会被遗漏推送
|
||||||
`已通过增加时间范围功能改善此问题,彻底解决需要重构代码`
|
`已通过增加时间范围功能改善此问题,彻底解决需要重构代码`
|
||||||
- 钉钉/企业微信/蓝信webhook存在字节长度限制,需要优化程序推送逻辑
|
- 钉钉/企业微信/蓝信webhook存在字节长度限制,需要优化程序推送逻辑
|
||||||
`尽力改善中,彻底解决需重构代码`
|
`重构了短文本推送机制,已解决此bug`
|
||||||
- 首次运行时若抓取RSS源失败,筛选模块无法获取json文件时会导致中断
|
- 首次运行时若抓取RSS源失败,筛选模块无法获取json文件时会导致中断
|
||||||
`为项目添加一个初始json文件`
|
`为项目添加一个初始json文件`
|
||||||
- 程序运行会产生越来越巨大的DB文件与Markdown文件,同时web网页显示的内容也会非常长,不利于节省服务器流量与加载速度
|
- 程序运行会产生越来越巨大的DB文件与Markdown文件,同时web网页显示的内容也会非常长,不利于节省服务器流量与加载速度
|
||||||
@ -48,3 +48,4 @@
|
|||||||
- 2025年01月10日下午:上线了百度搜索内容监测
|
- 2025年01月10日下午:上线了百度搜索内容监测
|
||||||
- 2025年01月14日晚:添加了网站读取文件逻辑仅读取限制数量的文件,避免文件过大导致程序崩溃或是阅读困难
|
- 2025年01月14日晚:添加了网站读取文件逻辑仅读取限制数量的文件,避免文件过大导致程序崩溃或是阅读困难
|
||||||
- 2025年01月15日早:优化并精简了web程序的代码
|
- 2025年01月15日早:优化并精简了web程序的代码
|
||||||
|
- 2025年01月22日:完善短文本推送机制,现已可完美支持推送至企业微信、钉钉、蓝信、微信等,等待后续开发
|
@ -1,12 +1,12 @@
|
|||||||
# 飞书相关配置信息
|
# 飞书相关配置信息
|
||||||
# fs_activate: True
|
# fs_activate: True
|
||||||
fs_activate: True
|
fs_activate: False
|
||||||
fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74 # 此处填写token,记得冒号后空一格,如aa04a02f-d7bf-4279-bd48-44c4f28c8f74
|
fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74 # 此处填写token,记得冒号后空一格,如aa04a02f-d7bf-4279-bd48-44c4f28c8f74
|
||||||
fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥,记得冒号后空一格,如4tq65T4jm1MO2IlxvHxBWe
|
fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥,记得冒号后空一格,如4tq65T4jm1MO2IlxvHxBWe
|
||||||
|
|
||||||
# 企业微信相关配置信息
|
# 企业微信相关配置信息
|
||||||
wx_activate: False
|
wx_activate: True
|
||||||
wx_key: # 此处填写token,记得冒号后空一格,如9a3dd6ff-75d6-4208-bc4b-77724a5805d6
|
wx_key: 9a3dd6ff-75d6-4208-bc4b-77724a5805d6 # 此处填写token,记得冒号后空一格,如9a3dd6ff-75d6-4208-bc4b-77724a5805d6
|
||||||
|
|
||||||
# 钉钉相关配置信息
|
# 钉钉相关配置信息
|
||||||
ding_activate: False
|
ding_activate: False
|
||||||
@ -27,7 +27,7 @@ e_hour: 4 # 程序运行时间间隔
|
|||||||
time_mode: 1
|
time_mode: 1
|
||||||
# 0:定时运行模式,仅在指定时间运行(参照Core.py中设置)
|
# 0:定时运行模式,仅在指定时间运行(参照Core.py中设置)
|
||||||
# 1:启用循环,一定间隔时间后运行
|
# 1:启用循环,一定间隔时间后运行
|
||||||
mode: [1, 2] # 运行模式,可多选
|
mode: [0] # 运行模式,可多选
|
||||||
# 0:启用RSS抓取模式
|
# 0:启用RSS抓取模式
|
||||||
# 1:启用搜狗-微信公众号文章监测
|
# 1:启用搜狗-微信公众号文章监测
|
||||||
# 2:启用github项目监测
|
# 2:启用github项目监测
|
||||||
|
File diff suppressed because one or more lines are too long
@ -1,162 +1,162 @@
|
|||||||
[
|
[
|
||||||
{
|
{
|
||||||
"guid": "https://www.anquanke.com/post/id/303291",
|
"guid": "https://www.anquanke.com/post/id/303728",
|
||||||
"title": "2024年度十大网络安全热点事件盘点:时代暗涌下的安全危机",
|
"title": "最高级!360获评工信部CAPPVD“三星技术支撑单位”称号",
|
||||||
"author": " 安全客",
|
"author": " 安全客",
|
||||||
"description": null,
|
"description": null,
|
||||||
"source": "微信",
|
"source": "微信",
|
||||||
"pubDate": "2025-01-06 11:00:15"
|
"pubDate": "2025-01-22 11:09:25"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://www.anquanke.com/post/id/303282",
|
"guid": "https://www.anquanke.com/post/id/303725",
|
||||||
"title": "关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断",
|
"title": "cve-2024-12857: AdForest 主题中的关键漏洞允许完全接管帐户,数千网站面临风险",
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "TheHackersNews",
|
|
||||||
"pubDate": "2025-01-06 10:52:56"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303279",
|
|
||||||
"title": "项目隔离: PyPI 抵御恶意软件的新防线",
|
|
||||||
"author": " 安全客",
|
"author": " 安全客",
|
||||||
"description": null,
|
"description": null,
|
||||||
"source": "securityonline",
|
"source": "securityonline",
|
||||||
"pubDate": "2025-01-06 10:48:40"
|
"pubDate": "2025-01-22 11:04:02"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://www.anquanke.com/post/id/303275",
|
"guid": "https://www.anquanke.com/post/id/303722",
|
||||||
"title": "CVE-2024-12912 & CVE-2024-13062: 华硕路由器面临风险",
|
"title": "新型 Mirai 变种 Murdoc_Botnet 通过物联网漏洞发起 DDoS 攻击",
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "securityonline",
|
|
||||||
"pubDate": "2025-01-06 10:37:22"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303270",
|
|
||||||
"title": "35+ 款 Chrome 浏览器扩展程序遭入侵:250 万用户面临风险",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "securityonline",
|
|
||||||
"pubDate": "2025-01-06 10:21:36"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303267",
|
|
||||||
"title": "通过恶意 npm 软件包对以太坊开发人员进行供应链攻击",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "securityonline",
|
|
||||||
"pubDate": "2025-01-06 10:11:35"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303288",
|
|
||||||
"title": "每分钟就有 4,080 份记录在数据泄露事件中受损",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "helpnetsecurity",
|
|
||||||
"pubDate": "2025-01-06 10:09:03"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303264",
|
|
||||||
"title": "SysBumps:在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "securityonline",
|
|
||||||
"pubDate": "2025-01-06 10:02:40"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303285",
|
|
||||||
"title": "现代 CISO 是组织成功的基石",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "helpnetsecurity",
|
|
||||||
"pubDate": "2025-01-06 10:01:09"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303259",
|
|
||||||
"title": "CVE-2025-22275 (CVSS 9.3):iTerm2 修补了暴露用户输入和输出的重大安全漏洞",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "securityonline",
|
|
||||||
"pubDate": "2025-01-06 09:55:57"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303256",
|
|
||||||
"title": "黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "therecord",
|
|
||||||
"pubDate": "2025-01-06 09:51:53"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303249",
|
|
||||||
"title": "2025年数字安全十大趋势预测:挑战、机遇、变革与战略布局",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "微信",
|
|
||||||
"pubDate": "2025-01-03 11:28:51"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303246",
|
|
||||||
"title": "已打补丁但仍有漏洞 Windows BitLocker 加密再次被绕过",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "securityonline",
|
|
||||||
"pubDate": "2025-01-03 11:21:09"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303243",
|
|
||||||
"title": "CVE-2024-21182: 针对严重 WebLogic 漏洞发布 PoC 漏洞利用代码",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "securityonline",
|
|
||||||
"pubDate": "2025-01-03 11:15:29"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303240",
|
|
||||||
"title": "日本最大移动运营商称网络攻击中断了部分服务",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "therecord",
|
|
||||||
"pubDate": "2025-01-03 11:02:09"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303236",
|
|
||||||
"title": "新的 DoubleClickjacking 攻击利用双击来劫持帐户",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "bleepingcomputer",
|
|
||||||
"pubDate": "2025-01-03 10:53:02"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303233",
|
|
||||||
"title": "揭开虚假人气的面纱: 研究揭露 GitHub 上的 450 万颗假星",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "securityonline",
|
|
||||||
"pubDate": "2025-01-03 10:41:42"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303230",
|
|
||||||
"title": "苹果公司将支付 9500 万美元解决 Siri 隐私诉讼",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "therecord",
|
|
||||||
"pubDate": "2025-01-03 10:29:54"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303227",
|
|
||||||
"title": "跨域攻击: 现代安全面临的日益严重的威胁以及如何应对这些威胁",
|
|
||||||
"author": " 安全客",
|
|
||||||
"description": null,
|
|
||||||
"source": "TheHackersNews",
|
|
||||||
"pubDate": "2025-01-03 10:21:30"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"guid": "https://www.anquanke.com/post/id/303224",
|
|
||||||
"title": "假冒 7-Zip 漏洞代码源于人工智能生成的误解",
|
|
||||||
"author": " 安全客",
|
"author": " 安全客",
|
||||||
"description": null,
|
"description": null,
|
||||||
"source": "hackread",
|
"source": "hackread",
|
||||||
"pubDate": "2025-01-03 10:12:25"
|
"pubDate": "2025-01-22 10:59:38"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303719",
|
||||||
|
"title": "2024年,Redline、Vidar和Raccoon恶意软件窃取了10亿个密码",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "hackread",
|
||||||
|
"pubDate": "2025-01-22 10:52:28"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303716",
|
||||||
|
"title": "CVE-2025-21298 检测: Microsoft Outlook 中的严重零点击 OLE 漏洞会导致远程代码执行",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "socprime",
|
||||||
|
"pubDate": "2025-01-22 10:40:03"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303713",
|
||||||
|
"title": "Bitbucket 服务因全球大停机而“严重瘫痪”",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "bleepingcomputer",
|
||||||
|
"pubDate": "2025-01-22 10:34:25"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303710",
|
||||||
|
"title": "假冒的 Homebrew Google 广告以恶意软件为目标的 Mac 用户",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "bleepingcomputer",
|
||||||
|
"pubDate": "2025-01-22 10:25:40"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303707",
|
||||||
|
"title": "Cloudflare 缓解了破纪录的 5.6 Tbps DDoS 攻击",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "bleepingcomputer",
|
||||||
|
"pubDate": "2025-01-22 10:16:33"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303704",
|
||||||
|
"title": "”偷偷摸摸的日志“微软欺骗计划避开了双因素安全系统",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "techrepublic",
|
||||||
|
"pubDate": "2025-01-22 10:04:54"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303701",
|
||||||
|
"title": "前中情局分析员承认泄露绝密文件罪",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "securityaffairs",
|
||||||
|
"pubDate": "2025-01-22 09:50:01"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303696",
|
||||||
|
"title": "360获中国计算机行业协会网络和数据安全专业委员会卓越贡献奖",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "微信",
|
||||||
|
"pubDate": "2025-01-21 14:31:24"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303693",
|
||||||
|
"title": "CVE-2025-22146 (CVSS 9.1): 关键哨兵漏洞允许账户接管",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "securityonline",
|
||||||
|
"pubDate": "2025-01-21 14:19:01"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303690",
|
||||||
|
"title": "TP-Link 漏洞: 针对 CVE-2024-54887 的 PoC 漏洞利用揭示了远程代码执行风险",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "securityonline",
|
||||||
|
"pubDate": "2025-01-21 11:35:05"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303687",
|
||||||
|
"title": "CVE-2025-0411:7-Zip 安全漏洞导致代码执行 - 立即更新",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "securityonline",
|
||||||
|
"pubDate": "2025-01-21 11:22:35"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303684",
|
||||||
|
"title": "工业交换机漏洞可被远程利用",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "govinfosecurity",
|
||||||
|
"pubDate": "2025-01-21 11:14:39"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303681",
|
||||||
|
"title": "物联网僵尸网络助长针对全球组织的大规模 DDoS 攻击",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "securityonline",
|
||||||
|
"pubDate": "2025-01-21 11:06:58"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303678",
|
||||||
|
"title": "ChatGPT Crawler漏洞:通过HTTP请求进行DDOS攻击",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "securityonline",
|
||||||
|
"pubDate": "2025-01-21 10:59:47"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303675",
|
||||||
|
"title": "甲骨文 2025 年 1 月关键补丁更新:解决 320 个安全漏洞",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "securityonline",
|
||||||
|
"pubDate": "2025-01-21 10:55:03"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303670",
|
||||||
|
"title": "黑客利用 AnyDesk 冒充 CERT-UA 发起网络攻击",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "socprime",
|
||||||
|
"pubDate": "2025-01-21 10:24:35"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"guid": "https://www.anquanke.com/post/id/303667",
|
||||||
|
"title": "黑客声称窃取源代码,HPE 对漏洞进行调查",
|
||||||
|
"author": " 安全客",
|
||||||
|
"description": null,
|
||||||
|
"source": "bleepingcomputer",
|
||||||
|
"pubDate": "2025-01-21 09:51:58"
|
||||||
}
|
}
|
||||||
]
|
]
|
File diff suppressed because it is too large
Load Diff
@ -1,161 +1,160 @@
|
|||||||
[
|
[
|
||||||
{
|
{
|
||||||
"title": "恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户",
|
"title": "新的AI安全在2025年正对CISO及其团队构成挑战",
|
||||||
"link": "https://www.freebuf.com/news/419140.html",
|
"link": "https://www.freebuf.com/news/420445.html",
|
||||||
"description": "一种名为PLAYFULGHOST的新恶意软件具有多种信息收集功能,例如键盘记录、屏幕捕获、音频捕获、远程 shell 以及文件传输/执行。",
|
"description": "AI 创新步伐的加快、日益复杂的网络威胁和新的监管政策将要求首席信息安全官 (CISO) 驾驭更复杂的环境。",
|
||||||
"body": "<p>网络安全研究人员发现一种名为PLAYFULGHOST的新恶意软件,它具有多种信息收集功能,例如键盘记录、屏幕捕获、音频捕获、远程 shell 以及文件传输/执行。</p><p>据谷歌安全团队称,该后门与一种名为Gh0st RAT 的已知远程管理工具在功能上存在重叠,后者的源代码于 2008 年被公开泄露。</p><p>PLAYFULGHOST 的初始访问途径包括使用带有行为准则相关诱饵的网络",
|
"body": "<p>安全团队总是必须适应变化,但2025年将出现的新发展可能会使变化特别具有挑战性。AI 创新步伐的加快、日益复杂的网络威胁和新的监管政策将要求首席信息安全官 (CISO) 驾驭更复杂的环境。</p><p><img src=\"https://image.3001.net/images/20250121/1737459264_678f8640703ee88fd4cf3.png!small\" wid",
|
||||||
"category": "资讯",
|
"category": "资讯",
|
||||||
"pubDate": "Mon, 06 Jan 2025 13:42:35 +0800"
|
"pubDate": "Tue, 21 Jan 2025 19:29:51 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "LegionLoader滥用Chrome扩展传播多种恶意软件",
|
"title": "SUSE发布重要补丁:保护系统免受CVE-2025-21613攻击",
|
||||||
"link": "https://www.freebuf.com/news/419136.html",
|
"link": "https://www.freebuf.com/articles/420421.html",
|
||||||
"description": "据gbhackers消息,名为LegionLoader 的恶意软件正通过Chrome 扩展分发窃密软件,包括对受害者实施电子邮件操纵、跟踪浏览,甚至将受感染的浏览器转变为攻击者的代理服务器,使其能够使用受害者的凭证浏览网页。自 2024 年 8 月以来,研究人员观察到LegionLoader 通过 Chrome 扩展程序分发各种窃取程序,包括 LummaC2、Rhadamanthys 和 Stea",
|
"description": "该漏洞可能允许攻击者在特定情况下篡改git-upload-pack标志。",
|
||||||
"body": "<p>据gbhackers消息,名为LegionLoader 的恶意软件正通过Chrome 扩展分发窃密软件,包括对受害者实施电子邮件操纵、跟踪浏览,甚至将受感染的浏览器转变为攻击者的代理服务器,使其能够使用受害者的凭证浏览网页。<img src=\"https://image.3001.net/images/20250106/1736134823_677b50a71ce2410384ecc.jpg",
|
"body": "<p><img src=\"https://image.3001.net/images/20250121/1737445957_678f524523c573d95d8eb.jpg!small\" width=\"690\" height=\"388\" alt=\"\" /></p><p>SUSE近日发布针对Amazon Systems Manager(SSM)Agent的重要安全更新,解决了“go-git”库中",
|
||||||
"category": "资讯",
|
"pubDate": "Tue, 21 Jan 2025 15:57:28 +0800"
|
||||||
"pubDate": "Mon, 06 Jan 2025 11:38:08 +0800"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "大量恶意npm包盯上了开发者",
|
"title": "Shiro CVE-2020-17510 路径绕过",
|
||||||
"link": "https://www.freebuf.com/news/419131.html",
|
"link": "https://www.freebuf.com/vuls/420408.html",
|
||||||
"description": "研究人员发现,有大量的恶意npm软件包冒充以太坊开发者使用的Hardhat开发环境,正在窃取私钥和其他敏感数据。",
|
"description": "在使用 Apache Shiro 与 Spring 集成时,如果 Apache Shiro 的版本低于 1.7.0,经过精心构造的 HTTP 请求可能会导致身份验证绕过。",
|
||||||
"body": "<p>近日,研究人员发现,有大量的恶意npm软件包,它们冒充以太坊开发者使用的Hardhat开发环境,正在窃取私钥和其他敏感数据。研究人员称,这些恶意软件包总共被下载了一千多次。</p><p><img src=\"https://image.3001.net/images/20250106/1736132495_677b478f1af59302ff596.png!small\" alt=\"\" /></",
|
"body": "<h1>漏洞描述</h1><p>Apache Shiro before 1.7.0, when using Apache Shiro with Spring, a specially crafted HTTP request may cause an authentication bypass.</p><p>If you are NOT using Shiro’s Spring Boot Star",
|
||||||
"category": "资讯",
|
|
||||||
"pubDate": "Mon, 06 Jan 2025 10:58:21 +0800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "【情报】大型泄密库搜索引擎-libraryofleaks",
|
|
||||||
"link": "https://www.freebuf.com/news/419128.html",
|
|
||||||
"description": "这个平台允许用户搜索数百万份来自数十起泄密事件的文件,而且每天都会添加更多的数据。",
|
|
||||||
"body": "<p><code>libraryofleaks</code>是由分布式拒绝秘密组织(<code>Distributed Denial of Secrets</code>,简称<code>DDoSecrets</code>)推出的一个公共搜索引擎,被称为“泄密库”(<code>Library of Leaks</code>),这个平台允许用户搜索数百万份来自数十起泄密事件的文件,而且每天都会添加更多",
|
|
||||||
"category": "资讯",
|
|
||||||
"pubDate": "Mon, 06 Jan 2025 10:43:48 +0800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "知名化工巨头被勒索攻击,泄露761.8GB数据",
|
|
||||||
"link": "https://www.freebuf.com/news/419127.html",
|
|
||||||
"description": "此次攻击涉及对其部分服务器上的电子数据进行加密,而勒索软件组织Hunters International声称对此事负责。",
|
|
||||||
"body": "<p>Nikki - Universal有限公司是一家知名的化学制造商,近期沦为一起复杂勒索软件攻击的受害者。该公司于2024年12月27日证实了这一事件,此次攻击涉及对其部分服务器上的电子数据进行加密,而勒索软件组织Hunters International声称对此事负责。</p><p><img src=\"https://image.3001.net/images/20250106/173613",
|
|
||||||
"category": "资讯",
|
|
||||||
"pubDate": "Mon, 06 Jan 2025 10:41:31 +0800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "【全球首发】【6w$赏金】微软身份漏洞-未授权强制解绑任意微软账户邮箱",
|
|
||||||
"link": "https://www.freebuf.com/vuls/419097.html",
|
|
||||||
"description": "网络安全并不是我的最终梦想职业,只是梦想职业的其中一个技能点。",
|
|
||||||
"body": "<h2 id=\"h2-1\">致谢</h2><p>我是Feng Jiaming,公开别名 Sugobet/M1n9K1n9,来自中国广东工贸职业技术学院的在校学生。</p><p>I'm Feng Jiaming, my public alias Sugobet/M1n9K1n9, a student from Guangdong Polytechnic of Industry and Commerc",
|
|
||||||
"category": "漏洞",
|
"category": "漏洞",
|
||||||
"pubDate": "Sun, 05 Jan 2025 13:35:19 +0800"
|
"pubDate": "Tue, 21 Jan 2025 14:54:33 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "都在给网安泼冷水,我来给网安泼盆开水",
|
"title": "梅赛德斯—奔驰信息娱乐系统漏洞详细信息披露",
|
||||||
"link": "https://www.freebuf.com/articles/neopoints/419094.html",
|
"link": "https://www.freebuf.com/articles/420410.html",
|
||||||
"description": "契机今天看到一篇文章契机今天看到一篇文章让我有了估算大黑阔赚钱能力的灵感。给网安行业泼盆开水!",
|
"description": "卡巴斯基披露了在梅赛德斯-奔驰信息娱乐系统中发现的十多个漏洞的细节,但奔驰保证这些安全漏洞已经得到修复。",
|
||||||
"body": "<h2 id=\"h2-1\"><strong>契机</strong></h2><p style=\"text-align:center;\">今天看到一篇文章让我有了估算大黑阔赚钱能力的灵感。给网安行业泼盆开水!<br /><img src=\"https://image.3001.net/images/20250105/1736053407_677a129f75ed5e9a02268.png!small",
|
"body": "<p><img src=\"https://image.3001.net/images/20250121/1737443647_678f493f7ea13166686f8.jpeg!small\" alt=\"\" width=\"690\" height=\"388\" /><strong>卡巴斯基披露了在梅赛德斯—奔驰信息娱乐系统中发现的十多个漏洞的细节,但这家汽车制造商向客户保证,这些安全漏洞已经得到修复,",
|
||||||
"category": "观点",
|
"pubDate": "Tue, 21 Jan 2025 14:50:19 +0800"
|
||||||
"pubDate": "Sun, 05 Jan 2025 13:14:47 +0800"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "盘点万亿市值的Palantir在2024年拿下的至少87亿的美军合同都是啥",
|
"title": "FreeBuf早报 | 中国与多国联合解救7万电诈受害者;德国驻美大使密电遭到泄露",
|
||||||
"link": "https://www.freebuf.com/articles/neopoints/419073.html",
|
"link": "https://www.freebuf.com/news/420399.html",
|
||||||
"description": "仅2024年一年,该公司与美国军方的合同额就高达12亿美元(约合人民币87.8亿元)。",
|
"description": "德国驻美国大使安德烈亚斯·米夏埃利斯的一份电报19日遭泄露,这令德国陷入外交旋涡。",
|
||||||
"body": "<p style=\"text-align:center;\">近日,美国科技公司Palantir宣布,美国陆军已授予Palantir一份价值4.007亿美元(约合人民币29亿元)的合同。近年来,Palantir持续获得美国军方的青睐,公开信息显示,仅2024年一年,该公司与美国军方的合同额就高达12亿美元(约合人民币87.8亿元)。目前,Palantir的大部分收入都来自于美国政府和军事部门。<br",
|
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 网信部门严厉打击整治网络水军问题</h3><p>目前,网信部门已协调关闭爱××网、买××心等网络水军专门平台,指导应用商店对微××理、星×通等应用程序采取拦截或者下架等处置措施,累计协调关闭、下架相关违法违规网站平台400余家。 【<a href=\"https://www.cnii.com.cn/rmydb/20250",
|
||||||
"category": "观点",
|
|
||||||
"pubDate": "Sat, 04 Jan 2025 14:01:04 +0800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "FreeBuf早报 | 华硕路由器漏洞允许任意代码执行;用户集体起诉Siri“偷听”",
|
|
||||||
"link": "https://www.freebuf.com/news/419064.html",
|
|
||||||
"description": "这些漏洞可能允许经过身份验证的攻击者通过华硕路由器的 AiCloud 功能触发命令执行。",
|
|
||||||
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 超过300万台未加密的邮件服务器暴露</h3><p>目前,超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上,容易受到网络嗅探攻击。【外刊-<a href=\"https://www.bleepingcomputer.com/news/security/over-3-million-mail-se",
|
|
||||||
"category": "资讯",
|
"category": "资讯",
|
||||||
"pubDate": "Fri, 03 Jan 2025 20:35:15 +0800"
|
"pubDate": "Tue, 21 Jan 2025 14:22:30 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "Threatcl:一款威胁模型记录与归档工具",
|
"title": "2024年近2亿人受影响,美国医疗成重点攻击目标",
|
||||||
"link": "https://www.freebuf.com/sectool/419060.html",
|
"link": "https://www.freebuf.com/news/420391.html",
|
||||||
"description": "Threatcl是一款功能强大的威胁记录模型,可以帮助广大研究人员更加清楚地记录威胁,并推动安全态势的提升。",
|
"description": "2024年期间,各组织向美国政府报告了720起医疗保健数据泄露事件,这些事件共影响1.86亿条用户记录。",
|
||||||
"body": "<h2 id=\"h2-1\">关于Threatcl</h2><p>Threatcl是一款功能强大的威胁记录模型,可以帮助广大研究人员更加清楚地记录威胁,并推动安全态势的提升。</p><p><img src=\"https://image.3001.net/images/20250103/1735901406_6777c0deeaae638d26c6a.png!small\" width=\"690\" he",
|
"body": "<h2 id=\"h2-1\">2024年期间,各组织向美国政府报告了720起医疗保健数据泄露事件,这些事件共影响1.86亿条用户记录。</h2><p><img src=\"https://image.3001.net/images/20250121/1737430766_678f16ee2f76c506551fd.png!small\" alt=\"\" /></p><p>SecurityWeek对美国卫生",
|
||||||
"category": "工具",
|
|
||||||
"pubDate": "Fri, 03 Jan 2025 18:53:44 +0800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "一周网安优质PDF资源推荐丨FreeBuf知识大陆",
|
|
||||||
"link": "https://www.freebuf.com/articles/419042.html",
|
|
||||||
"description": "我们精选了本周知识大陆公开发布的10条优质资源,让我们一起看看吧。",
|
|
||||||
"body": "<p>各位读者周末好,以下是本周「FreeBuf知识大陆一周优质资源推荐」,我们精选了本周知识大陆公开发布的10条优质资源,让我们一起看看吧。</p><p><img src=\"https://image.3001.net/images/20250103/1735891639_67779ab73e8d0be0fdbae.png!small\" alt=\"\" /></p><h2 id=\"h2-1\">笔记",
|
|
||||||
"pubDate": "Fri, 03 Jan 2025 16:22:28 +0800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "FreeBuf周报 | 超过300万台未加密的邮件服务器暴露;WPA3协议存在安全漏洞",
|
|
||||||
"link": "https://www.freebuf.com/news/419036.html",
|
|
||||||
"description": "总结推荐本周的热点资讯、安全事件、一周好文和省心工具,保证大家不错过本周的每一个重点!",
|
|
||||||
"body": "<p>各位 Buffer 周末好,以下是本周「FreeBuf周报」,我们总结推荐了本周的热点资讯、安全事件、一周好文和省心工具,保证大家不错过本周的每一个重点!<img style=\"border-width:0px;line-height:inherit;max-width:635px;height:auto;\" src=\"https://image.3001.net/images/202209",
|
|
||||||
"category": "资讯",
|
"category": "资讯",
|
||||||
"pubDate": "Fri, 03 Jan 2025 15:56:46 +0800"
|
"pubDate": "Tue, 21 Jan 2025 11:40:28 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "Agneyastra:一款Firebase 错误配置检测工具包",
|
"title": "2025 OWASP 十大安全漏洞",
|
||||||
"link": "https://www.freebuf.com/sectool/419006.html",
|
"link": "https://www.freebuf.com/news/420401.html",
|
||||||
"description": "Agneyastra是一款功能强大的错误配置检测工具,可以帮助广大研究人员更好地保障Firebase平台的安全。",
|
"description": "OWASP发布2025年智能合约十大漏洞报告,反映了不断演变的攻击向量,深入剖析了近年来的常见漏洞及缓解策略。",
|
||||||
"body": "<h2 id=\"h2-1\">关于Agneyastra</h2><p>Agneyastra是一款功能强大的错误配置检测工具,该工具主要针对的是Firebase平台,可以帮助广大研究人员更好地保障Firebase平台的安全。</p><p><img src=\"https://image.3001.net/images/20250103/1735881390_677772aecfdd43a52c23b.p",
|
"body": "<p><img src=\"https://image.3001.net/images/20250121/1737440528_678f3d1025ec7982598b6.jpg!small\" width=\"690\" height=\"388\" alt=\"\" />随着去中心化金融(DeFi)和区块链技术的不断发展,智能合约安全的重要性愈发凸显。在此背景下,开放网络应用安全项目(OWASP)发布了备受期",
|
||||||
"category": "工具",
|
|
||||||
"pubDate": "Fri, 03 Jan 2025 13:21:19 +0800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Exposor:一款基于互联网搜索引擎实现的统一语法网络侦查工具",
|
|
||||||
"link": "https://www.freebuf.com/sectool/419004.html",
|
|
||||||
"description": "Exposor是一款功能强大的网络侦查工具,支持广大研究人员使用统一语法来检测网络中的安全威胁。",
|
|
||||||
"body": "<h2 id=\"h2-1\">关于Exposor</h2><p>Exposor是一款功能强大的网络侦查工具,该工具基于互联网搜索引擎实现其功能,支持广大研究人员使用统一语法来检测网络中的安全威胁。</p><p><img src=\"https://image.3001.net/images/20250103/1735880146_67776dd204e38df0c1826.png!small\" wid",
|
|
||||||
"category": "工具",
|
|
||||||
"pubDate": "Fri, 03 Jan 2025 12:58:29 +0800"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "日本最大的移动运营商因DDoS攻击导致服务中断",
|
|
||||||
"link": "https://www.freebuf.com/news/418992.html",
|
|
||||||
"description": "NTT Docomo当地时间1月2日表示,一次DDoS网络攻击导致运营中断,网站和一些服务在宕机大半天后才逐渐恢复。",
|
|
||||||
"body": "<p>日本最大的移动运营商 NTT Docomo Inc. 当地时间1月2日表示,一次分布式拒绝服务 (DDoS) 网络攻击导致运营中断,网站和一些服务在宕机大半天后才逐渐恢复。</p><p><img src=\"https://image.3001.net/images/20250103/1735874913_677759613048fcfd644c0.png!small\" width=\"690\"",
|
|
||||||
"category": "资讯",
|
"category": "资讯",
|
||||||
"pubDate": "Fri, 03 Jan 2025 11:26:47 +0800"
|
"pubDate": "Tue, 21 Jan 2025 11:30:01 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "用户集体起诉Siri“偷听”",
|
"title": "420万主机暴露,含VPN和路由器",
|
||||||
"link": "https://www.freebuf.com/news/418989.html",
|
"link": "https://www.freebuf.com/news/420386.html",
|
||||||
"description": "苹果公司同意支付9500万美元现金,以和解一项拟议的集体诉讼,该诉讼声称其Siri语音助手侵犯了用户的隐私。",
|
"description": "新研究表明,多种隧道协议存在安全漏洞,这些漏洞可能让攻击者实施多种攻击。",
|
||||||
"body": "<p>1月3日消息,科技巨头苹果公司同意支付9500万美元现金,以和解一项拟议的集体诉讼,该诉讼声称其Siri语音助手侵犯了用户的隐私。这份和解协议涵盖了2014年9月17日至2024年12月31日期间使用Siri的美国用户,涉及数千万人。</p><p>每位参与诉讼的用户最多可为5台Siri设备申请赔偿,每台设备最高可获得20美元。此外,苹果公司需在六个月内永久删除2019年10月前收集的Siri",
|
"body": "<h2 id=\"h2-1\">新研究表明,多种隧道协议存在安全漏洞,这些漏洞可能让攻击者实施多种攻击。</h2><p>一项研究表明:“网络主机若接受隧道数据包却不验证发送者身份,就可能被劫持以执行匿名攻击并获得对其网络的访问权限。”该研究是与鲁汶大学(KU Leuven)的教授兼研究员马蒂·范霍夫(Mathy Vanhoef)合作开展的。</p><p><img src=\"https://image.",
|
||||||
"category": "资讯",
|
"category": "资讯",
|
||||||
"pubDate": "Fri, 03 Jan 2025 11:17:16 +0800"
|
"pubDate": "Tue, 21 Jan 2025 11:17:38 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "黑客滥用AWS泄露的信息进行云狩猎",
|
"title": "新型僵尸网络正对路由器、摄像头等设备发起大规模DDoS攻击",
|
||||||
"link": "https://www.freebuf.com/news/418985.html",
|
"link": "https://www.freebuf.com/news/420383.html",
|
||||||
"description": "名为“EC2 Grouper”的黑客组织,近年来一直在利用AWS工具以及泄露的凭证对云环境展开狩猎型攻击。",
|
"description": "自 2024 年底以来,一个新发现的物联网 (IoT) 僵尸网络一直在全球策划大规模分布式拒绝服务 (DDoS) 攻击。",
|
||||||
"body": "<p>名为“EC2 Grouper”的黑客组织,近年来一直在利用AWS工具以及泄露的凭证对云环境展开狩猎型攻击。在过去的数年里,这个相当活跃的威胁行为主体在数十个客户环境中被发现,这使其成为网络安全专家追踪的最活跃的组织之一。</p><p><img src=\"https://image.3001.net/images/20250103/1735874034_677755f204ca51a03dc1",
|
"body": "<p>趋势科技的一项新研究发现,自 2024 年底以来,一个新发现的物联网 (IoT) 僵尸网络一直利用路由器、IP 摄像头和其他连接设备等物联网设备中的漏洞,在全球策划大规模分布式拒绝服务 (DDoS) 攻击。</p><p><img src=\"https://image.3001.net/images/20250121/1737428755_678f0f130e34f01ede788.png!s",
|
||||||
"category": "资讯",
|
"category": "资讯",
|
||||||
"pubDate": "Fri, 03 Jan 2025 11:10:50 +0800"
|
"pubDate": "Tue, 21 Jan 2025 11:04:23 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "超过300万台未加密的邮件服务器暴露",
|
"title": "新型Android恶意软件模仿聊天应用窃取敏感数据",
|
||||||
"link": "https://www.freebuf.com/news/418975.html",
|
"link": "https://www.freebuf.com/news/420346.html",
|
||||||
"description": "超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上,容易受到网络嗅探攻击。",
|
"description": "Cyfirma 的网络安全研究人员最近发现了一个伪装成聊天应用,针对南亚用户的复杂 Android 恶意软件活动。",
|
||||||
"body": "<p>目前,超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上,容易受到网络嗅探攻击。</p><p>IMAP和POP3是访问邮件服务器上邮件的两种方式。IMAP适用于从多个设备(如手机和笔记本电脑)查看邮件,因为它会将邮件保留在服务器上并在设备间同步。而POP3则会将邮件从服务器下载,使其仅能从下载的设备访问。</p><p><img src=\"https://image.3",
|
"body": "<p>据Cyber Security News消息,Cyfirma 的网络安全研究人员最近发现了一个针对南亚用户,尤其是印度克什米尔地区用户的复杂 Android 恶意软件活动,通过伪装成一款名为“Tanzeem” 的聊天应用程序以窃取目标设备中的敏感数据。</p><p>该恶意软件归因于臭名昭著的“DONOT”APT组织,具有印度国家背景。而“Tanzeem”在乌尔都语中意为“组织”,是一个经常与",
|
||||||
"category": "资讯",
|
"category": "资讯",
|
||||||
"pubDate": "Fri, 03 Jan 2025 10:22:53 +0800"
|
"pubDate": "Mon, 20 Jan 2025 19:50:15 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "CertiK Hack3D: Web3.0 年度安全报告(2024)",
|
"title": "B站2025年第一个大瓜,“代码投毒”报复用户",
|
||||||
"link": "https://www.freebuf.com/articles/paper/418966.html",
|
"link": "https://www.freebuf.com/news/420334.html",
|
||||||
"description": "2024年Web3.0领域因安全事件导致的总损失超过23.63亿美元,同比增幅达31.61%。全年共发生760起安全事件,其中网络钓鱼和私钥泄露是两大主要攻击手段。",
|
"description": "这不仅暴露了B站在内部管理和技术安全方面的漏洞,也引发了大众对用户信息安全的担忧。",
|
||||||
"body": "<p><img src=\"https://image.3001.net/images/20250102/1735830965_6776adb5bccea4626f7a7.jpg!small\" alt=\"2024Web3.0 安全年度报告 (1).jpg\" /></p><h1><strong>摘要</strong></h1><ul><li><p>2024年,Web3.0行业共发生760起链上安全事件",
|
"body": "<p>最近的B站可以说是处于多事之秋,前面才有员工自曝操纵直播间抽奖概率,这几天又被曝出员工滥用职权,加载恶意代码攻击用户。这不仅暴露了B站在内部管理和技术安全方面的漏洞,也引发了大众对用户信息安全的担忧。</p><p>涉事员工倪袁成是B站网页端DanmakuX弹幕引擎的开发和优化负责人。根据B站网友“老变态了了了”发布的消息,2025年1月,倪袁成因为与两名用户在站内发生了口角,心生怨恨,随后利",
|
||||||
|
"category": "资讯",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 18:08:20 +0800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "验证码对抗之殇:Clickfix最新钓鱼事件分析报告",
|
||||||
|
"link": "https://www.freebuf.com/articles/paper/420320.html",
|
||||||
|
"description": "腾讯云安全科恩实验室威胁情报中心捕获到了多起国外黑灰产团伙通过Clickfix社工钓鱼手法对windows系统用户进行攻击的事件。",
|
||||||
|
"body": "<p><span style=\"color:#000000;\">曾几何时,验证码是横亘在人与机器之间的那道数字藩篱,以看似简单的交互,守护着虚拟世界的秩序。然而,当人工智能的浪潮席卷而来,昔日泾渭分明的界限开始变得模糊不清。黑产团伙敏锐地捕捉到这种变化带来的</span><span lang=\"en-us\" style=\"color:#000000;\" xml:lang=\"en-us\">“</sp",
|
||||||
"category": "安全报告",
|
"category": "安全报告",
|
||||||
"pubDate": "Thu, 02 Jan 2025 23:16:05 +0800"
|
"pubDate": "Mon, 20 Jan 2025 16:32:27 +0800"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "漏洞分析 | Wordress Tutor LMS SQL注入漏洞(CVE-2024-10400)",
|
"title": "解读出国劳务:表面邀请拍戏,实则人口交易,走上小路,却是末路!",
|
||||||
"link": "https://www.freebuf.com/vuls/418348.html",
|
"link": "https://www.freebuf.com/news/420316.html",
|
||||||
"description": "Tutor LMS Pro是一个智能、简单且可扩展的WordPress LMS插件,它配备了革命性的拖放系统来创建丰富的课程。",
|
"description": "近日,中国演员王星赴泰拍戏失联一事引发网友广泛关注,好在几经周折,王星本人最终还是安然回国。",
|
||||||
"body": "<h2 id=\"h2-1\">插件介绍:</h2><p>Tutor LMS Pro是一个智能、简单且可扩展的WordPress LMS插件,它配备了革命性的拖放系统来创建丰富的课程,丰富而简单。Tutor LMS*不仅让你能够在线传播您的知识,也可以帮助你通过在线销售课程赚钱。它提供了对发生的交易的进行完全控制的设施。</p><h2 id=\"h2-2\">漏洞概述:</h2><p>由于对用户提供的参数",
|
"body": "<p>近日,中国演员王星赴泰拍戏失联一事引发网友广泛关注,好在几经周折,王星本人最终还是安然回国。失联期间,元芳持续关注事件进展,其中一系列在网络上流传的有关“买卖王星”的TG聊天截图,引起了元芳的注意。</p><p>元芳从中提取出关键发言账号信息,通过 <strong>重明-网络犯罪情报分析平台</strong>搜索引擎对相应用户ID进行检索溯源,本来只是想找找看有没有什么有价值的线索,但实际的",
|
||||||
"category": "漏洞",
|
"category": "资讯",
|
||||||
"pubDate": "Thu, 02 Jan 2025 20:44:33 +0800"
|
"pubDate": "Mon, 20 Jan 2025 16:08:39 +0800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "FreeBuf早报 | 网信办启动春节网络环境整治行动;美网络攻击我国某研究院细节公布",
|
||||||
|
"link": "https://www.freebuf.com/news/420305.html",
|
||||||
|
"description": "为了营造喜庆祥和的春节网络氛围,中央网信办决定即日起开展为期1个月的“清朗·2025年春节网络环境整治”专项行动。",
|
||||||
|
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 中方对美情报机构对华网络攻击表示严重关切</h3><p>针对美国情报机构对中国企业机构进行网络攻击一事,中国外交部17日在例行记者会上指出,中方对此表示严重关切,敦促美方立即停止相关恶意活动。 【<a href=\"http://usa.people.com.cn/n1/2025/0120/c241376-4040529",
|
||||||
|
"category": "资讯",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 15:03:27 +0800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "惠普被黑客入侵,机密数据在暗网出售",
|
||||||
|
"link": "https://www.freebuf.com/news/420293.html",
|
||||||
|
"description": "黑客IntelBroker宣称已经入侵惠普企业公司(HPE),公布了诸如源代码、证书和个人身份信息(PII)等敏感数据。",
|
||||||
|
"body": "<p><img src=\"https://image.3001.net/images/20250120/1737354626_678ded82807f2e40cb1d3.png!small\" alt=\"\" /></p><p>黑客IntelBroker宣称已经入侵惠普企业公司(HPE),并公布了诸如源代码、证书和个人身份信息(PII)等敏感数据,这些数据如今可在线售卖。</p><p>声名狼藉的Int",
|
||||||
|
"category": "资讯",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 14:31:01 +0800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "无需拆机!Windows 11 BitLocker加密文件被破解",
|
||||||
|
"link": "https://www.freebuf.com/news/420297.html",
|
||||||
|
"description": "“bitpixie”漏洞通过利用Windows启动管理器的降级攻击,使攻击者可以在不物理篡改设备的情况下绕过安全启动。",
|
||||||
|
"body": "<p><img src=\"https://image.3001.net/images/20250120/1737355717_678df1c5a8f6825c9315b.jpg!small\" width=\"690\" height=\"388\" alt=\"\" /></p><p>混沌通信大会 (38C3)上,安全研究员Thomas Lambertz展示了一个名为“bitpixie”(CVE-2023-2",
|
||||||
|
"category": "资讯",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 14:10:38 +0800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "黑客滥用微软VSCode 远程隧道绕过安全工具",
|
||||||
|
"link": "https://www.freebuf.com/news/420277.html",
|
||||||
|
"description": "微软VSCode 远程隧道功能正被攻击者利用,以绕过安全措施部署恶意脚本。",
|
||||||
|
"body": "<p>据Cyber Security News消息,微软VSCode 远程隧道功能正被攻击者利用,以绕过安全措施部署恶意脚本。</p><p><img src=\"https://image.3001.net/images/20250120/1737345720_678dcab8e42523784e9ee.jpg!small\" alt=\"\" width=\"690\" height=\"388\" /></p",
|
||||||
|
"category": "资讯",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 11:54:14 +0800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "《零日风暴》| 正式前导预告 | Netflix",
|
||||||
|
"link": "https://www.freebuf.com/video/420267.html",
|
||||||
|
"description": "一场重大网路攻击酿成灾难,下一波攻击又来势汹涌汹涌。",
|
||||||
|
"body": "<p>一场重大网路攻击酿成灾难,下一波攻击又来势汹涌汹涌,前任总统(劳勃狄尼洛饰)必须查明幕后黑手、查清真相。然而,真正的威胁究竟是损害外部还是内部危险?</p><p>#劳勃狄尼洛首次亮相Netflix影集,全新迷你影集《零日风暴》2月20日首播。</p><p style=\"text-align:center;\"><iframe src=\"//player.bilibili.com/player.",
|
||||||
|
"category": "视频",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 10:46:28 +0800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "ChatGPT被曝存在爬虫漏洞,OpenAI未公开承认",
|
||||||
|
"link": "https://www.freebuf.com/news/420273.html",
|
||||||
|
"description": "OpenAI的ChatGPT爬虫似乎能够对任意网站发起分布式拒绝服务(DDoS)攻击,而OpenAI尚未承认这一漏洞。",
|
||||||
|
"body": "<p><img src=\"https://image.3001.net/images/20250120/1737353745_678dea1157e14e0eac4a5.jpg!small\" alt=\"\" width=\"690\" height=\"402\" /></p><p><strong>OpenAI的ChatGPT爬虫似乎能够对任意网站发起分布式拒绝服务(DDoS)攻击,而OpenAI尚未承认这",
|
||||||
|
"category": "资讯",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 10:40:16 +0800"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "网络安全领域研究人员遭遇假PoC专项攻击",
|
||||||
|
"link": "https://www.freebuf.com/news/420252.html",
|
||||||
|
"description": "这些假PoC攻击事件凸显了网络安全领域面临的严峻挑战。",
|
||||||
|
"body": "<h2 id=\"h2-1\"><strong>一、事件概述</strong></h2><p>近期,网络安全领域接连曝出针对研究人员的假PoC(概念验证)攻击事件,引发业界高度关注。2024年12月,微软在当月的补丁星期二更新中修复了两个关键的LDAP漏洞,分别是CVE-2024-49112和CVE-2024-49113。其中,CVE-2024-49113是一个拒绝服务(DoS)漏洞。然而,就在漏洞修",
|
||||||
|
"category": "资讯",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 10:00:12 +0800"
|
||||||
}
|
}
|
||||||
]
|
]
|
File diff suppressed because it is too large
Load Diff
@ -1,72 +1,72 @@
|
|||||||
[
|
[
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/4011",
|
"guid": "https://forum.butian.net/share/4063",
|
||||||
"title": "结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践",
|
"title": "2.35版本以下堆沙盒绕过模板总结带例题",
|
||||||
"description": "本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具,特别是“通义灵码”,帮助发现了多个高危漏洞,包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证,并分享了使用“通义灵码”的心得和体验。最后,作者总结了AI在代码审计中的优势和不足,并展望了未来的发展方向。",
|
"description": "总结了2.35版本以下堆沙盒绕过的各种模板,包括2.27,2.29,2.31的原理和模板还有对应例题",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2025-01-06 10:00:00"
|
"pubDate": "2025-01-22 10:00:02"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/4002",
|
"guid": "https://forum.butian.net/share/4062",
|
||||||
"title": "Windows进程",
|
"title": "巧用Chrome-CDP远程调用Debug突破JS逆向",
|
||||||
"description": "进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。",
|
"description": "CDP远程调用非常方便,他允许我们直接可以通过代码来操作浏览器完成一系列行为,希望通过我的这篇文章让师傅们对其有一定了解,学习并赋能与我们的渗透测试与安全研究工作之中,提升效率!",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2025-01-06 09:00:02"
|
"pubDate": "2025-01-22 09:00:01"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/3992",
|
"guid": "https://forum.butian.net/share/4060",
|
||||||
"title": "一次窃取程序的恶意样本分析",
|
"title": "windows com组件模糊测试入门",
|
||||||
"description": "一次窃取程序的恶意样本分析",
|
"description": "windows com组件模糊测试入门\r\n什么是windows com组件\r\ncom全称是Component Object Model,即组件对象模型。按照微软官方的说法,COM 是一个平台无关的、分布式的、面向对象的系统,用于创建可交...",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2025-01-03 10:00:00"
|
"pubDate": "2025-01-21 10:00:02"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/3993",
|
"guid": "https://forum.butian.net/share/4055",
|
||||||
"title": "Sodinokibi详细分析",
|
"title": "实战 | 微信小程序EDUSRC渗透漏洞复盘",
|
||||||
"description": "一、基本信息\r\nREvil,也被称为Sodinokibi或简称Sodin,它在2019年4月被首次发现。这种恶意软件会在感染了用户的电脑后加密文件,并删除任何留下的赎金提示信息。这些消息会告知受害者必须支付一...",
|
"description": "这里给师傅们总结下我们在进行漏洞挖掘过程中需要注意的细节,比如我们在看到一个功能点多个数据包的时候,我们需要去挨个分析里面的数据包构造,进而分析数据包的走向,去了解数据包的一个业务逻辑,特别是微信小程序",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2025-01-03 09:00:00"
|
"pubDate": "2025-01-21 08:00:02"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/4006",
|
"guid": "https://forum.butian.net/share/4050",
|
||||||
"title": "代码审计 - MCMS v5.4.1 0day挖掘",
|
"title": "浅谈恶意样本の反沙箱分析",
|
||||||
"description": "记一次 MCMS v5.4.1 代码审计,编号为 CVE-2024-42990&CVE-2024-42991。本文由笔者首发于先知社区的技术文章板块:https://xz.aliyun.com/t/16630",
|
"description": "说实话单纯的静态免杀其实不是很难,只要通过足够新颖的加壳手段就能够成功将木马加载到内存中,但是抵御不了蓝队(比如微步云沙箱)使用沙箱的动态分析,所以通常只能够免杀小一天就上传了病毒库,从而免杀失效了。\r\n\r\n本文就是来介绍几种反沙箱的思路来帮助红队搞出耐得住沙箱考验的payload",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2025-01-02 10:00:00"
|
"pubDate": "2025-01-20 10:00:00"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/3991",
|
"guid": "https://forum.butian.net/share/4053",
|
||||||
"title": "lighttpd溢出漏洞构造ROP链",
|
"title": "在 JSP 中优雅的注入 Spring 内存马",
|
||||||
"description": "前几天打了下强网杯决赛,想着分享一下思路",
|
"description": "JSP 下注入 Spring 内存马 & Spring Hack 无条件的一种方法",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2025-01-02 09:00:01"
|
"pubDate": "2025-01-20 09:00:00"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/4017",
|
"guid": "https://forum.butian.net/share/4048",
|
||||||
"title": "文件读取漏洞实战利用",
|
"title": "探寻Bottle框架内存马",
|
||||||
"description": "实战场景下的两个任意文件读取漏洞利用。",
|
"description": "在某次测试时候 碰见了一个叫bottle的框架 于是探寻了下在实际中可应用的注入内存马的方法",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2024-12-31 10:00:02"
|
"pubDate": "2025-01-17 10:00:01"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/3970",
|
"guid": "https://forum.butian.net/share/4046",
|
||||||
"title": "挖矿病毒处置总结",
|
"title": "使用汇编代码实现反向shell",
|
||||||
"description": "处理过的挖矿病毒隐藏自身的方式总结及处置方法总结",
|
"description": "本章为笔者在学习过程中的学习记录,其目的是使用python的keystone引擎来一步步实现一个完整的反向shell,这种方法相对麻烦,但主要是为了理解汇编代码的运行过程。",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2024-12-31 09:00:00"
|
"pubDate": "2025-01-17 09:00:00"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/3968",
|
"guid": "https://forum.butian.net/share/4041",
|
||||||
"title": "一些vmpwn的详细总结",
|
"title": "Pipe管道利用",
|
||||||
"description": "总结一些常见vmpwn题的打法,数据越界泄露libc,通过偏移数据处理来得到危险函数地址等常见漏洞,会结合两道例题来进行讲解",
|
"description": "关于Pipe管道的安全技术分享",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2024-12-30 10:00:01"
|
"pubDate": "2025-01-16 09:30:00"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"guid": "https://forum.butian.net/share/3955",
|
"guid": "https://forum.butian.net/share/4045",
|
||||||
"title": "样本分析:formbook 恶意软件浅析",
|
"title": "x86_shellcode的一些总结",
|
||||||
"description": "样本\r\nIOC\r\nMD5:749dfc8bf52422ce77ed59a60c2f395e\r\nSHA1:d0593187a473a19564a67819050023c9144b30c2\r\nSHA256: 5c205cffc83f7be274773fb1c3aa356b29d97e4d62a83e79c5fd52eadc3ed695\r\n概述\r\n语言:C...",
|
"description": "本文章会涉及到各种shellcode的原理和撰写,然后还有可见字符串漏洞的撰写和原理,以及工具梭哈和 一些针对不同orw情况的模板shellcode",
|
||||||
"source": "subject",
|
"source": "subject",
|
||||||
"pubDate": "2024-12-30 09:00:01"
|
"pubDate": "2025-01-16 09:00:00"
|
||||||
}
|
}
|
||||||
]
|
]
|
@ -1,4 +1,44 @@
|
|||||||
[
|
[
|
||||||
|
{
|
||||||
|
"title": "盘点 2024 年备受关注的那些高风险漏洞\n",
|
||||||
|
"link": "https://paper.seebug.org/3268/",
|
||||||
|
"description": "作者:知道创宇404实验室\n2024年,网络安全领域接连曝出了一系列高危漏洞,这些漏洞不仅影响范围广泛,而且破坏力极大,对全球的网络安全构成了严峻挑战。以下是我们从今年的安全漏洞应急中总结出的一些颇具危害性和影响力的网络安全漏洞,排名不分先后,当然,我们也从Seebug漏洞平台访问数据和ZoomEye网络空间搜索引擎对应搜索出来的受影响量级中筛选出了排名相对靠前的漏洞,附在文末供大家参考。通...\n",
|
||||||
|
"pubDate": "Tue, 21 Jan 2025 07:17:00 +0000",
|
||||||
|
"guid": "https://paper.seebug.org/3268/",
|
||||||
|
"category": "404专栏"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Love and hate under war: The GamaCopy organization, which imitates the Russian Gamaredon, uses military - related bait to launch attacks on Russia\n",
|
||||||
|
"link": "https://paper.seebug.org/3270/",
|
||||||
|
"description": "Author:Knownsec 404 Advanced Threat Intelligence team\nDate: January 21, 2025\n中文版:https://paper.seebug.org/3269\nRecently, our team discovered attack samples targeting Russian-speaking targets during...\n",
|
||||||
|
"pubDate": "Tue, 21 Jan 2025 02:17:00 +0000",
|
||||||
|
"guid": "https://paper.seebug.org/3270/",
|
||||||
|
"category": "威胁情报"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "战争下的相爱相杀,疑似GamaCopy组织利用军事诱饵对俄发起攻击\n",
|
||||||
|
"link": "https://paper.seebug.org/3269/",
|
||||||
|
"description": "作者:知道创宇404高级威胁情报团队\n英文版:https://paper.seebug.org/3270\n近期,团队在威胁狩猎过程中,发现了针对俄语区目标的攻击样本。团队还关联到另外一个样本,两个样本在运行流程是一致的,并且使用的诱饵主题也是相同的。\n通过对样本的分析和关联,本次样本具备以下特点:\n\n利用军事设施相关内容为诱饵发起攻击。\n使用7z自解压程序(SFX)释放和加载后续载荷。\n利用...\n",
|
||||||
|
"pubDate": "Mon, 20 Jan 2025 09:25:00 +0000",
|
||||||
|
"guid": "https://paper.seebug.org/3269/",
|
||||||
|
"category": "威胁情报"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "探索大型语言模型在Android恶意软件语义分析与分类中的应用\n",
|
||||||
|
"link": "https://paper.seebug.org/3267/",
|
||||||
|
"description": "作者:Brandon J Walton, Mst Eshita Khatun, James M Ghawaly, Aisha Ali-Gombe.\n译者:知道创宇404实验室翻译组\n原文链接:https://arxiv.org/abs/2501.04848\n摘要\n恶意软件分析是一项复杂的过程,涉及对恶意软件功能、来源和潜在影响的检查与评估。通常,这一艰巨的任务需要对软件进行详细剖析,以理解其...\n",
|
||||||
|
"pubDate": "Tue, 14 Jan 2025 06:48:00 +0000",
|
||||||
|
"guid": "https://paper.seebug.org/3267/",
|
||||||
|
"category": "AI安全"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Self-changing Data Type - CVE-2024-40676 漏洞分析\n",
|
||||||
|
"link": "https://paper.seebug.org/3266/",
|
||||||
|
"description": "作者:canyie\n原文链接:https://blog.canyie.top/2024/11/07/self-changing-data-type/\n今年 10 月份的时候,Android 安全公告用 CVE-2024-40676 的编号公布了一个很奇怪的 patch。 \nAccountManagerService checkKeyIntent() 负责检查 account authent...\n",
|
||||||
|
"pubDate": "Fri, 10 Jan 2025 08:46:00 +0000",
|
||||||
|
"guid": "https://paper.seebug.org/3266/",
|
||||||
|
"category": "漏洞分析"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"title": "基于差分隐私的检索增强生成\n",
|
"title": "基于差分隐私的检索增强生成\n",
|
||||||
"link": "https://paper.seebug.org/3265/",
|
"link": "https://paper.seebug.org/3265/",
|
||||||
@ -78,45 +118,5 @@
|
|||||||
"pubDate": "Fri, 20 Dec 2024 01:14:00 +0000",
|
"pubDate": "Fri, 20 Dec 2024 01:14:00 +0000",
|
||||||
"guid": "https://paper.seebug.org/3255/",
|
"guid": "https://paper.seebug.org/3255/",
|
||||||
"category": "AI安全"
|
"category": "AI安全"
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)\n",
|
|
||||||
"link": "https://paper.seebug.org/3256/",
|
|
||||||
"description": "作者:y4tacker\n原文链接:https://y4tacker.github.io/2024/12/16/year/2024/12/Apache-Struts2-文件上传逻辑绕过-CVE-2024-53677-S2-067/\n前言\nApache官方公告又更新了一个Struts2的漏洞,考虑到很久没有发无密码的博客了,再加上漏洞的影响并不严重,因此公开分享利用的思路。\n分析\n影响版本\nSt...\n",
|
|
||||||
"pubDate": "Thu, 19 Dec 2024 08:37:00 +0000",
|
|
||||||
"guid": "https://paper.seebug.org/3256/",
|
|
||||||
"category": "漏洞分析"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "越狱破解马斯克最新AI-Grok2揭秘:特朗普赢得大选背后,AI的推波助澜\n",
|
|
||||||
"link": "https://paper.seebug.org/3254/",
|
|
||||||
"description": "作者:洺熙(米斯特Ai安全组核心成员)\n原文链接:https://mp.weixin.qq.com/s/thSJwKA7RbEueQ7iYsThFQ\n序言\n你可曾想过,马斯克的Ai Grok2大脑里究竟藏着什么秘密?\n本文将带你潜入X平台最新AI模型Grok2的“大脑”,通过对其核心指令——系统Prompt的深度解码,揭开马斯克打造的这款AI的神秘面纱\n我们将一起探索:\n\n从越狱谷歌Gemi...\n",
|
|
||||||
"pubDate": "Wed, 18 Dec 2024 06:02:00 +0000",
|
|
||||||
"guid": "https://paper.seebug.org/3254/",
|
|
||||||
"category": "AI安全"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "AI 作为新型黑客:开发进攻性安全代理\n",
|
|
||||||
"link": "https://paper.seebug.org/3253/",
|
|
||||||
"description": "作者:Leroy Jacob Valencia\n译者:知道创宇404实验室翻译组\n原文链接:https://arxiv.org/pdf/2406.07561\n摘要\n在网络安全这一宏大领域内,由防御性措施向主动防御的转变对于守护数字基础设施的安全至关重要。本文深入探讨了AI在主动防御网络安全中的角色,尤其是通过研发一个名为ReaperAI的独立AI代理,该代理被设计来模拟和实施网络攻击。借助于...\n",
|
|
||||||
"pubDate": "Fri, 13 Dec 2024 07:50:00 +0000",
|
|
||||||
"guid": "https://paper.seebug.org/3253/",
|
|
||||||
"category": "AI安全"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Qwen2.5-Coder 技术报告\n",
|
|
||||||
"link": "https://paper.seebug.org/3252/",
|
|
||||||
"description": "公众号:简单的机器学习\n原文链接:https://mp.weixin.qq.com/s/EiV7x403sVqVcABo_qd2kg\n引言\nQwen2.5-Coder 系列是阿里巴巴团队推出的一款重要的代码生成模型,相比其前代 CodeQwen1.5,该系列在多个方面进行了显著的升级。Qwen2.5-Coder 系列包括两个模型:Qwen2.5-Coder-1.5B 和 Qwen2.5-Co...\n",
|
|
||||||
"pubDate": "Wed, 11 Dec 2024 16:46:00 +0000",
|
|
||||||
"guid": "https://paper.seebug.org/3252/",
|
|
||||||
"category": "经验心得"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Qwen2 源码阅读——核心代码跟读\n",
|
|
||||||
"link": "https://paper.seebug.org/3251/",
|
|
||||||
"description": "公众号:简单的机器学习\n原文链接:https://mp.weixin.qq.com/s/PVSPNfv0I8_cxgPTmOes5w\n我们继续使用上一节使用的样例文本:\n[&quot;你好啊&quot;, &quot;简单的机器学习是为了让机器学习变得更简单而存在的&quot;]\n\n\n这个样例产生的tokens结果为:\n{'input_ids': tensor([[108386, 10392...\n",
|
|
||||||
"pubDate": "Wed, 11 Dec 2024 16:45:00 +0000",
|
|
||||||
"guid": "https://paper.seebug.org/3251/",
|
|
||||||
"category": "经验心得"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
@ -2,70 +2,70 @@
|
|||||||
"银行测试": [
|
"银行测试": [
|
||||||
{
|
{
|
||||||
"title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元",
|
"title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rhRoqSTHcrfaL8N5x8vCAPh6VHguc5261-VtdLLQb2SJRMcRYLgFVDbbROQWWIBC-knqKSKBUPtL-MHksuAAWCsFtyyOgbRQl0sZD1GQa9Cfclwur7HsaJpxfGUSj8ln68fipKlE57sTgi_-J6M0aPtaUbQMKWkh4GX96hhX83pQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9zHGYqlalT_VJfHDwO02w2ubGj6ACF2k2sCzsIsgR4GhI4L_qnp_v4V9Ua596Obr-lOwJLzSFD4EOMu9ZMumPtDHSwDplYMtaBqrGxdbQjGnA7ARKXsg7FmoJfE-U2yV7ggUz3yBpaUr9EVYC2DfmvqhJLZUOsMufJoKUtO8QUTmq3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...",
|
"description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...",
|
||||||
"author": "观八闽",
|
"author": "观八闽",
|
||||||
"pubDate": "2022-02-22 15:30:56"
|
"pubDate": "2022-02-22 15:30:56"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "央行出手!支付宝们正式被“收编”了!",
|
"title": "央行出手!支付宝们正式被“收编”了!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa2JtvXf_rPEpccH-m52xNFMrALDuNbcuJohjag6wQmP4lAKrSKTMipqb8ldk8u-9o_kaDJrPcV6SvbR3k0huRdG13QnEqoTx1_xoKmG6L3Rd4QyYY49B90hCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbZAu6cad5tPelPzLtv1Lwxu4iyHDCcmcabpXC1X0WaaA4xln6MP2dgarr0xpk5odhX1kWStfnfvj4Z6Z2lq8I1TrmwZ3NjM7mICVKVuf8hXbSgXZgprj6MUY-UZGbO56rA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...",
|
"description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2017-10-17 11:43:30"
|
"pubDate": "2017-10-17 11:43:30"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "美联储最新消息!要求银行多备“家底”,特别是→",
|
"title": "美联储最新消息!要求银行多备“家底”,特别是→",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbdDtWwd52ceau2FpNciYilkOvNeysKbmy1IfJ5MKkSw_S2HELKfFMbnGqIRBnQB_b5ejG9xDGR1kTcyvEDm34K-3ZBgj81RMxhiB4xSpApRngIpIkHq24uB535pjGOOjYg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9ss8CigRbhT_yMa4YqOu96E7Xh0U9c0BAbvoB6c3I3c4DAEyT01f-1lIvf8U9cDwz9LOCmyYK9mK7kheh35rpjQG2Usw7E-63flovrxorx8E1VfWiFHJPhYv-iLgGfd_7OU18FY5YCIbcgrAOAqCmwLrc-SQ9N9bqrXoyjzescGQNGbbB75bUeA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...",
|
"description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...",
|
||||||
"author": "央视财经",
|
"author": "央视财经",
|
||||||
"pubDate": "2023-07-12 16:15:05"
|
"pubDate": "2023-07-12 16:15:05"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?",
|
"title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9U5OF2ACRxNnLbQxf03q7r8u7XUnVZTeVE4nkSz0PwDTMAjmQuFHTtta7Wr06HIXrWRkZPSoMcd4dcendsmGEdIL1pxyqMm6AO9S6Sq7Sivg9V0SAyE2-JrlQMwu_9WL--z0YjdTGy9qQ4sT_tBFrc3SWY8eHa7foGUB4CxJhmUZQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9aPDFhYC8n_PNja9JhuLl9kxF6yapTbed5HRMDTnDwzN9XVcW1w1wQeH3VmAIy6GBJWowvMxfjekqshLLGAuai8aOcmULjtXq1IIkfngfrEGt_F4mQS3hxgxZAyaKanzRGibtH4X2P47JDWNOs6bkOr3BzwJ2E4sc4ALha0IAQRlQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...",
|
"description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...",
|
||||||
"author": "人民网舆情数据中心",
|
"author": "人民网舆情数据中心",
|
||||||
"pubDate": "2022-08-31 19:55:10"
|
"pubDate": "2022-08-31 19:55:10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
|
"title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPawyX6vkab5SGyZCSYCNNMFuUMJFJtJxVjBC_Gn0KWSdVS9hAcGpvlvNiQIiFV3nkm5Xjy9_0IhCcFYPtNahEBZs9ex4arp3ank-D-3IG9F8zlzoMIQrKewA5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbTdGRMwa_653aBQyU47D6FlkqSKzl6e1ffSkU6QpugmafsejFJCUl6__wiHN6alHh_wMDl4D0BPCjsCgkLkk-CpBfsOHm55Uy61fWckpbRhi-ejLc7uOxLENGbbB75bUeA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
|
"description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2017-05-29 08:02:43"
|
"pubDate": "2017-05-29 08:02:43"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
|
"title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rNagPmxwjOE27wtfsirXywKNqtIY_UB-WqOHZguU8Nk00JGnYLXX5uNN56wrmpDKyR25zYI_7M-vy4E2IqX4YAcCCjNjreH6GdMF7d-YKrSG2NkyM0mNfQFQZWPwbdTuVGL8wFNHgbggQCG5y-Dz6m7ah34bClrEHdD_SlPI9xf0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9WymiMDeKO_fhN5VvStj6hFNGQmFzkNC4cwOup0nFvpXtmPIGjThDzS-G0i2LhVkycd4R8o7iwhRBidlSIpHl1qod-Q5Cnb-oZeztTQ1lTy3D-dIUyWmCORYm4hDqgjGm8AfEntrJp45Wcvwwy4Gr1L0wxV0sO3jAIwv9_HXHgvde0WC6Sbi7DA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
|
"description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
|
||||||
"author": "新华网思客",
|
"author": "新华网思客",
|
||||||
"pubDate": "2023-05-05 13:51:35"
|
"pubDate": "2023-05-05 13:51:35"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?",
|
"title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9U5OF2ACRxNnLbQxf03q7r8u7XUnVZTeVE4nkSz0PwDTMAjmQuFHTtkOOwpS7QNWZfj7J2d-Sq079RqJaT8mEwlAdtC1V8Q7GGx7o9yI8-RqiWlJXwXx8NYfxl8f0OsKzKXPVRcPnmANCPpfN-KMeE9dsNuMAAZYbfb4hG0uBhTS54z_tGSZTqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9aPDFhYC8n_PNja9JhuLl9kxF6yapTbed5HRMDTnDwzN9XVcW1w1wQSjIVyN3uhxTqStfkC2YdJd5CLbtO2v1Ikx8fybmPaKjraVlKeXJyyEUNOiMClRHotBpj9olJy2-MNz2AI--yTLVfD86FkCU7guPnCx4CAO9oRRg5ZuiETsHpHkoPMgL3A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...",
|
"description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...",
|
||||||
"author": "人民网舆情数据中心",
|
"author": "人民网舆情数据中心",
|
||||||
"pubDate": "2017-09-14 08:16:46"
|
"pubDate": "2017-09-14 08:16:46"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10",
|
"title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsfy8RImedEk6VgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3xg7PiGc7Ivj3HjkyfweHc4-1qTWZuRONFtzelMgH1Xb1q3oE7vwIwWviUqMB_VCSiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4YUzE4CSGQjeVgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3LQ2q4RtFD6M1s0Dc4LpO5wy8KM5mA5n8tAOlWETac2080W518x-5tm7Ax68ZBx0KiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...",
|
"description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...",
|
||||||
"author": "人民网舆情数据中心",
|
"author": "人民网舆情数据中心",
|
||||||
"pubDate": "2017-01-12 17:06:08"
|
"pubDate": "2017-01-12 17:06:08"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?",
|
"title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsfy8RImedEk6VgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmMscpQq9cKnWTHcnA0HNPYvhXatOQ_n7twwDNqe9-JiCo5nEI8ooTdukLFRUmb0_nziZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4YUzE4CSGQjeVgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmMknVSjThfxnakac6hZ0A51m0h56Yfltd8X6KlCWe4r0J4pBP9nxXGmYam4HSJrIuNiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...",
|
"description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...",
|
||||||
"author": "央视新闻",
|
"author": "央视新闻",
|
||||||
"pubDate": "2017-01-14 16:40:10"
|
"pubDate": "2017-01-14 16:40:10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?",
|
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rNagPmxwjOE27wtfsirXywKNqtIY_UB-WqOHZguU8Nk00JGnYLXX5mquKHp2P9d4DFHRvtXv0UwBOSo32vP6I6GHRClFzPuDBfOOsMhADRkGt7bFflDASUPd_F6FZAJhgskZj9dPSp7GB15iASPu76Qg4k5dpcBM2S7ZA33ujNZj3x9Nw6p-Fg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZVJ2ZZBTou4bOqv7z--_GAlqXa8Fplpd9WymiMDeKO_fhN5VvStj6hFNGQmFzkNC4cwOup0nFvpXtmPIGjThDzaTe_eog5sBzSEl3tdM79uSHkuSjXbbqihWrrzzdCtGEmiKJVgV5NHj24_6PNylGMIPQe1bPP6Ynl4Oq84MGlr6luCEmXPxpghF6t7hyWboeVTPjuaZtZDR5LU3lqtPw9g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=D1AF7B42106647D6A6A18BE4E83B9D57A73D275C6790698D",
|
||||||
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...",
|
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...",
|
||||||
"author": "新华网思客",
|
"author": "新华网思客",
|
||||||
"pubDate": "2023-03-16 10:44:22"
|
"pubDate": "2023-03-16 10:44:22"
|
||||||
@ -74,142 +74,142 @@
|
|||||||
"APP逆向": [
|
"APP逆向": [
|
||||||
{
|
{
|
||||||
"title": "AndroidApp常见逆向工具和使用技巧",
|
"title": "AndroidApp常见逆向工具和使用技巧",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzs0BbZ7TK0caiVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AdH1-6NDlA140Gkrz_XK5XBN2W_mfzAo_O1mvY93dg2FnkWDHcnE8vZJ6fmRI7ixUiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4wKz3c_ko8DGVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AyC_nS3wnZj0iNsJLywZ6RbaykOSlSwU4dYRZMjPjPFpirNjC3rXHVWm7P7BUaCMkiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
"description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...",
|
"description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...",
|
||||||
"author": "黑白之道",
|
"author": "黑白之道",
|
||||||
"pubDate": "2016-10-26 10:17:15"
|
"pubDate": "2016-10-26 10:17:15"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "一文了解安卓APP逆向分析与保护机制",
|
"title": "一文了解安卓APP逆向分析与保护机制",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVmWR3iyh-E-4ebAWXFj-gdMsdZTotE4jn5p9icW0XZ_hz_lW_RCWS6NHDI5wyCuJsx39aax8AKZqXPcICIPYbxhN-gifK-Orn5VpOExHfwXWxgg-eeXTzVUSYTqT4eyLmA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9Fh3XIYrMAGv8DFrr22hvP7lXc8UxwhPrmt35a3KpBu6ny2zYHVUy0SsOJjskydDvO3wLOPnpaQCaSR8p2UO7B9BkbwobdSIikD8FDX-9J0O3kPWJiNfaiEAGC8U7o5bKP7YigLRNhrAshrUjZ0KgzMPkolrcIHbL_lGqUy072-WrCDCayYmfpA..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
"description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
|
"description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
|
||||||
"author": "FreeBuf",
|
"author": "FreeBuf",
|
||||||
"pubDate": "2018-03-31 18:12:34"
|
"pubDate": "2018-03-31 18:12:34"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "记某APP登录逆向解密过程",
|
"title": "记某APP登录逆向解密过程",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9II7Vh_mr6GjLFczSpmCFj5fRjzd-z69k9l3xUU8T-UAgP318sWFtg7bVpQUtu0jnX1FTSap7nASbrywFaao_ahDwUGO_xmtrchivfF33Ik0jBk3snXw816lVMm0CHoSnFpS3yJ0UWgvFujz37jCuqJWKuP63a_3ZOWvx9NQnVbJflztgI7RZ1g..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9-x80KM2ExBnuTLaCGHND4pnodWQPfS713l4o4wsrc482IPoKr1Um2HzgvxA0EybWw16OdaRSypMDI0pnF6VUUW1g0c3Gfij7f-NC6j_yPRVOfC1THeHO8UiywAE1Cgs6g6myVY3KoX_zVVm4Sy_n5-_QV12l5zpNEdNaBfgoAUzyPfCoem7FzA..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
"description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...",
|
"description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...",
|
||||||
"author": "黑白之道",
|
"author": "黑白之道",
|
||||||
"pubDate": "2024-05-03 08:36:47"
|
"pubDate": "2024-05-03 08:36:47"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "FlutterAPP逆向实践",
|
"title": "FlutterAPP逆向实践",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9SS7O9-TOAQq_aytedZw9y-6rqCRj4gJV1R06K_JHUTp249UCALqkex7EbPx7oKq7dCdvtKXouZB_ezLxDwp7u96RqnipBwzJCqZDAP1de3co9zc0QEe7sp4f6elfYRiRlpFa2UTUcwjrsr1Q6TALaEvedV67UlpLI2IxdELttQX6zvkPgoArRQ..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd92U8oVlW74XCy_hT5Z6fd3wg-E2l-K3Eibp5tKtnEOT7Ai4Lo9w2wJqnCwd5sG8uHKKIVqSswHQv9WTr8JgCIA3Va7QM70SQPj1a_JGOrOlB-nr_k7Ye9gelIGGR6XqpSVCz9r6uIzM_J9_ojCoSIG0pdsdNo8Zink5oRK5NLzTjI3OTRHYU2og..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
"description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...",
|
"description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...",
|
||||||
"author": "看雪学苑",
|
"author": "看雪学苑",
|
||||||
"pubDate": "2022-07-21 17:59:03"
|
"pubDate": "2022-07-21 17:59:03"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"title": "抖音APP逆向:附带抓包与6神算法探索",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9c854Ys4If4OUfsVWxv1m1FOevAHzMpEp-bBVxcGEP4FWu2rRIo5DOiy12-5BsMFNV6Sya2FLqQaBunkDL_vkPmE8h17sIoR-Kc-ztQ_S2-Opa6TnS6aJq1cbrSNYZ9hWDGDWmKJUbXRNcYkVEoeQymnhCGtBRX7pgaIn3-AeUN_zAjcIGepUqA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
|
||||||
"description": "走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必...",
|
|
||||||
"author": "彪哥in讲py",
|
|
||||||
"pubDate": "2025-01-03 13:10:22"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"title": "APP逆向神器之Frida【Android初级篇】",
|
"title": "APP逆向神器之Frida【Android初级篇】",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9y1Qey4TDHPFnwfED5CCSTC_4FU14Q9qN2bss3Wk2SsLnKFwM74jQ6UKvskh30n8gkqfKCegExufF1_bbt3HTDZFc_htOgCafDVN78Wi2ulTgG7t05BoiW-MGGKazMQtkukp-EXYyhJQOvLmvUokxLqiEPDFDYy4bjJBJ9_QAvV8Y-UZGbO56rA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9MLT0_HWdfepul4uZd1-sqYjPkDJOBTX5ScPMk3ZLze1YYmLdlbLd9YCQywu7Xx_1aUhDbwM6kCW1mdmmd62zqOC1HFgIx7CyM88tmpkmbLYRTF_uAp4oOyGfhJfYCbzPACNT3uQyHhHKzZ8SL37ZftbXDnx54uXZtynVfH9EJNny08OLTBhW0A..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
"description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...",
|
"description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...",
|
||||||
"author": "NightTeam",
|
"author": "NightTeam",
|
||||||
"pubDate": "2019-07-03 09:00:11"
|
"pubDate": "2019-07-03 09:00:11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "APP逆向之SO必备分析手法",
|
"title": "某文APP逆向抓取分析",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9DekuFrSah2MDLH3d1ABtfHiSq42IHf6dIeSPj1pf9G3jmZsNOMQFOpfzTKux7Jnd_xoORBUeoNoXKqDKCw1Qv6JzpsQo0--02RFk0JKQMmEVISvYyNT5d3V6ZCUddf_KT4wP-kBee03XyWSJLlDKHrSyjVUQD3eA4ZFUO1m11YndrgozfSg6bw..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9A2w6H1-L671_cpd7DIwb6HxM8Tg2skDofI5uP0eqZVyT-ZKz1dMK-N9zbOh5JytwuQMI9Iw1eklR9NU_YschWd8WuSVWZGneifUlgUO0DdmQZj7acxftXS57wN0R3gkTLGLP4v_ZS9l8vkYgT1vinXbGqACn98KJShDScdzRj9TYl_Q5RRZQjg..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
"description": "APP逆向过程中,需要对dex文件和elf文件进行分析,又因现在各APP都有各种代码保护手法,因此都需要进行动态分析.今天就分享...",
|
"description": "逆向app一定要多练习,这样才能在实践中找到自己的不懂之处,才能够成长.好啦,今天的逆向小文章就到此结束啦,童鞋们下篇文...",
|
||||||
"author": "编码安全",
|
"author": "猿人学Python",
|
||||||
"pubDate": "2023-04-07 08:31:00"
|
"pubDate": "2020-05-07 20:19:43"
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "对某数藏类app逆向安全分析",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9TBe0Cy2M0PMHAsDTkWG1XCgridKRYXPmTOJTEuQ_HkomuFNwiPBMpAZXe8TaJkLqpAXTX02VYshcMw9ShVaDRR_whO3gQ4P4PUM0qhAu7-f8Yal_i9MYUItxgxhVwVI9e1HlnC5bS4eb1ckRRupTKMm-iF2vJ-NCh-QWLvjJh1Zj3x9Nw6p-Fg..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
|
||||||
"description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...",
|
|
||||||
"author": "编角料",
|
|
||||||
"pubDate": "2023-03-10 18:32:22"
|
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "APP逆向系列(一)",
|
"title": "APP逆向系列(一)",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9wMOpBnCfE3dg3oov0U35WJcchc1r8AswXk0mlXzRDPozNfkwT3nBR1SqqTNqkENWehFUIiOyiinHbYHVHqxzCujUsJzqpdtQaLay1F2XExFt1qOLHbtaCMz4L18n7QXOxbOI6GK54uHq1TKbjPZnVajlf0i46OkVbJS8-NBnSD2TJmCU1UgHwQ..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9lKEFNQl0rrlenp4wiJ8SXvf80-YxmieIEjsgWR3J5xNlBAk-V1FIXL1qCf8pITgwKB66yt9Sj5cdNFS7YUvPcOjBqWON9It4wh94ZyOOgTSe1t7XJPgtKizTsNmaXttc6IEvnYYYefYytHrekPzji63WAkJb4HNnNRzgBtY_RGZ5LU3lqtPw9g..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
"description": "APP逆向系列(一)最近在解决APP逆向问题,之前都是不系统的学习,知道工具,知道hook,但是跟某些金融比起来还是差点意思...",
|
"description": "APP逆向系列(一)最近在解决APP逆向问题,之前都是不系统的学习,知道工具,知道hook,但是跟某些金融比起来还是差点意思...",
|
||||||
"author": "呼啦啦安全",
|
"author": "呼啦啦安全",
|
||||||
"pubDate": "2024-04-14 11:12:10"
|
"pubDate": "2024-04-14 11:12:10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "APP逆向sign签名算法:Python实战指南",
|
"title": "APP逆向之SO必备分析手法",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9BFWAUHaIeovflPuJQwjMACirLwaa4ZDc_PA19BDpqx6zWZ2Zqm0u_hD-JaXB6KjOmTKDetHcQqRP5vqUhoVoODGop2kQDwoXCEjwq68bCoNh6DOZnTVbsguXGEFA2NShd4-zsHRToI51fFnTDh0nMaNKfL2_aAVocmGauHRr2wY6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd93QJZ_u6DtVBLCm5tIS1c4tgwdDeovk5qtt-Bk3ddgLhihS-O339CSoz3v5anw9Ye_G7S6Q3N8uYjNsyO--xiYd-3e_pv-8Dg_nq8TS6llOg-7aLr_T2yfgg65zCaHguXgFkG_6yja0R3-pvL3sGSyABm_ux1OvssSOHWu61Gkb7FcvUoAZZH7Q..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
"description": "在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...",
|
"description": "APP逆向过程中,需要对dex文件和elf文件进行分析,又因现在各APP都有各种代码保护手法,因此都需要进行动态分析.今天就分享...",
|
||||||
"author": "雷雷讲py",
|
"author": "编码安全",
|
||||||
"pubDate": "2025-01-03 09:40:29"
|
"pubDate": "2023-04-07 08:31:00"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "好用的APP逆向工具",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9z3opM6K7omYoqQdItmBEbfQ0WnB_BhFgbn949veAQ7OzJoMWhEd-66EQQaxs_c2buizi4n44NhKmIOewTtBrR96f_CAhpxvjVdenCun64ZB1eWbkaXAGcDTZJqPyBYuYGIBcuTawofZ0jrgkBmbFPrCriDDeVxgOKgjoYz2pRmtAe0f8bRARvQ..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
|
"description": "从此APP逆向快人一步Apkdb概述《Android APK+Dex文件反编译及回编译工具》 简称:APKDB.是一款,针对Android OS系统APK...",
|
||||||
|
"author": "素人一鸣",
|
||||||
|
"pubDate": "2025-01-16 15:58:50"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "对某数藏类app逆向安全分析",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZK5YZrY9O7_nOqv7z--_GAlqXa8Fplpd9pDYDmo_6WbPmVpOz58Jw8jKLqWBpDx5FF2Gs-FMfbVxtEvJOilYPIgFYzPK4vkVky_nV98DTRup51rNXBda2oKmU7oWltoViI84BiKP-Dy-lIv1Wj5vGjLX9zGBlOR_UE5meSB4JJfkodeosb-nPKPrjwV6QzPrMUKFnD6TBUESfxjh3za6jWA..&type=2&query=APP%E9%80%86%E5%90%91&token=D1AFA70D740323B2C3C5EE808C330A53C3796D7A67906993",
|
||||||
|
"description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...",
|
||||||
|
"author": "编角料",
|
||||||
|
"pubDate": "2023-03-10 18:32:22"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"渗透测试": [
|
"渗透测试": [
|
||||||
{
|
{
|
||||||
"title": "200万年薪!人民网这个岗位等你来!",
|
"title": "200万年薪!人民网这个岗位等你来!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa_plC5_ZJUUkLLIU2NwkV0Aty3GmpgU9meXdUReGoasbcmzUULiaWYWq6jIz4UBCCqI1SBeBb3jEb9yTd7cYC2t6KD-nXNjg6dxQ7wKKpsSHrbpSz_G5k61FH6In5Ei3zg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbW7umqEKhc-ffZiOymcpZuwFEdV2co-OaYS1WW8r2sRfpdIz1lnDH_S0pCw2N5saCbBkrHJFsNuFEELa-zoRJad9ORg0w6ALekOupoSt0ok0-Ybc4yPGCcpS6t2rFt2rnA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...",
|
"description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2018-08-03 15:22:17"
|
"pubDate": "2018-08-03 15:22:17"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "人社部拟新增10个新职业,看看自己能干点啥",
|
"title": "人社部拟新增10个新职业,看看自己能干点啥",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qDsFRFV-ZzXfCvj94FC6YOCmQFB9BWWWafAk6KRdyQctNO0VF5P6p39phm7usO2ZeyAcvf4A6Wd4e_4QVLFnuk3PkBQYVLsbm0T79C8mbjjstYEBKZzvVUTGSWWaFmuY5XT6GuIMRofAHQAzNZ3vqh4i4P3lNj0cuF15pqZ8V7rS-e4Yz84xMA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9M5KIC-0rGvxrKrOE4yeaVB6jc9d8AW15FEbXjOLlcPp1-EZxVpENWkfxV-10Mav2T78uXAmjVAOefeDuF4cLKoC8Fu_b3bij_cQT4ySRNEffksrd64MBextydOvCsxoiSM-jGcEWUUNroyU4YeFsDHNwt-TxIhSa2NrUqYy87xv1AfaFW2DefQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
|
"description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
|
||||||
"author": "人民网海南频道",
|
"author": "人民网海南频道",
|
||||||
"pubDate": "2020-05-13 14:27:12"
|
"pubDate": "2020-05-13 14:27:12"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
|
"title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9kG3AVxFmsfwybgm7fy7_melAZgfjVgt8Lho_Dlc2y7w9EjKkgqCWr-ieTiC-MrLHpVnsFUCCq6UET7GzfBZqxfJBmSuZbz95GaKlQDGpiQrNlDqt0p8i-z8Z3F0sIi8oM9GgU6xYxxyFcAiERQFjQXZr5CEtnZSR0RAtzTPdsTXFcvUoAZZH7Q..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9RsusdENeiGVElJrChdjvPNX1fkjozfz_F6fy-DJlS_RvnZqWbCJpksJoA15S_Hqd_3i-kL4Xs7KDzA7X8A4xhqmfzh63-HT6s1HZXbR-HRAxbf8_sK0eg67RHN2IMxYAwECVfhiGanzUmM23iMTlqTss7K9PXKpbMOArGZaJ9_fy08OLTBhW0A..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
|
"description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
|
||||||
"author": "新华网",
|
"author": "新华网",
|
||||||
"pubDate": "2017-08-24 14:13:15"
|
"pubDate": "2017-08-24 14:13:15"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "中新网招新了!打工人,速来!",
|
"title": "中新网招新了!打工人,速来!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9j3-2h4QLLOmN4d3w9rfzotkbCZKH75C8KhZsaQycPPuDKoI3EBBOkPDnaE9d67308CCnovBzXpB1ZFnROyLlVvtJ7e0rnko_54Ou1WmjjSqpRKq-qqIJFf8OXmnsprU4zNhWbCKgveYvp_GMRPLf_KUbLHgxM_kObknL--RqEtJf_71bqkOtiw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd95OuhsEbLC57Qio8rhMngNxQ-vEVsbkF8HGScjeHMoX_Tn9cetiQ3iOxnV3ZC6M71ljIugnocwRayxpiw6-7WPdrgNjMAjrCos7tQ0kHdbHCRQJxwta5mDqc8mVlULy3snI5CoAaHnbJTB0wznThx5-ADm-EoU4hRZyl7oZWhCAzs46dn8Efgxg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...",
|
"description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...",
|
||||||
"author": "中国新闻网",
|
"author": "中国新闻网",
|
||||||
"pubDate": "2020-11-03 15:52:39"
|
"pubDate": "2020-11-03 15:52:39"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "人社部拟新增10个新职业,网友疯狂@李佳琦",
|
"title": "人社部拟新增10个新职业,网友疯狂@李佳琦",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9t4_S6H3nsRQkDz8GIoA1XcSVyrdi1GefED2vttBjAwDfNdktfkUULLz48tTCTLyJpUz1ruE66Obxz8e43aFvDJEDgs-6AxsFj1elB2EJFkR6qQMRQVb0kpA7-hcq6Mx_b4rgEwHlWBzdvsFf_Vri6p4mq2WE0l8BB91IcC7ClCvYl_Q5RRZQjg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd98TDUbjC5H1Xa1oN67VNw5rKFcsG1D03eqW3KUFdUcHzSEUqMq_A9nQjTPsVZZPiOkE8Uyh-K_oDDeDuTbGUUgo2Uh0zUDlMVW01FkZthHOGXVHwjGiiDmIZLXsyprFWWShIhG_j9OdrQY6vQivX-QFzw0F0SW5PbJqKX1p1OtVKE8RsmObDbtQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
|
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
|
||||||
"author": "光明网",
|
"author": "光明网",
|
||||||
"pubDate": "2020-05-12 18:12:17"
|
"pubDate": "2020-05-12 18:12:17"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!",
|
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa0XkfCGfpKqpmgePJTIT3MqdUyLc8FumCOoy8y2xppMjTLV3Lp47oOiTkE5z_kbRrZL05aGPT2ZF2hRIkOtXU1Gk1hTT4jZEimGzN4JLhucmlO5icazpOGNFH6In5Ei3zg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbXg7rMz4y5aCaGmAduDd8oYEnsCJNxnouw4DA67TrJ5lR-ReEQdsMnsrDpqQKM7mlH0I-dw6uGhTiCRo4ksSdJC8-UPAd_nwGVR54YceD_PJHlAKZvz3U9iq3X8EKMKOIA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...",
|
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2020-07-10 19:38:53"
|
"pubDate": "2020-07-10 19:38:53"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "撒贝宁惊现滑雪场!硬核测评来了→",
|
"title": "撒贝宁惊现滑雪场!硬核测评来了→",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbQDIawWPPmTCmRLx9i13LDhoZC1nnZ8bTIywmaIA3dr-5mRrWYDwl14SqEBBVy3mjrtOwbjh66uwKzLmREOCdEnJboCYbSjP5cZ60HYo6flPZe8ahDk5XDsYJSSFPgfogQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9ss8CigRbhT_yMa4YqOu96E7Xh0U9c0BAbvoB6c3I3c4DAEyT01f-1gAJPi-uLeSDzVgAoUbeHg5gjJ8qIpcAuNaYTmSEVnsi0pBXrOagW8PQ2oVD18D68aHEfYSD-nvnlTuFDMsuvXFUkS99sCyYQxV3fwgwckp-gyadaqMUOxGq3X8EKMKOIA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...",
|
"description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...",
|
||||||
"author": "央视财经",
|
"author": "央视财经",
|
||||||
"pubDate": "2022-12-30 15:14:23"
|
"pubDate": "2022-12-30 15:14:23"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...",
|
"title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbUSR-1-pv1BAfcoe0NV0Meyppjk4Y7mnFmRPgqzVOfLQ04mmkbPErrdEp1b3-98VHu5WNkdl3_M1Es8d9IsKXzVFXp5hmztU8Sjhi9w_5QNTnHNQD_cGelJS6t2rFt2rnA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9ss8CigRbhT_yMa4YqOu96E7Xh0U9c0BAbvoB6c3I3c4DAEyT01f-1nxS5zk00z-gYcdUc7sC_gsl8k3sY0WMXy_tFbdEzgy7re0AEItUNr3TvhcYwUKidcWsIsO2z3qtWLgjL0szXxp0M0cXL-cSasncT6xJbOKBAwrO_AWNp0U89kyxDwoXvg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...",
|
"description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...",
|
||||||
"author": "央视财经",
|
"author": "央视财经",
|
||||||
"pubDate": "2018-10-09 06:45:24"
|
"pubDate": "2018-10-09 06:45:24"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "李佳琦们要“转正”了!",
|
"title": "李佳琦们要“转正”了!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPazoQbTOwUoq99UzIEhppoaSgTAzQ-AyjiPmq_uzbSQZN30Fx05V91TzDYvQ0aZ5H86QuYT6EkrjNjtdM4OmYdXj8euNgn7zhBFAjftMp0TtS7Oq0HubfG5R6VKrzu_4XKA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9vCKR6_KOD86weyJtyDXvuPB2ZkUaGIyQwRDv-oue22VJrJW-WjJWbX7E2NUksseVecS-zPq5ZTCt4te3nn8ZvRtGHaptLJqZehPm-aPT1g3cmt-ohWYPzeLbEWLZMNkoCNZesFuC6f6D_MPj9g3s6FE8O854_8gbjFAGKEsUIEHs46dn8Efgxg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
|
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
|
||||||
"author": "人民网",
|
"author": "人民网",
|
||||||
"pubDate": "2020-05-12 19:02:37"
|
"pubDate": "2020-05-12 19:02:37"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "撒贝宁现身滑雪场,硬核测评“小汉堡”",
|
"title": "撒贝宁现身滑雪场,硬核测评“小汉堡”",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9zlHbF8gxj7EGssOPTd2IvMx5S0ON1zeUFHf1s66aDGU2jlSed1g6RjB7DEtuh3fGfPGVBjuatAKkShHzcHshGcaLuCrCRjtkzCU4ZmphVL1em06lwAJh0NBcqeaI5kje3IGShRIYmsS4-Dgf2jIgYCLp6_GWYKd9YRubsJSyhSOFW6cwuUnkdA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ7sSphQ4AIV3Oqv7z--_GAlqXa8Fplpd9QpRxgAL8K-_aNOjyfTqUYlJdh9QhUpbZ7Kpi_SUbwriq-KaDJqTyqcw4tiPHZ4UC0GWLHS215zl9h32uDsgIxFXHZLUhpd0VR55OSD50G3QsViD8bQlYchdDEM8CQDgaTo_75KW9Ywp26ZajvA3iP5B8_mq_hXaJDuFJ98ETRJbzAjcIGepUqA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=D1AFD20E7A0C2BBCCCCAE78884885C33CC24DC6167906998",
|
||||||
"description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...",
|
"description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...",
|
||||||
"author": "央视新闻",
|
"author": "央视新闻",
|
||||||
"pubDate": "2022-12-30 18:03:44"
|
"pubDate": "2022-12-30 18:03:44"
|
||||||
@ -218,217 +218,217 @@
|
|||||||
"手机银行漏洞": [
|
"手机银行漏洞": [
|
||||||
{
|
{
|
||||||
"title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
|
"title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd92qG-YUDuw2cKCKXEijUUwzmJ7LovMb9TK-xo6XmlKI8WTNaY5-SY58cqk1mlByBRCmPmcPx04njC2vGprTRkD8dlexVLDFa83kOaEAU6FbNGDQ6Ms-2LwveLyIsfiaCvFHgfk9SVtXI-wVkb-oMIH8UiAS3ewJf-2uhfP-HNbZo89kyxDwoXvg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd9R5a3JsIKJZgohq3m8v5mGn3xEkC39-vENPW3M3YN-eUvl6CkFrfa2YxCDykRjos_xCwMyfJqsBGlPGGieaXpOKRjzA1GSaD3bhJ0lPEpY9m8AJTLcp-zaFBEv86chIYsoF2gd_e3GVlfQt2ozXteZVFCdmtvTd03cLj3HU9H0ij0OK9DLfgmPA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
|
"description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
|
||||||
"author": "木火通明",
|
"author": "木火通明",
|
||||||
"pubDate": "2019-04-23 21:42:11"
|
"pubDate": "2019-04-23 21:42:11"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现",
|
"title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9OtUjCS5QQKGyCdvG4y99pRo-WqXYr6-ax5N0Jf357hkjlFfw28s2lD-RSafLbG5nzUq4wcC3SrLNZu0SGOdOZfqitEq8tNyDcatItR0cA20o1k5CdHmld6EmeBFgDejKW0S6bFRcljrDp2eUqkg7nsweMqTwzNZ0kv_xxLnZsMYtPujwwRB2Pw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd9xVhy9OTbkCfriOx6asm8OI0Zz7zB6S7h4PmspIX-ELXRRItnAoXMaVMjEDe1G_Ojv_8j88Xqbi37bAXfnoUNgvAugLu5xkEKGujoejbOJVsv66nKI4YHqZ7YvEarDPBdQQ5Un8-YwKE1jSlPSqOMqt8HOeSXtI5mix5-w7cf1-Z535pjGOOjYg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...",
|
"description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...",
|
||||||
"author": "支付百科",
|
"author": "支付百科",
|
||||||
"pubDate": "2020-03-19 19:33:50"
|
"pubDate": "2020-03-19 19:33:50"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
|
"title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYsaE49eEpb7wvr3Rkj_eAguhj133NVu3yhIj5FQbbvpHHSidwJi73JtZF04wix2W4iiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYsdolrzjXqj1pLnD8uWvrudhCMWot8BieLb2RzJwWX9iT4VrhNhgA8kVVaS2qYQBl8iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...",
|
"description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...",
|
||||||
"author": "安全牛",
|
"author": "安全牛",
|
||||||
"pubDate": "2016-05-19 11:48:56"
|
"pubDate": "2016-05-19 11:48:56"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "黑客攻击发现:多家手机银行APP存漏洞",
|
"title": "黑客攻击发现:多家手机银行APP存漏洞",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9TbuA-A-b-ksJTIujAoBVrQqBy-CpHX8pLpuaQb-j6CrT4CIew68eseJhFYuDAG71iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9gDwTTMmZuzjcwzyFhPO2nRAyjp6FV9VZanb98rO0XSjUwzGKY80HLV0Gx6COKz_hiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
|
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
|
||||||
"author": "E安全",
|
"author": "E安全",
|
||||||
"pubDate": "2016-09-05 11:36:23"
|
"pubDate": "2016-09-05 11:36:23"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "某银行手机APP现支付漏洞3天被盗刷40多万",
|
"title": "某银行手机APP现支付漏洞3天被盗刷40多万",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzkxnNXBuILBBup8Cqq7Tsq0zd7F6ZsjUO5DyPzMFB0eYVGVIycMg0zvxqYKydtZc1iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzyes-Ge369j3Co-sFbQAhKsPTEcOyYNKnZjXr3PeMRzDc1aFCsg8rsLC0brfg2qmeiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
|
"description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
|
||||||
"author": "支付界",
|
"author": "支付界",
|
||||||
"pubDate": "2016-06-16 09:00:18"
|
"pubDate": "2016-06-16 09:00:18"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "警惕!手机银行APP也会存在高危漏洞",
|
"title": "警惕!手机银行APP也会存在高危漏洞",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksQEagkS3beCUFZ-6USo-pcP3YXwdKGmIrE6pSepaYL_0U7_cMO2EAHzFkUu3Dh9ZpiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksQkoh1Sh9dJgKapgqEmlMlCvUs-o76bFk2D-dM70XIA9Cfc4SXbgsSam1TvQpJGHbiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...",
|
"description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...",
|
||||||
"author": "中国信通院CAICT",
|
"author": "中国信通院CAICT",
|
||||||
"pubDate": "2017-03-15 14:13:34"
|
"pubDate": "2017-03-15 14:13:34"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停",
|
"title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9GBNTUPO0R_T1uK-TpcR0Bpu5tyFGgFGabdsxGeNBjZscAx0srPykO-jFxlpJmL6CHFCH7b0T7_Dao4r1RuSFARZR6sEhR2uM4QHMGXXpow0ZHJCKf7YPzRrKsSSd6_t2hzUiMbPE4Y_atdDVE02jnoNRKcOqRaUZngDNBeNYhFbvzHZXxeLdyg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd90_MKY9BV-a_tzIegx12UuuuWaPLscBeVc4qYrn8ZgwH9zPn1-rYQA7okzHUXoZIqiGX2I0iRL53CsOS0hSavBhV2ypKgwO4bXCOnI4C2TWnG90SJCWGubxl5Cwv1el9yD3KN6c93CCFWpCZbJEefE8W7__mhpfrp_8qYNhP-iHktPujwwRB2Pw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...",
|
"description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...",
|
||||||
"author": "银行科技研究社",
|
"author": "银行科技研究社",
|
||||||
"pubDate": "2019-10-23 12:18:17"
|
"pubDate": "2019-10-23 12:18:17"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……",
|
"title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9zQ1Vfqmm-833UlHLfkNjzraYNmow7gfQmhjTiJYywxSBp4A1AXuwxHaBnQweacTo8BgpwSEM0esRY43HDD6H0sHvmxudJZVfQE8mVKkPxfDACOc0_w9fHNzPSlF9tbrFhHMSkqA0u9vyQW_hZTHYpimwwS9gbx_6K4hWq-4Y9RjvzHZXxeLdyg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd9m5cb0s6JR_zNCEHz6i52VIFSpCqjLWk5J5P7KDVtCs0rVHWxH8XmEiwxsgfUQ8dBLgMBlmTfT9IJnVZNsFMRAl_vVO-1MQkMkOOXyoRIOLz_NxmZFqdUIH6GA3f5tfWm0j1Wrd2rlZaJIh4ryBTdn-9mBXU2Qh5-GdJojfO6gqs89kyxDwoXvg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...",
|
"description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...",
|
||||||
"author": "乐享崇仁",
|
"author": "乐享崇仁",
|
||||||
"pubDate": "2019-09-12 22:35:10"
|
"pubDate": "2019-09-12 22:35:10"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "警惕!有人利用手机银行漏洞疯狂作案30余起……",
|
"title": "警惕!有人利用手机银行漏洞疯狂作案30余起……",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd92UMYIjv1iSdywM-d1jO8jVz8qtKI5XppALPBGF_O0lOaS_nggT-x5nPHuERm3UQI85pQvAcRNSTGc0OsJafSPvWDMBXpZF72LkaSgKQ9j4cKTIdMQ5rvbDa9Z72L5IvFRctUFDBUAIMWYL5vjawE6l4JjSkg4W7XackzCZ8OpCUCYioxHkzTmA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ-Z2P9BxIW8LOqv7z--_GAlqXa8Fplpd9SamOCvhwx0d6CdZsiIUih7kLI9EpFh8bw0knJ6uHDIvPFEidt9VIvot456Cs-EitOt1KjbyuuWMxkm9Pqcodh5r6t7-CpXT5EboJIg6GGFdn48NJOLAJfwtr0G0aumvXnXccrNuPNREQiTm53HUFCEr13RD74cn9k71IYgxmdxd6VKrzu_4XKA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...",
|
"description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...",
|
||||||
"author": "玉山生活",
|
"author": "玉山生活",
|
||||||
"pubDate": "2019-09-15 17:21:04"
|
"pubDate": "2019-09-15 17:21:04"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!",
|
"title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUatIqQYOMlGNW_Nssy-N7jJGR4EThcddlYvn2S8hUmzX9fukBQSbS2WWHASkWj7QcqiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4ccluG6pWZhOVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUab7a7Ge9ltPPuAjBirQ5ibdQXc807f3X9oUuPzrt1lzx18VZkBAfRr0QNwFMBtIX0iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1AFFE21D9AE8E1F6F68422D21F767966F4A98DC6790699E",
|
||||||
"description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...",
|
"description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...",
|
||||||
"author": "集宁佰事通",
|
"author": "集宁佰事通",
|
||||||
"pubDate": "2017-01-20 11:26:29"
|
"pubDate": "2017-01-20 11:26:29"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"银行漏洞": [
|
"银行漏洞": [
|
||||||
{
|
|
||||||
"title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9JadOgJUn_cP8GAl9hK6Y1jFwJ10FWq43ADKxbwPz4Uzx6mrWihNQyc1QX4yHiGB8jnlg5VwUZy5nIrh6vOGmPrBqKmj-8_K1xvJoQOw2OtZndFOY8w1g84aB4nyJGzThfDp7B90uj-4T7HWqSO4TurrmuQZ4koNDokQ3i8LRUW0GX_iHL9MadA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
|
||||||
"description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...",
|
|
||||||
"author": "测试届的LV",
|
|
||||||
"pubDate": "2019-06-10 08:18:15"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
|
"title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9lbKl1LtAgbuGgpPqiNV98ZDA9ZSaP_XCG1nCi7ePS-J80bi7j6ZYbXmowfSmYevXA7zm-UoFK8Dk5FkcwzYXS2penyy_0A1JAf7ES2ut_gBAtcbba6_bWek-3C_YxSBRGH4OYLoX6vXq25pByv6TQ8yBbDScTooWKFKREtfiTv0SYTqT4eyLmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd91QfWQpjIAJaW83layKLh1VZ9Ren9N_a_qw0eNRcz9xLKKIPvb1DpvyT056VaMCnQSlpVQgbghkvpzWuvQrsVmO-XZvYY9YqB71UTGOX4OyMhI3ouZ9zqVGLmXj10loet697BoLLlj9xPR7jm1X_nC4V3Z5aqIlHSBlSccrJYSFiFW6cwuUnkdA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
|
"description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
|
||||||
"author": "新浪财经",
|
"author": "新浪财经",
|
||||||
"pubDate": "2020-07-21 15:52:31"
|
"pubDate": "2020-07-21 15:52:31"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
|
"title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9G4iCENSnZxzQN71udtIzF6CypZJDmx9Yj1F70e5NFjzB-NNXpNbpmunGkuH2h81rd8wsFckKXkivY-NC6JPLDhRa3jidUF9sIYJclzs9biBOF9qfxB1vfPwQK2gMSpyZ_cGzfCfl18K8BFrYLKFp118oXs8ZO03NIvuzW8iKuNz6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9AV_F105sXKjgUfWd9EmqhDVGAcOZQNrtdmc4FKRGLCWS6ht8l2LFworcfmUQz2BnDF95C3i8H5Kejta0fsV1i82R0iMHgu_JbmT0_g_Z_g_V3qvFdXJvNIRhBwsxNF5OSc5vrK2gY9-1-YbeklR9R24jz9oIVF96UWRhPGN-Og3yPfCoem7FzA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
|
"description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
|
||||||
"author": "纽扣资讯网",
|
"author": "纽扣资讯网",
|
||||||
"pubDate": "2018-08-21 19:29:05"
|
"pubDate": "2018-08-21 19:29:05"
|
||||||
},
|
},
|
||||||
|
{
|
||||||
|
"title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9mKT0DQUrRqb8BcrDQvD22xVFCARR8_K6I50421o4bAcZnvRX9hj5xKOp21ihQ9HwIYlgpdagvBTZEYVp7BXG5QjxFDC9Ay9DHpgaDCBRtfjFUj14VLWqrnrzNCe_28Plr-6K7gI13efqjXTDdMyazXrIMqaF5dAuwdDWgyumkZurCDCayYmfpA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
|
"description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...",
|
||||||
|
"author": "测试届的LV",
|
||||||
|
"pubDate": "2019-06-10 08:18:15"
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放",
|
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9lJpbiLZRH1vJjkV2aUakzvX5OFviL3lBHM6YWh_8dMwKoOkW4r62CKhpB_4JiXwcS6YIdN73PWzIdGs7tj5w9V8Sxe0KJVQOIX0L3godNsUNS1jaO2HRWZ8d-6Sar66KBec9xHpcOQKmJKzgFk6tqd9zkhIm-rLiRcc-qHtrsLxCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9OmuA8nYXLl_VjNLyXI2_kJ_ks5sdQqCBdZiXwe9F99opJkuNWqfhwLKEF2Q3LuyRSkGRXZnlfpyBB44uHSCJP3HvTsDxvmULUiGUVubsRkMkclbVYcpqh7NROuOOJ0QaNQOhn797GvoF_efrh-HMTuJjFh_UReVfiwekxAFaKU7S-e4Yz84xMA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...",
|
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...",
|
||||||
"author": "外交之声",
|
"author": "外交之声",
|
||||||
"pubDate": "2017-12-03 23:54:42"
|
"pubDate": "2017-12-03 23:54:42"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任",
|
"title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9y2wKLqRggIyzmeffQqYe13XJ6dtFD2G71eQ2qvIYnDDD3dk9eb2AxEIQCxY5dE5io8WO73JpBStJ98pXJgPyqwUk8743zTfjdaCDrfC8a-MFlkXPozZ_g5GrGfJGNuCgpC_Ug21LArhJ1mqDatK7rjpZQcqK9aDdnj8v5JdY6SXuL0unUdKkuw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9S2Eo3tU5jDTsJukJn462S_znMvpv1N03eSCquBw8ozC8Kjf54NnFBVDNmKHvpWU6it1tMPJUFVFr6wPhORsG1k_s634cZg_uLnbgVKabqXTLbE4wqp2__wvLcYnsR06CLZyACeRIfcvYbg7zNe4M6Lq_CsIavlZKomCIJnR9itzS-e4Yz84xMA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...",
|
"description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...",
|
||||||
"author": "知书局",
|
"author": "知书局",
|
||||||
"pubDate": "2023-02-03 18:20:39"
|
"pubDate": "2023-02-03 18:20:39"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放",
|
"title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9vYcBvx1zJw63CYtjC1V6_G1kXfzCdKKVb304kNFKJqRUuH0ulnaip3W2KCb6ilLLVE1YaBtaAuJB7X2EoB1uUDFfqYTybAeqW7d3-nRV_tlesjIeWJAwQzqtrOeVq06ze1TxxZBCFasGyq4Phd0Eq8KDSebBf4R8aaNLkw7bRFSTJmCU1UgHwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9APYiJWUV4H41oWMpviG-HZ6bMVg6iRdy_BoZqPkzBppNsHIpxW_7G49KjyA544DK1KESybwIHl50tAWv7t_jRrvIAINcrVgCBdtrtaQIKeiJUZPlm81Aqp4eeoffWLdf8qpNKdHmDKUixC-Es5Bi4l63VEsuy28uLfl2uXEqlTwtPujwwRB2Pw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
|
"description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
|
||||||
"author": "澳网",
|
"author": "澳网",
|
||||||
"pubDate": "2017-12-04 23:18:55"
|
"pubDate": "2017-12-04 23:18:55"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”",
|
"title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9s4sxFwHnY-mZ7rORgFcvuJHZOSn9Y9ofAuB3bjswFCtMIDjlcpPf49ujNF-6ZvNvWTJjIGBIydChijs5IuKNlfQgjWmEn0fxZnEXBwp2y29qzNJHqB1a-X3E6klvu60E64_-cVYUjtwjlJmP1P7VBgKRoSa7IcUREFcBDG-HD3R5LU3lqtPw9g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd95tXO73yUIYxpZ2N1p9_DUIKNVkmpnSvd8imVtUhsFBM6XxGXkSyVGsfCBxcCKfyVcL--c7airK9DR_ynKFfAnBmYaFvhbLNfWg8nCXKzDzWAy7mQPy7TyqemaN6lVxJf4FcA09tUflzsWhpSQ8DHs6MaSKbGNUUK5ShefSxN2yWrCDCayYmfpA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...",
|
"description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...",
|
||||||
"author": "火绒安全",
|
"author": "火绒安全",
|
||||||
"pubDate": "2017-09-11 17:23:47"
|
"pubDate": "2017-09-11 17:23:47"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿",
|
"title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9zEhlbpNEfHY-AuiMNOlDLxiKs5O8wU6Q-HGnidyEihvA-WKuTsXxPKeRhsrWmXsaOEk4c8j87rLpFi63dh0fMGXmBZQjBCKgBOPhkjHowbabTPPJ84MKbtT64GwcYcsk4V7L-8HqOap1EFLj9DxdOUoOXGcmVOO9uT7BOin834MY-UZGbO56rA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9Q9y5NoSu3fPTEhbUtfboD7ffSVYQzD5XzTmaWk6LMtbVLPWKLJuIovkkYlwklEfVAhQ_pvTq3BZop9wivDl79SSTKmn6TMaFLi3h63AY09Mfo7PGnhHonJiKIwkGeuhUy45wB_CuIyhsAoANVt-rbrKh2kOI0XadFfa08WkRe1dCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...",
|
"description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...",
|
||||||
"author": "灵枫历史阁",
|
"author": "灵枫历史阁",
|
||||||
"pubDate": "2023-06-04 17:49:26"
|
"pubDate": "2023-06-04 17:49:26"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息",
|
"title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9mi7Ny_FFnhA35xtFluzDpc9Mnd4BayZPwaUQuq5PkS9hYHtYumuTWNuCI4e_8uEUZOc29w-gL7JAdZdAJr8mGthtpLK7cqq7OglLTOYQ_d9F82_zh1Z3SO7Pjy2TErlBkVhQbn5XNomsYV1ZA7Xf8Sh9hxqKbgYsuXsZeXhCXboC2Qmj7RgGwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd98QupOUv1qsdPWAzStrsMMAWaH52qDqvIZH4DqopbwqGNQqWLhSxHaFHSOYGXhaxGX0NO4_VkU17lBMRGQKgeEp0AqydnR5eWCoSyNrBy7-Qd92t1W3nkz-RLKevg22V7OgKHARff09PiWPNGQ5Ckqx92DyWf0nhV_TGp3flSWEEtPujwwRB2Pw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...",
|
"description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...",
|
||||||
"author": "城市知道温哥华",
|
"author": "城市知道温哥华",
|
||||||
"pubDate": "2023-10-09 06:55:35"
|
"pubDate": "2023-10-09 06:55:35"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "黑产利用光大银行漏洞,信用卡1万额度可提15万",
|
"title": "这几种套现方式钻了银行漏洞!竟没有被封…",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9BqvK6Z-gNoxdE3Z1UMK1yh6KokykBVd5aqVHSBL4qhwHmyxsIJ-rhoezSniIPwMSTzzfN9WS84y1gnqNKJT7WbhmaoboULN0288W2vjafoMy9Sy9-i6VClOpXjHAIDq1oc6nNNdwPQ1ysqG0V9ugFnvKoptJa0x2S9SuzsiQTlr0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0aUB9aI6uhjOqv7z--_GAlqXa8Fplpd9pHh2Wmpt9ARzRZOQ4kQsBr9f5x9ub8EW_b4f4oPihLb6_js2nXXjVYnVhhKQ1RIcJYX5xVspxXZljzj46SZxGoiBSvRN_Uuse5AlZlNMRAQaXUe7lZSpQNAWozonBknCJymElDf9IhohrWkle3_jtva3DRp0hY1_wUlrPsHMri0O8fIRwtipOg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=D1B02BDA91E6C75627200A6468CCAC3627AFA9BE679069A3",
|
||||||
"description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...",
|
"description": "不过随着银行监管越来越严,很多卡友也受到了处罚,卡姐有个朋友,堪称“套现小行家”,用信用卡套现了5万元.仍然在银行保持...",
|
||||||
"author": "可转债摊大饼",
|
"author": "来谈钱",
|
||||||
"pubDate": "2018-05-26 13:15:31"
|
"pubDate": "2024-03-17 18:02:42"
|
||||||
}
|
}
|
||||||
],
|
],
|
||||||
"支付漏洞": [
|
"支付漏洞": [
|
||||||
{
|
|
||||||
"title": "史上最全移动支付漏洞案例 谁动了银行卡里的钱?",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgOTsSRz0nQ00TUwMBAIJ2LWq6e1bdhc6Lq8hJPgc9_8ruk899HhLU56D7-o7QYbF_iZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
|
||||||
"description": "雷锋网硬创公开课-移动支付漏洞案例@GeekPwn随着移动支付的普及,我们的生活变得越来越便利.我们甚至已经可以不带钱包、现...",
|
|
||||||
"author": "GeekPwn",
|
|
||||||
"pubDate": "2016-04-19 09:35:10"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "手机支付漏洞已成盗刷之源!小编教你如何防范!",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZAWN8qVBnpvQgp_1IxmUlipVisxxFjLhCrWaIgwh9rxuPTIk9hsOYS7KLSgGDqDXfiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
|
||||||
"description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...",
|
|
||||||
"author": "电脑爱好者",
|
|
||||||
"pubDate": "2016-05-20 17:30:26"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "就一加手机支付漏洞讨论在线支付中的安全风险",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVv4tUOz9mk7i35ahnk4wJ4gBkt60u4fwSX4pvTILJ4MV1MhMdhz2hK6VGJjBsQPvUdYg359zA9hdJ2vpxyUFwKCOpp54ysB73v7LjRQ1nacz2I7qH2LW_RdhWLv6O878UA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
|
||||||
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
|
|
||||||
"author": "FreeBuf",
|
|
||||||
"pubDate": "2018-02-12 19:17:27"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"title": "天融信:《电子支付漏洞报告》重磅发布!",
|
"title": "天融信:《电子支付漏洞报告》重磅发布!",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9pwOF7W4LO9YG42hf3dXZ7wLt6ZXX2ax1DJBQkJYXQQZ2Ghq_9DpFokvj30buiTN-M248XSLRtNDu95gN6rV-oCl3EoPh7K2PfOGfax10mhaOz9VeLjIX9P3B9DOhIHwSI07Bkc5dqdgohKvssMgIIENslEQGQB6qpd86wVG0vTJAe0f8bRARvQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9FUBZyclKJzppnNaqf7khdjN2uFFWHfgbNBdOgu0AN8ihhIt6jlxYIAfdwEtEIisenyuvTbHdcdeKraTPArwnRvdUl8X8l3-w9yRHMbKr4fggTEwaPw94-uJhrJA4TUne51gxQ7y3ZvPUmNwJBhhku3ozjPYjF0P0EAO3v4ygrI5f_71bqkOtiw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
"description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...",
|
"description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...",
|
||||||
"author": "天融信",
|
"author": "天融信",
|
||||||
"pubDate": "2023-07-12 18:21:06"
|
"pubDate": "2023-07-12 18:21:06"
|
||||||
},
|
},
|
||||||
{
|
|
||||||
"title": "银行卡免密支付漏洞这么大!",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xugmhPFf39qNiyzOA8nyyAhMUkUEAIKcD2qktE1GEASs6Yeb1pDEr6wdVlCoRH7zfiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
|
||||||
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
|
|
||||||
"author": "犀牛生意经",
|
|
||||||
"pubDate": "2016-08-29 09:23:44"
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "敏付科技存“支付漏洞”被约谈整改",
|
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd90g7ytJnszwpoA2XHs14-DshlLc5NoF66KKS10bs5pCTls0RqriNvKevbnO3KqLBmiMM1smp5Gjsj_64n288Won2GJ2OZgpFZNV1FrZPPeKIyM_9ZK3WVdZRrwqu4LHqIsYeADMok3Cv-ffgsiuaLezybxOV590y8rSjRWG7ci2QtPujwwRB2Pw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
|
||||||
"description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...",
|
|
||||||
"author": "支付之家网",
|
|
||||||
"pubDate": "2022-01-24 08:00:21"
|
|
||||||
},
|
|
||||||
{
|
{
|
||||||
"title": "利用支付漏洞套现1300万被判15年",
|
"title": "利用支付漏洞套现1300万被判15年",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9OtUjCS5QQKGyCdvG4y99pRo-WqXYr6-ax5N0Jf357hkjlFfw28s2lHfJvTC3R4-g4Vtcsh5eJx4V8-tVXle8FIItaeKUkXaappFjFMl4mqMeskHOcOJwW8YI_v2U33hgGTXau5AOkvqkEQ4c6iHYbpc7TeD2tyWvL07C4C3Vb_QO8fIRwtipOg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9xVhy9OTbkCfriOx6asm8OI0Zz7zB6S7h4PmspIX-ELXRRItnAoXMaQqiw0cp712l9OfgbQAYlqPj6PNNoiSeUdw8ieX7_wJS6B1B78__qrNurVFEwTrUqaYDkICI5tBUigDFaP2EOvnbjOzn7p7X70NYaZvt_yv0dKGuPBDSWoXI3OTRHYU2og..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...",
|
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...",
|
||||||
"author": "支付百科",
|
"author": "支付百科",
|
||||||
"pubDate": "2022-01-03 13:54:08"
|
"pubDate": "2022-01-03 13:54:08"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "某小程序的支付漏洞+任意地址删除",
|
"title": "敏付科技存“支付漏洞”被约谈整改",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd91wWSLqcexsaWc-yS2fJ--ozdXJqgjj86FPU4WTzEtOVKzj7BokQtUN8n_eGfesnzmGAB8Em7yXuaEoB-2LUFCT4aSxx6GEqu7h6B6xOVQyke6My65F2w6R3NG0yNpno_ZHs_UN-ymwo-m3C6e-AKDULxiFrch55K8O-Z5kiqoSItPujwwRB2Pw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9wTdzBee7O2k8ExqdT1_3DwxLFIkXB4nq_NSl0PP-0qdZpln2nQqS73ax1H0izCZZpiDwJy_4qu3VLt4sxF9ZkbXXuJwR9nNhFD2Na4dWNJViHoFAC3If4LRCqb7Xjl76KEa431KeeOyzy-v0h98AoGaiucgpGGmxViRxinjF30kO8fIRwtipOg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
"description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...",
|
"description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...",
|
||||||
"author": "狐狸说安全",
|
"author": "支付之家网",
|
||||||
"pubDate": "2023-09-14 14:25:44"
|
"pubDate": "2022-01-24 08:00:21"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "银行卡免密支付漏洞这么大!",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4VWBshEBEZNGVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xEh0WNyMn01OUafeHdhv3xxm4ND7NmPq0rxWvcsyGTHFX2cnH9ZxIeLdVgVH2XfGwiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
|
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
|
||||||
|
"author": "犀牛生意经",
|
||||||
|
"pubDate": "2016-08-29 09:23:44"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "就一加手机支付漏洞讨论在线支付中的安全风险",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9Fh3XIYrMAGv8DFrr22hvP7lXc8UxwhPrmt35a3KpBu6ny2zYHVUy0fzTmouD28uKucdB59exCwtVCeimLs4dn2JPBUmulZbNTAP4G5_gOfeROuE4dn7-AsFFDT2rm6if8GuWvgfh537hfTvtwelqT145vXTrHh_vOI2oNCrthFf1AfaFW2DefQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
|
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
|
||||||
|
"author": "FreeBuf",
|
||||||
|
"pubDate": "2018-02-12 19:17:27"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "渗透测试之支付逻辑漏洞",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9-x80KM2ExBnuTLaCGHND4pnodWQPfS713l4o4wsrc482IPoKr1Um2KX9oy-H2wZpAC0-bguM9a6wpsHEs_stwZG7Pnkd13W3NB_vEpmc18f1BCp1yUI62z4PnNuDyHfxooHtUBL1in2xBTkSI9l-62SJ8n7Ehs0wNlM8bWPSIzgtPujwwRB2Pw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
|
"description": "支付逻辑漏洞分类:1、支付过程中可直接修改数据包中的支付金额这种漏洞应该是支付漏洞中最常见的,主要针对支付宝等需要第三...",
|
||||||
|
"author": "黑白之道",
|
||||||
|
"pubDate": "2020-05-03 10:23:30"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "从最近的微信支付看XXE漏洞",
|
"title": "从最近的微信支付看XXE漏洞",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVsRR2i5XL2ATXVR0OJ9ZW3VvBSGZtjdT6ORbZ2QSNz6CkoHsAsYvqdz-fl66PY31qY_PcjMrBMtzQs7clvFSBdZVnk4ZyS3yYgllYE2mV7qzHiLciCJDfm_s46dn8Efgxg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9Fh3XIYrMAGv8DFrr22hvP7lXc8UxwhPrmt35a3KpBu6ny2zYHVUy0U6-iFffsFZZKupXLyrvXSi38ERphi-I1mL123iNJTqJhWIn1jLi70QHLrc8BXKqNIrYSDC3SuFj8sJ83EgOBAXVz9hZNxHvL8kNcXA2dk33zhfqYkx7ep0HpHkoPMgL3A..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
"description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
|
"description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
|
||||||
"author": "FreeBuf",
|
"author": "FreeBuf",
|
||||||
"pubDate": "2018-07-08 18:03:00"
|
"pubDate": "2018-07-08 18:03:00"
|
||||||
},
|
},
|
||||||
{
|
{
|
||||||
"title": "渗透测试之支付逻辑漏洞",
|
"title": "逻辑漏洞 |支付漏洞学习",
|
||||||
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9II7Vh_mr6GjLFczSpmCFj5fRjzd-z69k9l3xUU8T-UAgP318sWFtg17m99svulstGUrPdpb6msrqD4IgbxNi4gCXJrw5GYzkc-H1kCIkyd9U8TrjirUCOSrMqHVIq14eVNYhNS2u4HC7ilu69LTuGQgedGth5C2sAiW1yIYOpK7S-e4Yz84xMA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9-x80KM2ExBnuTLaCGHND4pnodWQPfS713l4o4wsrc482IPoKr1Um2AwsjcBxBqzscxW4CeKA1NI3LGa8_-pH0OWAfBUFgUROSuQME650iJ_uW5kDB55_8B3mNJDsarqE8gTj1anAtfv-e87wRb4HTx-cwBXtHh5g2MqOsPA67Z_P28temKTOwg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
"description": "支付逻辑漏洞分类:1、支付过程中可直接修改数据包中的支付金额这种漏洞应该是支付漏洞中最常见的,主要针对支付宝等需要第三...",
|
"description": "验证正常则对订单进行状态处理或为用户进行网站内入账等常见支付漏洞修改支付的价格支付三步曲 —— 订购、订单、付款三个步骤...",
|
||||||
"author": "黑白之道",
|
"author": "黑白之道",
|
||||||
"pubDate": "2020-05-03 10:23:30"
|
"pubDate": "2020-10-31 10:33:06"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "手机支付漏洞已成盗刷之源!小编教你如何防范!",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DEdXGAxkkb-4VWBshEBEZNGVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZlD7FXtCuDS0qTyAiA4AISYTHyEWhmWzDDHK2A0ycAz8fI_OPt2xV_kDfTq-aCI8LiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
|
"description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...",
|
||||||
|
"author": "电脑爱好者",
|
||||||
|
"pubDate": "2016-05-20 17:30:26"
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "微信支付惊曝安全漏洞!0元就能买买买!官方称已修复",
|
||||||
|
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS5wC65iOYyCZ0K00mTeQ6RzOqv7z--_GAlqXa8Fplpd9t2415XxXWeWOd4x_q4Bx7HW4iE_621bUVqharOs6i6Vxvo1sihAVLQvK-fjfhcVB9C52dIU_AwfKxoegUlNfKGEwxEw6U7bDVmOg8XeMLrwOfCCjfurTzWwSV4omaPjIUe2-hhV84SH5dSRcxu13q0EQODWQeoUJ2zwrKahfkUF5LU3lqtPw9g..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=D1B058559BEECE5D2D2B026E7D1054A52E0E62CD679069A8",
|
||||||
|
"description": "陌陌的微信支付漏洞利用过程vivo的微信支付漏洞利用过程值得注意的是,目前漏洞的详细信息以及攻击方式已被公开,安全人员建议...",
|
||||||
|
"author": "中国网",
|
||||||
|
"pubDate": "2018-07-04 17:38:58"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
@ -1,4 +1,454 @@
|
|||||||
[
|
[
|
||||||
|
{
|
||||||
|
"title": "从PAGE_GUARD HOOK 到内存扫描规避",
|
||||||
|
"link": "https://xz.aliyun.com/t/17046",
|
||||||
|
"published": "2025-01-07T12:31:52+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17046",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "从PAGE_GUARD HOOK 到内存扫描规避"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "免杀基础-硬断Hook",
|
||||||
|
"link": "https://xz.aliyun.com/t/17045",
|
||||||
|
"published": "2025-01-07T12:31:25+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17045",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "免杀基础-硬断Hook"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "记一次题型VM-软件系统安全赛-pwn-<vm>",
|
||||||
|
"link": "https://xz.aliyun.com/t/17043",
|
||||||
|
"published": "2025-01-07T01:21:16+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17043",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "记一次题型VM-软件系统安全赛-pwn-<vm>"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "aws之创建后门实现持久化利用的方式",
|
||||||
|
"link": "https://xz.aliyun.com/t/17040",
|
||||||
|
"published": "2025-01-06T17:14:00+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17040",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "aws之创建后门实现持久化利用的方式"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Sharp4Rundll32:一款通过.NET反射实现Rundll32功能绕过安全防护的工具",
|
||||||
|
"link": "https://xz.aliyun.com/t/17038",
|
||||||
|
"published": "2025-01-06T15:54:34+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17038",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Sharp4Rundll32:一款通过.NET反射实现Rundll32功能绕过安全防护的工具"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "软件系统安全赛CachedVisitor详解——记一次对Redis+ssrf的详细分析",
|
||||||
|
"link": "https://xz.aliyun.com/t/17036",
|
||||||
|
"published": "2025-01-06T12:07:06+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17036",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "软件系统安全赛CachedVisitor详解——记一次对Redis+ssrf的详细分析"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Lua项目下SSRF利用Redis文件覆盖lua回显RCE",
|
||||||
|
"link": "https://xz.aliyun.com/t/17034",
|
||||||
|
"published": "2025-01-06T10:05:25+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17034",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Lua项目下SSRF利用Redis文件覆盖lua回显RCE"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "MaxKB远程命令执行漏洞分析(CVE-2024-56137)",
|
||||||
|
"link": "https://xz.aliyun.com/t/17031",
|
||||||
|
"published": "2025-01-05T22:37:00+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17031",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "MaxKB远程命令执行漏洞分析(CVE-2024-56137)"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "codeql 之 SSRF 漏洞自动化 寻找",
|
||||||
|
"link": "https://xz.aliyun.com/t/17030",
|
||||||
|
"published": "2025-01-05T21:18:11+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17030",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "codeql 之 SSRF 漏洞自动化 寻找"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "使用分支对抗进行webshell bypass",
|
||||||
|
"link": "https://xz.aliyun.com/t/17029",
|
||||||
|
"published": "2025-01-05T18:33:40+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17029",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "使用分支对抗进行webshell bypass"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Solon内存马构造",
|
||||||
|
"link": "https://xz.aliyun.com/t/17028",
|
||||||
|
"published": "2025-01-05T17:36:22+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17028",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Solon内存马构造"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "强网杯RS加密签名伪造及PyramidWeb利用栈帧打内存马",
|
||||||
|
"link": "https://xz.aliyun.com/t/17027",
|
||||||
|
"published": "2025-01-05T17:12:56+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17027",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "强网杯RS加密签名伪造及PyramidWeb利用栈帧打内存马"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "XXE 在文件上传当中的应用",
|
||||||
|
"link": "https://xz.aliyun.com/t/17026",
|
||||||
|
"published": "2025-01-05T17:10:20+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17026",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "XXE 在文件上传当中的应用"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "php木马的混淆免杀探究",
|
||||||
|
"link": "https://xz.aliyun.com/t/17023",
|
||||||
|
"published": "2025-01-05T13:29:00+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17023",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "php木马的混淆免杀探究"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "ctf中的字节爆破",
|
||||||
|
"link": "https://xz.aliyun.com/t/17022",
|
||||||
|
"published": "2025-01-04T19:37:51+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17022",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "ctf中的字节爆破"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Thinkphp6高版本反序列化toString新链调试挖掘",
|
||||||
|
"link": "https://xz.aliyun.com/t/17019",
|
||||||
|
"published": "2025-01-04T13:17:14+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17019",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Thinkphp6高版本反序列化toString新链调试挖掘"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "探究Pker对opcode字节码的利用",
|
||||||
|
"link": "https://xz.aliyun.com/t/17018",
|
||||||
|
"published": "2025-01-04T11:11:08+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17018",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "探究Pker对opcode字节码的利用"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Yaml反序列化name标签打响应头回显",
|
||||||
|
"link": "https://xz.aliyun.com/t/17017",
|
||||||
|
"published": "2025-01-04T01:27:15+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17017",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Yaml反序列化name标签打响应头回显"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Pickle反序列化中的字节码重写绕过",
|
||||||
|
"link": "https://xz.aliyun.com/t/17016",
|
||||||
|
"published": "2025-01-03T23:50:09+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17016",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Pickle反序列化中的字节码重写绕过"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "【Reverse-Crypto】深入逆向-密码篇-MD5算法详解以及代码编写",
|
||||||
|
"link": "https://xz.aliyun.com/t/17014",
|
||||||
|
"published": "2025-01-03T21:40:27+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17014",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "【Reverse-Crypto】深入逆向-密码篇-MD5算法详解以及代码编写"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "ORW:侧信道时间盲注",
|
||||||
|
"link": "https://xz.aliyun.com/t/17011",
|
||||||
|
"published": "2025-01-03T21:22:32+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17011",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "ORW:侧信道时间盲注"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "AWD:PWN流程与技巧总结",
|
||||||
|
"link": "https://xz.aliyun.com/t/17010",
|
||||||
|
"published": "2025-01-03T21:17:32+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17010",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "AWD:PWN流程与技巧总结"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "信呼 OA 最新 sql 注入分析",
|
||||||
|
"link": "https://xz.aliyun.com/t/17007",
|
||||||
|
"published": "2025-01-03T16:54:52+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17007",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "信呼 OA 最新 sql 注入分析"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "某小说vip破解代码分析",
|
||||||
|
"link": "https://xz.aliyun.com/t/17006",
|
||||||
|
"published": "2025-01-03T16:01:37+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17006",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "某小说vip破解代码分析"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Hoverfly 任意文件读取漏洞分析",
|
||||||
|
"link": "https://xz.aliyun.com/t/17004",
|
||||||
|
"published": "2025-01-03T15:39:34+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17004",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Hoverfly 任意文件读取漏洞分析"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Sekiro+Yakit 热加载无痛绕sign",
|
||||||
|
"link": "https://xz.aliyun.com/t/17003",
|
||||||
|
"published": "2025-01-03T15:09:34+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/17003",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Sekiro+Yakit 热加载无痛绕sign"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "cJSON库函数存在的堆溢出漏洞分析",
|
||||||
|
"link": "https://xz.aliyun.com/t/16999",
|
||||||
|
"published": "2025-01-02T20:58:51+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16999",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "cJSON库函数存在的堆溢出漏洞分析"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "WP-0ops2024-pwn-<IP Management System>",
|
||||||
|
"link": "https://xz.aliyun.com/t/16998",
|
||||||
|
"published": "2025-01-02T18:50:18+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16998",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "WP-0ops2024-pwn-<IP Management System>"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Linux渗透实战之Hackademic: RTB1靶场提权",
|
||||||
|
"link": "https://xz.aliyun.com/t/16995",
|
||||||
|
"published": "2025-01-02T15:22:06+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16995",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Linux渗透实战之Hackademic: RTB1靶场提权"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "Sharp4UACPASS:一款通过调用CMSTP进程绕过UAC的工具",
|
||||||
|
"link": "https://xz.aliyun.com/t/16994",
|
||||||
|
"published": "2025-01-02T15:12:05+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16994",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "Sharp4UACPASS:一款通过调用CMSTP进程绕过UAC的工具"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "传统Office结构下的后门和利用手段解析",
|
||||||
|
"link": "https://xz.aliyun.com/t/16993",
|
||||||
|
"published": "2025-01-02T14:54:47+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16993",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "传统Office结构下的后门和利用手段解析"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "蚁景网安实验室-双层内网渗透虚拟仿真实战",
|
||||||
|
"link": "https://xz.aliyun.com/t/16992",
|
||||||
|
"published": "2025-01-02T14:51:14+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16992",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "蚁景网安实验室-双层内网渗透虚拟仿真实战"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "春秋云镜—专业徽章—Initial",
|
||||||
|
"link": "https://xz.aliyun.com/t/16991",
|
||||||
|
"published": "2025-01-02T14:43:00+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16991",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "春秋云镜—专业徽章—Initial"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "JAVA代码审计-StudentManager",
|
||||||
|
"link": "https://xz.aliyun.com/t/16990",
|
||||||
|
"published": "2025-01-02T11:32:05+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16990",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "JAVA代码审计-StudentManager"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "伪装成Chrome安装程序传播银狐最新变种",
|
||||||
|
"link": "https://xz.aliyun.com/t/16989",
|
||||||
|
"published": "2025-01-02T07:46:43+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16989",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "伪装成Chrome安装程序传播银狐最新变种"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "绕过App某加密企业版加固Frida检测",
|
||||||
|
"link": "https://xz.aliyun.com/t/16988",
|
||||||
|
"published": "2025-01-01T23:59:38+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16988",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "绕过App某加密企业版加固Frida检测"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "无限安全靶场-月挑战靶场1",
|
||||||
|
"link": "https://xz.aliyun.com/t/16984",
|
||||||
|
"published": "2025-01-01T22:30:52+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16984",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "无限安全靶场-月挑战靶场1"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "shiro codeql分析理解(附带完整ql代码)",
|
||||||
|
"link": "https://xz.aliyun.com/t/16983",
|
||||||
|
"published": "2025-01-01T20:07:25+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16983",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "shiro codeql分析理解(附带完整ql代码)"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "前端加密对抗常见场景突破",
|
||||||
|
"link": "https://xz.aliyun.com/t/16981",
|
||||||
|
"published": "2025-01-01T17:09:23+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16981",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "前端加密对抗常见场景突破"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "BurpSuite插件:OneScan - 递归目录扫描插件",
|
||||||
|
"link": "https://xz.aliyun.com/t/16980",
|
||||||
|
"published": "2025-01-01T12:22:35+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16980",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "BurpSuite插件:OneScan - 递归目录扫描插件"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "CVE-2024-13025-Codezips 大学管理系统 faculty.php sql 注入分析及拓展",
|
||||||
|
"link": "https://xz.aliyun.com/t/16979",
|
||||||
|
"published": "2025-01-01T07:22:48+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16979",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "CVE-2024-13025-Codezips 大学管理系统 faculty.php sql 注入分析及拓展"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "第二届CN-fnst::CTF WriteUp(web,misc,crypto,osint,pwn)",
|
||||||
|
"link": "https://xz.aliyun.com/t/16978",
|
||||||
|
"published": "2024-12-31T23:28:53+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16978",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "第二届CN-fnst::CTF WriteUp(web,misc,crypto,osint,pwn)"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "禅道CMS开源版SQL注入漏洞分析",
|
||||||
|
"link": "https://xz.aliyun.com/t/16976",
|
||||||
|
"published": "2024-12-31T21:12:31+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16976",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "禅道CMS开源版SQL注入漏洞分析"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "2024ImaginaryCTF 12月练习赛——部分Crypto题解分享",
|
||||||
|
"link": "https://xz.aliyun.com/t/16975",
|
||||||
|
"published": "2024-12-31T18:14:07+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16975",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "2024ImaginaryCTF 12月练习赛——部分Crypto题解分享"
|
||||||
|
}
|
||||||
|
},
|
||||||
|
{
|
||||||
|
"title": "JAVA代码审计-某报表平台",
|
||||||
|
"link": "https://xz.aliyun.com/t/16974",
|
||||||
|
"published": "2024-12-31T17:15:00+08:00",
|
||||||
|
"id": "https://xz.aliyun.com/t/16974",
|
||||||
|
"summary": {
|
||||||
|
"@type": "html",
|
||||||
|
"#text": "JAVA代码审计-某报表平台"
|
||||||
|
}
|
||||||
|
},
|
||||||
{
|
{
|
||||||
"title": "记一次渗透测试实战之Sea",
|
"title": "记一次渗透测试实战之Sea",
|
||||||
"link": "https://xz.aliyun.com/t/16972",
|
"link": "https://xz.aliyun.com/t/16972",
|
||||||
@ -548,455 +998,5 @@
|
|||||||
"@type": "html",
|
"@type": "html",
|
||||||
"#text": "企业上云的新攻击面分析"
|
"#text": "企业上云的新攻击面分析"
|
||||||
}
|
}
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集",
|
|
||||||
"link": "https://xz.aliyun.com/t/16886",
|
|
||||||
"published": "2024-12-23T17:29:43+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16886",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "ECH,新时代的域前置",
|
|
||||||
"link": "https://xz.aliyun.com/t/16884",
|
|
||||||
"published": "2024-12-23T16:17:20+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16884",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "ECH,新时代的域前置"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "CSS Injection 从入门到精通",
|
|
||||||
"link": "https://xz.aliyun.com/t/16879",
|
|
||||||
"published": "2024-12-22T22:06:24+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16879",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "CSS Injection 从入门到精通"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解",
|
|
||||||
"link": "https://xz.aliyun.com/t/16878",
|
|
||||||
"published": "2024-12-22T20:46:30+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16878",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "LitCTF2024--Crypto-wp",
|
|
||||||
"link": "https://xz.aliyun.com/t/16875",
|
|
||||||
"published": "2024-12-22T16:19:45+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16875",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "LitCTF2024--Crypto-wp"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)",
|
|
||||||
"link": "https://xz.aliyun.com/t/16874",
|
|
||||||
"published": "2024-12-22T16:15:09+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16874",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Linux渗透实战之HTB-Heal",
|
|
||||||
"link": "https://xz.aliyun.com/t/16873",
|
|
||||||
"published": "2024-12-22T15:13:56+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16873",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "Linux渗透实战之HTB-Heal"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "春秋云境-多维挑战-CloudNet-WP",
|
|
||||||
"link": "https://xz.aliyun.com/t/16872",
|
|
||||||
"published": "2024-12-22T03:40:12+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16872",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "春秋云境-多维挑战-CloudNet-WP"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "另辟蹊径的bypass方式",
|
|
||||||
"link": "https://xz.aliyun.com/t/16871",
|
|
||||||
"published": "2024-12-22T00:16:30+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16871",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "另辟蹊径的bypass方式"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "国城杯线下web出题思路分享",
|
|
||||||
"link": "https://xz.aliyun.com/t/16870",
|
|
||||||
"published": "2024-12-21T23:05:12+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16870",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "国城杯线下web出题思路分享"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "国城杯线下决赛master_ast题解",
|
|
||||||
"link": "https://xz.aliyun.com/t/16869",
|
|
||||||
"published": "2024-12-21T21:44:07+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16869",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "国城杯线下决赛master_ast题解"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "暴力通关,PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解",
|
|
||||||
"link": "https://xz.aliyun.com/t/16867",
|
|
||||||
"published": "2024-12-21T20:50:08+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16867",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "暴力通关,PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "DASCTF 2024最后一战|寒夜破晓,冬至终章(部分wp)",
|
|
||||||
"link": "https://xz.aliyun.com/t/16866",
|
|
||||||
"published": "2024-12-21T20:16:12+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16866",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "DASCTF 2024最后一战|寒夜破晓,冬至终章(部分wp)"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "2024 DASCTF const_python详解",
|
|
||||||
"link": "https://xz.aliyun.com/t/16864",
|
|
||||||
"published": "2024-12-21T19:51:16+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16864",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "2024 DASCTF const_python详解"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Zeropz-楚慧杯L组WP",
|
|
||||||
"link": "https://xz.aliyun.com/t/16863",
|
|
||||||
"published": "2024-12-21T19:44:53+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16863",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "Zeropz-楚慧杯L组WP"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Dirty Pagetable 学习 & 例题",
|
|
||||||
"link": "https://xz.aliyun.com/t/16862",
|
|
||||||
"published": "2024-12-21T19:23:38+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16862",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "Dirty Pagetable 学习 & 例题"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "针对单一系统渗透测试",
|
|
||||||
"link": "https://xz.aliyun.com/t/16861",
|
|
||||||
"published": "2024-12-21T19:21:15+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16861",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "针对单一系统渗透测试"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Cross cache Attack技术细节分析",
|
|
||||||
"link": "https://xz.aliyun.com/t/16860",
|
|
||||||
"published": "2024-12-21T19:19:11+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16860",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "Cross cache Attack技术细节分析"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "某某语音auth值生成分析",
|
|
||||||
"link": "https://xz.aliyun.com/t/16859",
|
|
||||||
"published": "2024-12-21T17:59:50+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16859",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "某某语音auth值生成分析"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "蓝队—反钓鱼的策略提供",
|
|
||||||
"link": "https://xz.aliyun.com/t/16858",
|
|
||||||
"published": "2024-12-21T17:12:06+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16858",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "蓝队—反钓鱼的策略提供"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "windows内核进程遍历常见方式",
|
|
||||||
"link": "https://xz.aliyun.com/t/16857",
|
|
||||||
"published": "2024-12-21T16:38:04+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16857",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "windows内核进程遍历常见方式"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "ez_zhuawa出题记录",
|
|
||||||
"link": "https://xz.aliyun.com/t/16856",
|
|
||||||
"published": "2024-12-21T15:44:09+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16856",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "ez_zhuawa出题记录"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Windows内核回调",
|
|
||||||
"link": "https://xz.aliyun.com/t/16855",
|
|
||||||
"published": "2024-12-21T15:17:48+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16855",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "Windows内核回调"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Linux渗透实战之不一样的XSS",
|
|
||||||
"link": "https://xz.aliyun.com/t/16853",
|
|
||||||
"published": "2024-12-21T10:53:08+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16853",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "Linux渗透实战之不一样的XSS"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "基于优化的大模型越狱技术分析与实战",
|
|
||||||
"link": "https://xz.aliyun.com/t/16852",
|
|
||||||
"published": "2024-12-20T21:17:55+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16852",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "基于优化的大模型越狱技术分析与实战"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE",
|
|
||||||
"link": "https://xz.aliyun.com/t/16850",
|
|
||||||
"published": "2024-12-20T18:55:42+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16850",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解",
|
|
||||||
"link": "https://xz.aliyun.com/t/16849",
|
|
||||||
"published": "2024-12-20T17:24:00+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16849",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "代码审计-某物联网系统RCE",
|
|
||||||
"link": "https://xz.aliyun.com/t/16848",
|
|
||||||
"published": "2024-12-20T17:19:40+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16848",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "代码审计-某物联网系统RCE"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP",
|
|
||||||
"link": "https://xz.aliyun.com/t/16847",
|
|
||||||
"published": "2024-12-20T17:10:07+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16847",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "某系统审计权限绕过-CVE-2024-9554",
|
|
||||||
"link": "https://xz.aliyun.com/t/16845",
|
|
||||||
"published": "2024-12-20T16:53:05+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16845",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "某系统审计权限绕过-CVE-2024-9554"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "某系统代码审计到getshell",
|
|
||||||
"link": "https://xz.aliyun.com/t/16841",
|
|
||||||
"published": "2024-12-20T16:08:09+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16841",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "某系统代码审计到getshell"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto",
|
|
||||||
"link": "https://xz.aliyun.com/t/16846",
|
|
||||||
"published": "2024-12-20T14:30:16+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16846",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "银狐黑产组织最新免杀样本详细分析",
|
|
||||||
"link": "https://xz.aliyun.com/t/16837",
|
|
||||||
"published": "2024-12-20T08:17:20+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16837",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "银狐黑产组织最新免杀样本详细分析"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "初识AFL:工具安装与基本用法",
|
|
||||||
"link": "https://xz.aliyun.com/t/16836",
|
|
||||||
"published": "2024-12-20T03:07:30+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16836",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "初识AFL:工具安装与基本用法"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "某渗透中代码审计到内网遨游",
|
|
||||||
"link": "https://xz.aliyun.com/t/16835",
|
|
||||||
"published": "2024-12-19T21:53:53+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16835",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "某渗透中代码审计到内网遨游"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Pointer Overflow CTF - 2024 Web全write up",
|
|
||||||
"link": "https://xz.aliyun.com/t/16834",
|
|
||||||
"published": "2024-12-19T20:58:58+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16834",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "Pointer Overflow CTF - 2024 Web全write up"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "浅析实战攻防中的信息收集",
|
|
||||||
"link": "https://xz.aliyun.com/t/16832",
|
|
||||||
"published": "2024-12-19T16:32:00+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16832",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "浅析实战攻防中的信息收集"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "Spring FatJar写文件到RCE分析",
|
|
||||||
"link": "https://xz.aliyun.com/t/16831",
|
|
||||||
"published": "2024-12-19T16:04:00+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16831",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "Spring FatJar写文件到RCE分析"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "应急响应记录之水坑挂马事件分析与恢复",
|
|
||||||
"link": "https://xz.aliyun.com/t/16829",
|
|
||||||
"published": "2024-12-19T14:27:41+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16829",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "应急响应记录之水坑挂马事件分析与恢复"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "万字长文窥探信息收集真正的艺术",
|
|
||||||
"link": "https://xz.aliyun.com/t/16828",
|
|
||||||
"published": "2024-12-19T13:57:53+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16828",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "万字长文窥探信息收集真正的艺术"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "记一次5000万资产的渗透测试",
|
|
||||||
"link": "https://xz.aliyun.com/t/16827",
|
|
||||||
"published": "2024-12-19T12:34:52+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16827",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "记一次5000万资产的渗透测试"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "一次 house of force 练习:HTB pwn - Fancy names",
|
|
||||||
"link": "https://xz.aliyun.com/t/16825",
|
|
||||||
"published": "2024-12-19T11:41:53+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16825",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "一次 house of force 练习:HTB pwn - Fancy names"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞",
|
|
||||||
"link": "https://xz.aliyun.com/t/16824",
|
|
||||||
"published": "2024-12-19T11:13:41+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16824",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "面向GPTs的提示词注入攻击分析",
|
|
||||||
"link": "https://xz.aliyun.com/t/16816",
|
|
||||||
"published": "2024-12-18T23:23:30+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16816",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "面向GPTs的提示词注入攻击分析"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
{
|
|
||||||
"title": "PE文件代码注入",
|
|
||||||
"link": "https://xz.aliyun.com/t/16815",
|
|
||||||
"published": "2024-12-18T23:11:47+08:00",
|
|
||||||
"id": "https://xz.aliyun.com/t/16815",
|
|
||||||
"summary": {
|
|
||||||
"@type": "html",
|
|
||||||
"#text": "PE文件代码注入"
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
]
|
]
|
Binary file not shown.
Binary file not shown.
@ -1,75 +0,0 @@
|
|||||||
2025-01-15 10:24:33 - INFO - __main__:<module>:279 - 程序正在运行当中。
|
|
||||||
2025-01-15 10:24:43 - INFO - __main__:send_first_message:255 - 飞书发送 程序信息 成功
|
|
||||||
2025-01-15 10:24:44 - INFO - __main__:send_first_message:257 - 飞书发送 首次运行提醒 成功
|
|
||||||
2025-01-15 10:24:44 - INFO - __main__:main_job:195 - 发送程序启动,当前时间为:2025-01-15 10:24:44
|
|
||||||
2025-01-15 10:24:44 - INFO - __main__:main_job:196 - 正在启动各爬虫并获取资源中...
|
|
||||||
2025-01-15 10:24:45 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【银行测试】的微信公众号-Sogou搜索内容保存成功。
|
|
||||||
2025-01-15 10:24:50 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【APP逆向】的微信公众号-Sogou搜索内容保存成功。
|
|
||||||
2025-01-15 10:24:56 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【渗透测试】的微信公众号-Sogou搜索内容保存成功。
|
|
||||||
2025-01-15 10:25:01 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【手机银行漏洞】的微信公众号-Sogou搜索内容保存成功。
|
|
||||||
2025-01-15 10:25:07 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【银行漏洞】的微信公众号-Sogou搜索内容保存成功。
|
|
||||||
2025-01-15 10:25:12 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【支付漏洞】的微信公众号-Sogou搜索内容保存成功。
|
|
||||||
2025-01-15 10:25:18 - INFO - __main__:check_avaliable:65 - 飞书发送 微信公众号关键词相关内容 成功
|
|
||||||
2025-01-15 10:25:33 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【sql注入】获取开始。
|
|
||||||
2025-01-15 10:25:39 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【cnvd】获取开始。
|
|
||||||
2025-01-15 10:25:45 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【未授权】获取开始。
|
|
||||||
2025-01-15 10:25:52 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【漏洞POC】获取开始。
|
|
||||||
2025-01-15 10:25:59 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【RCE】获取开始。
|
|
||||||
2025-01-15 10:26:05 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【渗透测试】获取开始。
|
|
||||||
2025-01-15 10:26:11 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【反序列化】获取开始。
|
|
||||||
2025-01-15 10:26:17 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【攻防】获取开始。
|
|
||||||
2025-01-15 10:26:24 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【webshell】获取开始。
|
|
||||||
2025-01-15 10:26:31 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【红队】获取开始。
|
|
||||||
2025-01-15 10:26:37 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【redteam】获取开始。
|
|
||||||
2025-01-15 10:26:44 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【信息收集】获取开始。
|
|
||||||
2025-01-15 10:26:50 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【绕过】获取开始。
|
|
||||||
2025-01-15 10:26:56 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【bypass av】获取开始。
|
|
||||||
2025-01-15 10:27:02 - INFO - spider.github:github_main_repo:108 - github_repo:项目【BeichenDream/Godzilla】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:08 - INFO - spider.github:github_main_repo:108 - github_repo:项目【rebeyond/Behinder】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:14 - INFO - spider.github:github_main_repo:108 - github_repo:项目【AntSwordProject/antSword】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:19 - INFO - spider.github:github_main_repo:108 - github_repo:项目【j1anFen/shiro_attack】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:20 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1
|
|
||||||
2025-01-15 10:27:25 - INFO - spider.github:github_main_repo:108 - github_repo:项目【yhy0/github-cve-monitor】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:31 - INFO - spider.github:github_main_repo:108 - github_repo:项目【gentilkiwi/mimikatz】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:37 - INFO - spider.github:github_main_repo:108 - github_repo:项目【ehang-io/nps】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:43 - INFO - spider.github:github_main_repo:108 - github_repo:项目【chaitin/xray】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:48 - INFO - spider.github:github_main_repo:108 - github_repo:项目【FunnyWolf/pystinger】更新情况获取开始。
|
|
||||||
2025-01-15 10:27:54 - INFO - spider.github:github_main_repo:108 - github_repo:项目【L-codes/Neo-reGeorg】更新情况获取开始。
|
|
||||||
2025-01-15 10:28:00 - INFO - spider.github:github_main_repo:108 - github_repo:项目【shadow1ng/fscan】更新情况获取开始。
|
|
||||||
2025-01-15 10:28:05 - INFO - spider.github:github_main_repo:108 - github_repo:项目【SafeGroceryStore/MDUT】更新情况获取开始。
|
|
||||||
2025-01-15 10:28:11 - INFO - spider.github:github_main_repo:108 - github_repo:项目【EdgeSecurityTeam/Vulnerability】更新情况获取开始。
|
|
||||||
2025-01-15 10:28:12 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1
|
|
||||||
2025-01-15 10:28:17 - INFO - spider.github:github_main_repo:108 - github_repo:项目【Vme18000yuan/FreePOC】更新情况获取开始。
|
|
||||||
2025-01-15 10:28:23 - INFO - spider.github:github_main_repo:108 - github_repo:项目【wy876/POC】更新情况获取开始。
|
|
||||||
2025-01-15 10:28:28 - INFO - spider.github:github_main_release:153 - github_repo:项目【BeichenDream/Godzilla】发版情况获取开始。
|
|
||||||
2025-01-15 10:28:34 - INFO - spider.github:github_main_release:153 - github_repo:项目【rebeyond/Behinder】发版情况获取开始。
|
|
||||||
2025-01-15 10:28:40 - INFO - spider.github:github_main_release:153 - github_repo:项目【AntSwordProject/antSword】发版情况获取开始。
|
|
||||||
2025-01-15 10:28:46 - INFO - spider.github:github_main_release:153 - github_repo:项目【j1anFen/shiro_attack】发版情况获取开始。
|
|
||||||
2025-01-15 10:28:46 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1
|
|
||||||
2025-01-15 10:28:51 - INFO - spider.github:github_main_release:153 - github_repo:项目【yhy0/github-cve-monitor】发版情况获取开始。
|
|
||||||
2025-01-15 10:28:52 - WARNING - spider.github:github_main_release:160 - github_repo:项目【yhy0/github-cve-monitor】不存在版本发布情况。
|
|
||||||
2025-01-15 10:28:57 - INFO - spider.github:github_main_release:153 - github_repo:项目【gentilkiwi/mimikatz】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:03 - INFO - spider.github:github_main_release:153 - github_repo:项目【ehang-io/nps】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:09 - INFO - spider.github:github_main_release:153 - github_repo:项目【chaitin/xray】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:14 - INFO - spider.github:github_main_release:153 - github_repo:项目【FunnyWolf/pystinger】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:20 - INFO - spider.github:github_main_release:153 - github_repo:项目【L-codes/Neo-reGeorg】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:26 - INFO - spider.github:github_main_release:153 - github_repo:项目【shadow1ng/fscan】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:32 - INFO - spider.github:github_main_release:153 - github_repo:项目【SafeGroceryStore/MDUT】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:37 - INFO - spider.github:github_main_release:153 - github_repo:项目【EdgeSecurityTeam/Vulnerability】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:38 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1
|
|
||||||
2025-01-15 10:29:43 - INFO - spider.github:github_main_release:153 - github_repo:项目【Vme18000yuan/FreePOC】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:44 - WARNING - spider.github:github_main_release:160 - github_repo:项目【Vme18000yuan/FreePOC】不存在版本发布情况。
|
|
||||||
2025-01-15 10:29:49 - INFO - spider.github:github_main_release:153 - github_repo:项目【wy876/POC】发版情况获取开始。
|
|
||||||
2025-01-15 10:29:55 - INFO - spider.github:github_main_user:188 - github_user:作者【su18】更新情况获取开始。
|
|
||||||
2025-01-15 10:30:00 - INFO - spider.github:github_main_user:188 - github_user:作者【BeichenDream】更新情况获取开始。
|
|
||||||
2025-01-15 10:30:06 - INFO - spider.github:github_main_user:188 - github_user:作者【phith0n】更新情况获取开始。
|
|
||||||
2025-01-15 10:30:12 - INFO - spider.github:github_main_user:188 - github_user:作者【zhzyker】更新情况获取开始。
|
|
||||||
2025-01-15 10:30:18 - INFO - spider.github:github_main_user:188 - github_user:作者【lijiejie】更新情况获取开始。
|
|
||||||
2025-01-15 10:30:23 - INFO - spider.github:github_main_user:188 - github_user:作者【projectdiscovery】更新情况获取开始。
|
|
||||||
2025-01-15 10:30:29 - INFO - spider.github:github_main_user:188 - github_user:作者【HavocFramework】更新情况获取开始。
|
|
||||||
2025-01-15 10:30:36 - INFO - __main__:check_avaliable:65 - 飞书发送 Github项目监控-关键词监控 成功
|
|
||||||
2025-01-15 10:30:51 - INFO - __main__:check_avaliable:88 - Github项目监控-项目更新情况数据为空,跳过执行。
|
|
||||||
2025-01-15 10:30:51 - INFO - __main__:check_avaliable:65 - 飞书发送 Github项目监控-大佬工具 成功
|
|
||||||
2025-01-15 10:31:06 - INFO - __main__:check_avaliable:88 - Github项目监控-项目版本发布监测数据为空,跳过执行。
|
|
||||||
2025-01-15 10:31:06 - INFO - __main__:main_job:205 - 单次运行结束,等待下一次运行...
|
|
||||||
2025-01-15 10:31:50 - INFO - __main__:signal_handler:51 - 接收到退出信号,程序即将退出...
|
|
Binary file not shown.
Loading…
Reference in New Issue
Block a user