Compare commits

...

5 Commits
V1.2 ... main

Author SHA1 Message Date
2f6ae2b404 更新优化 2025-03-14 11:50:28 +08:00
42ad72c0ca update 2025-01-24 17:36:53 +08:00
36c9b9beb4 update 2025-01-23 10:20:10 +08:00
f1ee2d1092 Bugs fixed 2025-01-22 15:11:15 +08:00
fd7a51f24b 大型更新优化 2025-01-22 14:03:36 +08:00
56 changed files with 4843 additions and 6259 deletions

215
Core.py
View File

@ -20,6 +20,7 @@ from spider.xianzhi import xianzhi_main
from spider.sougou_wx import sougou_wx_main from spider.sougou_wx import sougou_wx_main
from spider.github import github_main, load_github_config from spider.github import github_main, load_github_config
from spider.baidu import baidu_main from spider.baidu import baidu_main
from spider.uni import uni_spider
from GotoSend.M_4hou import Src_4hou from GotoSend.M_4hou import Src_4hou
from GotoSend.anquanke import Src_anquanke from GotoSend.anquanke import Src_anquanke
from GotoSend.doonsec import Src_doonsec from GotoSend.doonsec import Src_doonsec
@ -30,7 +31,8 @@ from GotoSend.seebug import Src_seebug
from GotoSend.sougou_wx import Src_sougou_wx from GotoSend.sougou_wx import Src_sougou_wx
from GotoSend.github import Src_github from GotoSend.github import Src_github
from GotoSend.baidu import Src_baidu from GotoSend.baidu import Src_baidu
from config.check_config import get_core_config, get_debug_config, get_kewords_config from GotoSend.uni_rss import Src_uni_rss
from config.check_config import get_core_config, get_debug_config, get_keywords_config
from loguru import logger from loguru import logger
# 清除所有已有的日志记录器配置 # 清除所有已有的日志记录器配置
@ -58,103 +60,148 @@ webhook_url_once, timestamp_once, sign_once = gen_sign()
e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config() e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config()
def check_avaliable(info_long, info_short, title, webhook_url, timestamp, sign): def check_avaliable(info_long, info_short, title):
if info_long: # 发送完整文章相关内容 if info_long: # 发送完整文章相关内容
# logger.info(f"{title} 递送中(飞书):") if fs_activate == "True":
result = SendToFeishu(info_long, title, webhook_url, timestamp, sign) # logger.info(f"{title} 递送中(飞书):")
logger.info(result) webhook_url, timestamp, sign = gen_sign()
time.sleep(15) result = SendToFeishu(info_long, title, webhook_url, timestamp, sign)
else: logger.info(result)
pass time.sleep(15)
if info_short: # 发送精简文章相关内容 if info_short: # 发送精简文章相关内容
# 企业微信相关 # 企业微信相关
if wx_activate == "True": if wx_activate == "True":
# logger.info(f"{title} 递送中(企业微信):") # logger.info(f"{title} 递送中(企业微信):")
result = SendToWX(info_short, title) for info in info_short:
logger.info(result) result = SendToWX(info, title)
logger.info(result)
time.sleep(15) time.sleep(15)
else:
pass
# 钉钉相关 # 钉钉相关
if ding_activate == "True": if ding_activate == "True":
# logger.info(f"{title} 递送中(钉钉):") # logger.info(f"{title} 递送中(钉钉):")
# result = SendToWX(info_short, title) # 待完善 # for info in info_short: # 开发中,暂未实现
logger.info(result) # result = SendToDD(info, title)
# logger.info(result)
time.sleep(15) time.sleep(15)
else:
pass
if not info_long and not info_short:
logger.info(f"{title}数据为空,跳过执行。")
def send_job_RSS(time_1): def send_job_RSS(time_1):
Doonsec_switch, Doonsec = get_kewords_config('Doonsec') Doonsec_switch, Doonsec = get_keywords_config('Doonsec')
# print(f"当前配置信息Doonsec_switch{Doonsec_switch}") uni_switch, Unity = get_keywords_config('Unity')
# 爬取数据
seebug_main()
anquanke_main()
huawei_main()
doonsec_main()
qianxin_main()
freebuf_main()
xianzhi_main()
M_4hou_main()
# 分析各个数据源的结果(输出长结果)
result_4hou_long = Src_4hou(time_1, False)
result_anquanke_long = Src_anquanke(time_1, False)
result_doonsec_long = Src_doonsec(False, Doonsec_switch, Doonsec)
# print(result_doonsec_long)
result_xianzhi_long = Src_xianzhi(time_1, False)
result_freebuf_long = Src_freebuf(time_1, False)
result_qianxin_long = Src_qianxin(time_1, False)
result_seebug_long = Src_seebug(time_1, False)
# 分析各个数据源的结果(输出短结果)
result_4hou_short = Src_4hou(time_1, True)
result_anquanke_short = Src_anquanke(time_1, True)
result_doonsec_short = Src_doonsec(True, Doonsec_switch, Doonsec)
result_xianzhi_short = Src_xianzhi(time_1, True)
result_freebuf_short = Src_freebuf(time_1, True)
result_qianxin_short = Src_qianxin(time_1, True)
result_seebug_short = Src_seebug(time_1, True)
webhook_url, timestamp, sign = gen_sign()
check_avaliable(result_4hou_long, result_4hou_short, "嘶吼资讯", webhook_url, timestamp, sign) # Seebug数据获取分发
check_avaliable(result_anquanke_long, result_anquanke_short, "安全客资讯", webhook_url, timestamp, sign) seebug_main()
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯", webhook_url, timestamp, sign) seebug_results = Src_seebug(time_1)
check_avaliable(result_xianzhi_long, result_xianzhi_short, "先知社区资讯", webhook_url, timestamp, sign) if seebug_results != False:
check_avaliable(result_freebuf_long, result_freebuf_short, "FreeBuf资讯", webhook_url, timestamp, sign) result_seebug_long, result_seebug_short = seebug_results
check_avaliable(result_qianxin_long, result_qianxin_short, "奇安信攻防社区资讯", webhook_url, timestamp, sign) check_avaliable(result_seebug_long, result_seebug_short, "Seebug社区资讯")
check_avaliable(result_seebug_long, result_seebug_short, "Seebug社区资讯", webhook_url, timestamp, sign) else:
logger.info("Seebug数据为空跳过执行。")
# 安全客数据获取分发
anquanke_main()
anquanke_results = Src_anquanke(time_1)
if anquanke_results != False:
result_anquanke_long, result_anquanke_short = anquanke_results
check_avaliable(result_anquanke_long, result_anquanke_short, "安全客资讯")
else:
logger.info("安全客数据为空,跳过执行。")
# 华为数据获取分发
huawei_main()
# 奇安信数据获取分发
qianxin_main()
qianxin_results = Src_qianxin(time_1)
if qianxin_results != False:
result_qianxin_long, result_qianxin_short = qianxin_results
check_avaliable(result_qianxin_long, result_qianxin_short, "奇安信攻防社区资讯")
else:
logger.info("奇安信数据为空,跳过执行。")
# FreeBuf数据获取分发
freebuf_main()
freebuf_results = Src_freebuf(time_1)
if freebuf_results != False:
result_freebuf_long, result_freebuf_short = freebuf_results
check_avaliable(result_freebuf_long, result_freebuf_short, "FreeBuf资讯")
else:
logger.info("FreeBuf数据为空跳过执行。")
# 先知数据获取分发
xianzhi_main()
xianzhi_results = Src_xianzhi(time_1)
if xianzhi_results != False:
result_xianzhi_long, result_xianzhi_short = xianzhi_results
check_avaliable(result_xianzhi_long, result_xianzhi_short, "先知社区资讯")
else:
logger.info("先知数据为空,跳过执行。")
# 4hou数据获取分发
M_4hou_main()
M_4hou_results = Src_4hou(time_1)
if M_4hou_results != False:
result_4hou_long, result_4hou_short = M_4hou_results
check_avaliable(result_4hou_long, result_4hou_short, "嘶吼资讯")
else:
logger.info("嘶吼数据为空,跳过执行。")
# 洞见微信安全数据获取分发
doonsec_main()
doonsec_results = Src_doonsec(Doonsec_switch, Doonsec)
if doonsec_results != False:
result_doonsec_long, result_doonsec_short = doonsec_results
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯")
else:
logger.info("洞见微信安全数据为空,跳过执行。")
# 聚合RSS数据获取分发
uni_spider()
rss_results = Src_uni_rss(uni_switch, Unity)
if rss_results != False:
result_rss_long, result_rss_short = rss_results
check_avaliable(result_rss_long, result_rss_short, "聚合RSS资讯")
else:
logger.info("聚合RSS数据为空跳过执行。")
def send_job_SX(): def send_job_SX():
Sogou_WX = get_kewords_config('Sogou-WX') Sogou_WX = get_keywords_config('Sogou-WX')
sougou_wx_main(Sogou_WX) sougou_wx_main(Sogou_WX)
result_sx_long = Src_sougou_wx(False) results = Src_sougou_wx()
result_sx_short = Src_sougou_wx(True) if results != False:
webhook_url, timestamp, sign = gen_sign() result_sx_long, result_sx_short = results
check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容", webhook_url, timestamp, sign) check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容")
else:
logger.info("微信公众号数据为空,跳过执行。")
def send_job_github(time_1): def send_job_github(time_1):
keyword_list, tool_list, user_list, black_words = load_github_config() keyword_list, tool_list, user_list, black_words = load_github_config()
github_main(keyword_list, tool_list, user_list, black_words) github_main(keyword_list, tool_list, user_list, black_words)
result_github_1_long, result_github_2_long, result_github_3_long, result_github_4_long = Src_github(time_1, False) results = Src_github(time_1)
result_github_1_short, result_github_2_short, result_github_3_short, result_github_4_short = Src_github(time_1, True)
webhook_url, timestamp, sign = gen_sign() # 解构返回的结果
check_avaliable(result_github_1_long, result_github_1_short, "Github项目监控-关键词监控", webhook_url, timestamp, sign) result_github_1_long, result_github_1_short = results[0]
check_avaliable(result_github_2_long, result_github_2_short, "Github项目监控-项目更新情况", webhook_url, timestamp, sign) result_github_2_long, result_github_2_short = results[1]
webhook_url, timestamp, sign = gen_sign() result_github_3_long, result_github_3_short = results[2]
check_avaliable(result_github_3_long, result_github_3_short, "Github项目监控-大佬工具", webhook_url, timestamp, sign) result_github_4_long, result_github_4_short = results[3]
check_avaliable(result_github_4_long, result_github_4_short, "Github项目监控-项目版本发布监测", webhook_url, timestamp, sign)
# 检查并处理结果
check_avaliable(result_github_1_long, result_github_1_short, "Github项目监控-关键词监控")
check_avaliable(result_github_2_long, result_github_2_short, "Github项目监控-项目更新情况")
check_avaliable(result_github_3_long, result_github_3_short, "Github项目监控-大佬工具")
check_avaliable(result_github_4_long, result_github_4_short, "Github项目监控-项目版本发布监测")
def send_job_baidu(): def send_job_baidu():
Baidu = get_kewords_config('Baidu') Baidu = get_keywords_config('Baidu')
baidu_main(Baidu) baidu_main(Baidu)
result_baidu_long = Src_baidu(False) results = Src_baidu()
result_baidu_short = Src_baidu(True) if results != False:
webhook_url, timestamp, sign = gen_sign() result_baidu_long, result_baidu_short = results
check_avaliable(result_baidu_long, result_baidu_short, "百度搜索关键词相关内容", webhook_url, timestamp, sign) check_avaliable(result_baidu_long, result_baidu_short, "百度搜索关键词相关内容")
else:
logger.info("百度搜索数据为空,跳过执行。")
# 探测rss源状态 # 探测rss源状态
def check_rss_status(url): def check_rss_status(url):
@ -243,11 +290,23 @@ def send_first_message():
if 0 in choice: if 0 in choice:
start_info += "RSS源监测\n" start_info += "RSS源监测\n"
if 1 in choice: if 1 in choice:
start_info += "搜狗-微信公众号监测\n" # start_info += "搜狗-微信公众号监测\n"
Sogou_WX = get_keywords_config('Sogou-WX')
start_info += f"微信公众号监测关键词:{Sogou_WX}\n"
if 2 in choice: if 2 in choice:
start_info += "Github项目监测\n" # start_info += "Github项目监测\n"
with open('./config/github_config.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file)
tool_list = config['tool_list']
start_info += f"Github监控项目{tool_list}\n"
keyword_list = config['keyword_list']
start_info += f"Github监控关键词{keyword_list}\n"
user_list = config['user_list']
start_info += f"Github监控用户{user_list}\n"
if 3 in choice: if 3 in choice:
start_info += "百度搜索关键词内容监测\n" # start_info += "百度搜索关键词内容监测\n"
Baidu = get_keywords_config('Baidu')
start_info += f"百度搜索关键词:{Baidu}\n"
if fs_activate == "True": if fs_activate == "True":
result = SendToFeishu(start_info, "程序信息", webhook_url_once, timestamp_once, sign_once) result = SendToFeishu(start_info, "程序信息", webhook_url_once, timestamp_once, sign_once)
@ -257,7 +316,7 @@ def send_first_message():
if wx_activate == "True": if wx_activate == "True":
result = SendToWX(start_info, "程序信息") result = SendToWX(start_info, "程序信息")
logger.info(result) logger.info(result)
send_result = SendToWX(f"[点此访问]({url_web})网站以查看全部文章", "首次运行提醒") send_result = SendToWX(f"[点此访问]({url_web})网站以查看全部文章,若未开启网站请忽略本条消息", "首次运行提醒")
logger.info(send_result) logger.info(send_result)
if 0 in choice: if 0 in choice:

View File

@ -0,0 +1,150 @@
# -*- coding: utf-8 -*-
"""
@Author: MasonLiu
@Description: 本程序可以爬取各安全资讯源并发送到飞书群组
"""
import schedule
import os
import signal
import sys
import time
import yaml
import requests
from datetime import datetime, timedelta
from SendCore.FeishuSendBot import SendToFeishu, gen_sign
from SendCore.QiweiSendBot import SendToWX
from spider.common import run, seebug_main, M_4hou_main, anquanke_main, sec_wiki_main, huawei_main, doonsec_main, qianxin_main
from spider.freebuf import freebuf_main
from spider.xianzhi import xianzhi_main
from spider.sougou_wx import sougou_wx_main
from spider.github import github_main, load_github_config
from spider.baidu import baidu_main
from GotoSend.M_4hou import Src_4hou
from GotoSend.anquanke import Src_anquanke
from GotoSend.doonsec import Src_doonsec
from GotoSend.xianzhi import Src_xianzhi
from GotoSend.freebuf import Src_freebuf
from GotoSend.qianxin import Src_qianxin
from GotoSend.seebug import Src_seebug
from GotoSend.sougou_wx import Src_sougou_wx
from GotoSend.github import Src_github
from GotoSend.baidu import Src_baidu
from config.check_config import get_core_config, get_debug_config, get_keywords_config
from loguru import logger
# 清除所有已有的日志记录器配置
logger.remove()
logger.add("./resources/log/core.log",
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
rotation="100 MB",
compression="zip",
encoding="utf-8")
# shell终端打印日志
debug = get_debug_config()
if debug == "True":
logger.add(lambda msg: print(msg),
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}")
def signal_handler(sig, frame):
logger.info("接收到退出信号,程序即将退出...")
sys.exit(0)
# 全局变量
signal.signal(signal.SIGINT, signal_handler) # Ctrl+C
signal.signal(signal.SIGTERM, signal_handler) # kill命令
webhook_url_once, timestamp_once, sign_once = gen_sign()
e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config()
def check_avaliable(info_long, info_short, title):
if info_short: # 发送精简文章相关内容
# 企业微信相关
if wx_activate == "True":
# logger.info(f"{title} 递送中(企业微信):")
print("正在发送精简文章内容...")
for info in info_short:
result = SendToWX(info, title)
print(result)
logger.info(result)
time.sleep(15)
else:
print("精简文章内容为空,跳过执行。")
pass
if info_long: # 发送完整文章相关内容
if fs_activate == "True":
# logger.info(f"{title} 递送中(飞书):")
webhook_url, timestamp, sign = gen_sign()
result = SendToFeishu(info_long, title, webhook_url, timestamp, sign)
logger.info(result)
time.sleep(15)
else:
pass
if not info_long and not info_short:
logger.info(f"{title}数据为空,跳过执行。")
def send_job_RSS(time_1):
Doonsec_switch, Doonsec = get_keywords_config('Doonsec')
results = Src_doonsec(Doonsec_switch, Doonsec)
if results != False:
result_doonsec_long, result_doonsec_short = results
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯")
def main_job(e_hour):
logger.info(f"发送程序启动,当前时间为:{datetime.now().strftime('%Y-%m-%d %H:%M:%S')}")
logger.info("正在启动各爬虫并获取资源中...")
if 0 in choice:
send_job_RSS(e_hour)
logger.info("单次运行结束,等待下一次运行...")
def main_loop(time_choice):
if time_choice == 1:
while True:
try:
# 执行任务
main_job(e_hour)
time.sleep(e_hour * 60 * 60 - 3 * 60)
except Exception as e:
logger.error(f"发生错误: {e}, 程序已暂停")
# result = SendToFeishu(f"发生错误: {e}, 程序已退出", "报错信息")
exit()
elif time_choice == 0:
# 设置每天的特定时间点执行job函数
schedule.every().day.at("09:00").do(main_job, 12)
schedule.every().day.at("12:00").do(main_job, 3)
schedule.every().day.at("15:00").do(main_job, 3)
schedule.every().day.at("18:00").do(main_job, 3)
schedule.every().day.at("21:00").do(main_job, 3)
while True:
schedule.run_pending()
time.sleep(60) # 每分钟检查一次是否有任务需要执行
if __name__ == "__main__":
logger.info("程序正在运行当中。")
results = Src_anquanke(4)
if results != False:
result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else:
# 如果为空,则跳过执行
print("-" * 40)
print("安全客数据为空,跳过执行。")
# main_loop(time_choice)

View File

@ -46,7 +46,11 @@ def get_4hou_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/4hou.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/4hou.json', 'r', encoding='utf-8') as file:
data = json.load(file) content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -107,28 +111,45 @@ def record_md(result, filename="./resources/history/sec_news.md"):
# 写回文件 # 写回文件
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[5]}\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[5]}\n"
result += f"上传时间:{entry[4]}\n" result_long += f"上传时间:{entry[4]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
result += f"文章:[{entry[1]}]({entry[2]})\n" # 构建短文本结果并进行分块处理
result += f"链接:{entry[2]}\n上传时间:{entry[4]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"链接:{entry[2]}\n上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[5]}\n" record += f"**作者**{entry[5]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_4hou(e_hour, Is_short): def Src_4hou(e_hour):
if not os.path.exists('./resources/db/4hou.db'): if not os.path.exists('./resources/db/4hou.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -147,17 +168,27 @@ def Src_4hou(e_hour, Is_short):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return "" return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_4hou(4, False) results = Src_4hou(4)
if reslts != "": if results != False:
print(reslts) result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)
print("嘶吼数据为空,跳过执行。") print("嘶吼数据为空,跳过执行。")

Binary file not shown.

View File

@ -35,11 +35,17 @@ def insert_data(data):
def get_anquanke_json(): def get_anquanke_json():
# 检查文件是否存在 # 检查文件是否存在
if not os.path.exists('./resources/JSON/anquanke.json'): if not os.path.exists('./resources/JSON/anquanke.json'):
raise FileNotFoundError(f"anquanke.json文件不存在请检查程序是否运行正常") data = []
# logger.error(f"anquanke.json文件不存在请检查爬虫程序是否运行正常")
# 打开并读取JSON文件 print(f"anquanke.json文件不存在请检查爬虫程序是否运行正常")
with open('./resources/JSON/anquanke.json', 'r', encoding='utf-8') as file: else:
data = json.load(file) # 打开并读取JSON文件
with open('./resources/JSON/anquanke.json', 'r', encoding='utf-8') as file:
content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -102,29 +108,46 @@ def record_md(result, filename="./resources/history/sec_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[6]}\n来源:{entry[3]}\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[6]}\n来源:{entry[3]}\n"
result += f"上传时间:{entry[5]}\n" result_long += f"上传时间:{entry[5]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
elif Is_short == True:
result += f"文章:{entry[1]}\n" # 构建短文本结果并进行分块处理
result += f"链接:{entry[2]}\n上传时间:{entry[5]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[6]}\n" record += f"**作者**{entry[6]}\n"
record += f"**来源**{entry[3]}\n" record += f"**来源**{entry[3]}\n"
record += f"**上传时间**{entry[5]}\n" record += f"**上传时间**{entry[5]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_anquanke(e_hour, Is_short): def Src_anquanke(e_hour):
if not os.path.exists('./resources/db/anquanke.db'): if not os.path.exists('./resources/db/anquanke.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -143,16 +166,27 @@ def Src_anquanke(e_hour, Is_short):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_anquanke(4, False) results = Src_anquanke(4)
if reslts != False: if results != False:
print(reslts) result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)
print("安全客数据为空,跳过执行。") print("安全客数据为空,跳过执行。")

View File

@ -48,11 +48,16 @@ def insert_data(data):
def get_json(): def get_json():
# 检查文件是否存在 # 检查文件是否存在
if not os.path.exists('./resources/JSON/baidu.json'): if not os.path.exists('./resources/JSON/baidu.json'):
raise FileNotFoundError("baidu.json文件不存在请检查程序是否运行正常") data = []
# logger.error("baidu.json文件不存在请检查程序是否运行正常")
# 打开并读取JSON文件 else:
with open('./resources/JSON/baidu.json', 'r', encoding='utf-8') as file: # 打开并读取JSON文件
data = json.load(file) with open('./resources/JSON/baidu.json', 'r', encoding='utf-8') as file:
content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个关键词的字典 # 假设data是一个包含多个关键词的字典
total_data = [] total_data = []
@ -137,30 +142,49 @@ def record_md(result, filename="./resources/history/baidu_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
result += f"发布时间:{entry[4]}\n" result_long += f"发布时间:{entry[4]}\n"
result += f"来源:{entry[5]}\n" result_long += f"来源:{entry[5]}\n"
result += f"关键词:{entry[6]}\n" result_long += f"关键词:{entry[6]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
result += f"文章:[{entry[1]}]({entry[2]})" # 构建短文本结果并进行分块处理
result += f"上传时间:{entry[4]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"关键词:{entry[6]}\n"
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += f"**来源**{entry[5]}\n" record += f"**来源**{entry[5]}\n"
record += f"**关键词**{entry[6]}\n" record += f"**关键词**{entry[6]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
record_md(record)
return result
def Src_baidu(Is_short): # 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record)
return result_long, short_results
def Src_baidu():
if not os.path.exists('./resources/db/baidu.db'): if not os.path.exists('./resources/db/baidu.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -179,16 +203,27 @@ def Src_baidu(Is_short):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_baidu(False) results = Src_baidu()
if reslts != False: if results != False:
print(reslts) result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)
print("微信公众号数据为空,跳过执行。") print("百度数据为空,跳过执行。")

View File

@ -53,7 +53,12 @@ def get_doonsec_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/doonsec.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/doonsec.json', 'r', encoding='utf-8') as file:
data = json.load(file) content = file.read()
if not content:
pass
else:
# print(content)
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -147,31 +152,49 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n"
result += f"作者:{entry[5]}\n" result_long += f"作者:{entry[5]}\n"
result += f"上传时间:{entry[4]}\n" result_long += f"上传时间:{entry[4]}\n"
result += f"简介:{entry[3]}\n" result_long += f"简介:{entry[3]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
result += f"文章:[{entry[1]}]({entry[2]})\n" # 构建短文本结果并进行分块处理
result += f"上传时间:{entry[4]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[5]}\n" record += f"**作者**{entry[5]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += f"**简介**{entry[3]}\n" record += f"**简介**{entry[3]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_doonsec(Is_short, Doonsec_switch, Doonsec): def Src_doonsec(Doonsec_switch, Doonsec):
if not os.path.exists('./resources/db/doonsec.db'): if not os.path.exists('./resources/db/doonsec.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -180,25 +203,36 @@ def Src_doonsec(Is_short, Doonsec_switch, Doonsec):
# clear_table() # clear_table()
# 获取 JSON 数据 # 获取 JSON 数据
M_doonsec_data = get_doonsec_json() doonsec_data = get_doonsec_json()
# 插入数据到数据库 # 插入数据到数据库
insert_data(M_doonsec_data) insert_data(doonsec_data)
# 查询指定时间段内的数据 # 查询指定时间段内的数据
filtered_articles = select_articles(Doonsec_switch, Doonsec) filtered_articles = select_articles(Doonsec_switch, Doonsec)
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_doonsec(False, False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"] ) results = Src_doonsec(False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"])
if reslts != False: if results != False:
print(reslts) result_long, short_results = results
# 写入长文本结果
with open("./1.txt", "a", encoding="utf-8") as f:
f.write(result_long)
f.write("\n" + "-" * 40 + "\n")
# 写入分块的短文本结果
for short_result in short_results:
with open("./2.txt", "a", encoding="utf-8") as f:
f.write(short_result)
f.write("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

@ -46,7 +46,11 @@ def get_freebuf_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/freebuf.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/freebuf.json', 'r', encoding='utf-8') as file:
data = json.load(file) content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -108,28 +112,45 @@ def record_md(result, filename="./resources/history/sec_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[5]}\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[5]}\n"
result += f"上传时间:{entry[4]}\n" result_long += f"上传时间:{entry[4]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
elif Is_short == True:
result += f"文章:[{entry[1]}]({entry[2]})\n" # 构建短文本结果并进行分块处理
result += f"上传时间:{entry[4]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**类型**{entry[5]}\n" record += f"**类型**{entry[5]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_freebuf(e_hour, Is_short): def Src_freebuf(e_hour):
if not os.path.exists('./resources/db/freebuf.db'): if not os.path.exists('./resources/db/freebuf.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -148,15 +169,26 @@ def Src_freebuf(e_hour, Is_short):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_freebuf(4, False) results = Src_freebuf(24)
if reslts != False: if results != False:
print(reslts) result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

@ -62,28 +62,44 @@ def insert_data():
if not os.path.exists('./resources/JSON/github_keyword.json'): if not os.path.exists('./resources/JSON/github_keyword.json'):
raise FileNotFoundError(f"github_keyword文件不存在请检查程序是否运行正常") raise FileNotFoundError(f"github_keyword文件不存在请检查程序是否运行正常")
with open('./resources/JSON/github_keyword.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/github_keyword.json', 'r', encoding='utf-8') as file:
data_keyword = json.load(file) content = file.read()
if not content:
pass
else:
data_keyword = json.loads(content)
if not isinstance(data_keyword, list): if not isinstance(data_keyword, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
if not os.path.exists('./resources/JSON/github_repo.json'): if not os.path.exists('./resources/JSON/github_repo.json'):
raise FileNotFoundError(f"github_repo文件不存在请检查程序是否运行正常") raise FileNotFoundError(f"github_repo文件不存在请检查程序是否运行正常")
with open('./resources/JSON/github_repo.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/github_repo.json', 'r', encoding='utf-8') as file:
data_repo = json.load(file) content = file.read()
if not content:
pass
else:
data_repo = json.loads(content)
if not isinstance(data_repo, list): if not isinstance(data_repo, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
if not os.path.exists('./resources/JSON/github_release.json'): if not os.path.exists('./resources/JSON/github_release.json'):
raise FileNotFoundError(f"github_release文件不存在请检查程序是否运行正常") raise FileNotFoundError(f"github_release文件不存在请检查程序是否运行正常")
with open('./resources/JSON/github_release.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/github_release.json', 'r', encoding='utf-8') as file:
data_release = json.load(file) content = file.read()
if not content:
pass
else:
data_release = json.loads(content)
if not isinstance(data_release, list): if not isinstance(data_release, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
if not os.path.exists('./resources/JSON/github_user.json'): if not os.path.exists('./resources/JSON/github_user.json'):
raise FileNotFoundError(f"github_user文件不存在请检查程序是否运行正常") raise FileNotFoundError(f"github_user文件不存在请检查程序是否运行正常")
with open('./resources/JSON/github_user.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/github_user.json', 'r', encoding='utf-8') as file:
data_user = json.load(file) content = file.read()
if not content:
pass
else:
data_user = json.loads(content)
if not isinstance(data_user, list): if not isinstance(data_user, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
@ -297,59 +313,81 @@ def record_md(result, filename="./resources/history/github.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short, choice): def get_filtered_articles(entries, choice):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: if choice == 1:
if choice == 1: # 构建长文本结果
result += f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n" result_long += f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
result += f"项目描述:{entry[3]}\n" result_long += f"项目描述:{entry[3]}\n"
result += f"上传时间:{entry[4]}\n" result_long += f"上传时间:{entry[4]}\n"
result += f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n" result_long += f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n"
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
elif choice == 2:
result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n" # 构建短文本结果并进行分块处理
result += f"更新描述:{entry[3]}\n" current_entry = (
result += f"更新时间:{entry[4]}\n" f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
result += f"提交者:{entry[5]}[点此查看提交详情]({entry[7]})\n" f"上传时间:{entry[4]}\n"
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n"
elif choice == 3: "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n" )
result += f"项目描述:{entry[3]}\n" elif choice == 2:
result += f"上传时间:{entry[4]}\n" # 构建长文本结果
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 result_long += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
elif choice == 4: result_long += f"更新描述:{entry[3]}\n"
result += f"{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n" result_long += f"更新时间:{entry[4]}\n"
result += f"发布时间:{entry[2]}\n" result_long += f"提交者:{entry[5]}[点此查看提交详情]({entry[7]})\n"
result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
elif Is_short == True:
if choice == 1: # 构建短文本结果并进行分块处理
result += f"关键词【{entry[7]}】发现新项目:[{entry[1]}]({entry[2]})\n" current_entry = (
result += f"上传时间:{entry[4]}\n" f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
result += f"开发语言:{entry[6]}\t\t作者:{entry[5]}\n" f"更新时间:{entry[4]}\n"
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"提交者:{entry[5]}[点此查看提交详情]({entry[7]})\n"
elif choice == 2: "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n" )
result += f"更新描述:{entry[3]}\n" elif choice == 3:
result += f"更新时间:{entry[4]}\n" # 构建长文本结果
result += f"提交者:{entry[5]}[点此查看提交详情]({entry[7]})\n" result_long += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 result_long += f"项目描述:{entry[3]}\n"
elif choice == 3: result_long += f"上传时间:{entry[4]}\n"
result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n" result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
result += f"项目描述:{entry[3]}\n"
result += f"上传时间:{entry[4]}\n" # 构建短文本结果并进行分块处理
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 current_entry = (
elif choice == 4: f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
result += f"{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n" f"上传时间:{entry[4]}\n"
result += f"发布时间:{entry[2]}\n" "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 )
elif choice == 4:
# 构建长文本结果
result_long += f"{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n"
result_long += f"发布时间:{entry[2]}\n"
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
# 构建短文本结果并进行分块处理
current_entry = (
f"{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n"
f"发布时间:{entry[2]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
if choice == 1: if choice == 1:
record += f"#### 关键词【{entry[7]}】发现新项目:[{entry[1]}]({entry[2]})\n" record += f"#### 关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
record += f"**项目描述**{entry[3]}\n" record += f"**项目描述**{entry[3]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += f"**开发语言**{entry[6]}\n**作者**{entry[5]}\n" record += f"**开发语言**{entry[7]}\n**作者**{entry[5]}\n"
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
elif choice == 2: elif choice == 2:
record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n" record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
@ -367,11 +405,15 @@ def get_filtered_articles(entries, Is_short, choice):
record += f"**发布时间**{entry[2]}\n" record += f"**发布时间**{entry[2]}\n"
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_github(e_hour, Is_short): def Src_github(e_hour):
if not os.path.exists('./resources/db/github.db'): if not os.path.exists('./resources/db/github.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -385,35 +427,48 @@ def Src_github(e_hour, Is_short):
# 查询指定时间段内的数据 # 查询指定时间段内的数据
keyword_data, repo_data, user_data, release_data = select_articles(e_hour) keyword_data, repo_data, user_data, release_data = select_articles(e_hour)
results = []
if keyword_data: if keyword_data:
result_1 = get_filtered_articles(keyword_data, Is_short, 1) result_long_1, short_results_1 = get_filtered_articles(keyword_data, 1)
results.append((result_long_1, short_results_1))
else: else:
result_1 = "" results.append(("", []))
if repo_data: if repo_data:
result_2 = get_filtered_articles(repo_data, Is_short, 2) result_long_2, short_results_2 = get_filtered_articles(repo_data, 2)
results.append((result_long_2, short_results_2))
else: else:
result_2 = "" results.append(("", []))
if user_data: if user_data:
result_3 = get_filtered_articles(user_data, Is_short, 3) result_long_3, short_results_3 = get_filtered_articles(user_data, 3)
results.append((result_long_3, short_results_3))
else: else:
result_3 = "" results.append(("", []))
if release_data: if release_data:
result_4 = get_filtered_articles(release_data, Is_short, 4) result_long_4, short_results_4 = get_filtered_articles(release_data, 4)
results.append((result_long_4, short_results_4))
else: else:
result_4 = "" results.append(("", []))
return result_1, result_2, result_3, result_4
return results
if __name__ == "__main__": if __name__ == "__main__":
result_1, result_2, result_3, result_4 = Src_github(240, False) results = Src_github(240)
if result_1 != "": for i, (result_long, short_results) in enumerate(results, start=1):
print(result_1) if result_long != "":
if result_2 != "": print(f"长文本结果 {i}")
print(result_2) print(result_long)
if result_3 != "": print("\n" + "-" * 10 + "\n")
print(result_3)
if result_4 != "": if short_results:
print(result_4) print(f"分块的短文本结果 {i}")
if result_1 == "" and result_2 == "" and result_3 == "" and result_4 == "": for short_result in short_results:
print(short_result)
print("\n" + "-" * 10 + "\n")
if all(result_long == "" and not short_results for result_long, short_results in results):
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 10) print("-" * 10)
print("github数据为空跳过执行。") print("github数据为空跳过执行。")

View File

@ -37,7 +37,11 @@ def get_qianxin_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/qianxin.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/qianxin.json', 'r', encoding='utf-8') as file:
data = json.load(file) content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -99,30 +103,47 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n来源:{entry[3]}\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n来源:{entry[3]}\n"
result += f"上传时间:{entry[5]}\n" result_long += f"上传时间:{entry[5]}\n"
result += f"描述:{entry[4]}\n" result_long += f"描述:{entry[4]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
result += f"文章:[{entry[1]}]({entry[2]})\n" # 构建短文本结果并进行分块处理
result += f"上传时间:{entry[5]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**来源**{entry[3]}\n" record += f"**来源**{entry[3]}\n"
record += f"**上传时间**{entry[5]}\n" record += f"**上传时间**{entry[5]}\n"
record += f"**描述**{entry[4]}\n" record += f"**描述**{entry[4]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_qianxin(e_hour, Is_short): def Src_qianxin(e_hour):
if not os.path.exists('./resources/db/qianxin.db'): if not os.path.exists('./resources/db/qianxin.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -141,16 +162,27 @@ def Src_qianxin(e_hour, Is_short):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_qianxin(4, False) results = Src_qianxin(4)
if reslts != False: if results != False:
print(reslts) result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)
print("奇安信攻防社区数据为空,跳过执行。") print("奇安信攻防社区数据为空,跳过执行。")

View File

@ -44,7 +44,11 @@ def get_seebug_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/seebug.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/seebug.json', 'r', encoding='utf-8') as file:
data = json.load(file) content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -106,30 +110,47 @@ def record_md(result, filename="./resources/history/sec_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[3]}\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[3]}\n"
result += f"上传时间:{entry[5]}\n" result_long += f"上传时间:{entry[5]}\n"
result += f"{entry[4]}\n" result_long += f"{entry[4]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
result += f"文章:[{entry[1]}]({entry[2]})" # 构建短文本结果并进行分块处理
result += f"上传时间:{entry[5]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**类型**{entry[3]}\n" record += f"**类型**{entry[3]}\n"
record += f"**上传时间**{entry[5]}\n" record += f"**上传时间**{entry[5]}\n"
record += f"{entry[4]}\n" record += f"{entry[4]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_seebug(e_hour, Is_short): def Src_seebug(e_hour):
if not os.path.exists('./resources/db/seebug.db'): if not os.path.exists('./resources/db/seebug.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -148,16 +169,27 @@ def Src_seebug(e_hour, Is_short):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_seebug(100, False) results = Src_seebug(100)
if reslts != False: if results != False:
print(reslts) result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)
print("Seebug社区数据为空跳过执行。") print("Seebug社区数据为空跳过执行。")

View File

@ -52,7 +52,11 @@ def get_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/sougou-wx.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/sougou-wx.json', 'r', encoding='utf-8') as file:
data = json.load(file) content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个关键词的字典 # 假设data是一个包含多个关键词的字典
total_data = [] total_data = []
@ -139,30 +143,49 @@ def record_md(result, filename="./resources/history/wx_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
result += f"上传时间:{entry[4]}\n" result_long += f"上传时间:{entry[4]}\n"
result += f"作者:{entry[5]}\n" result_long += f"作者:{entry[5]}\n"
result += f"关键词:{entry[6]}\n" result_long += f"关键词:{entry[6]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
result += f"文章:[{entry[1]}]({entry[2]})" # 构建短文本结果并进行分块处理
result += f"上传时间:{entry[4]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"关键词:{entry[6]}\n"
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += f"**作者**{entry[5]}\n" record += f"**作者**{entry[5]}\n"
record += f"**关键词**{entry[6]}\n" record += f"**关键词**{entry[6]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
record_md(record)
return result
def Src_sougou_wx(Is_short): # 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record)
return result_long, short_results
def Src_sougou_wx():
if not os.path.exists('./resources/db/sougou-wx.db'): if not os.path.exists('./resources/db/sougou-wx.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -181,15 +204,26 @@ def Src_sougou_wx(Is_short):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_sougou_wx(False) results = Src_sougou_wx()
if reslts != False: if results != False:
print(reslts) result_long, short_results = results
# 写入长文本结果
with open("./1.txt", "a", encoding="utf-8") as f:
f.write(result_long)
f.write("\n" + "-" * 40 + "\n")
# 写入分块的短文本结果
for short_result in short_results:
with open("./2.txt", "a", encoding="utf-8") as f:
f.write(short_result)
f.write("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

233
GotoSend/uni_rss.py Normal file
View File

@ -0,0 +1,233 @@
# -*- coding: utf-8 -*-
import json
import sqlite3
import os
from datetime import datetime, timedelta
def create_database():
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
cursor.execute('''CREATE TABLE IF NOT EXISTS articles (
id INTEGER PRIMARY KEY AUTOINCREMENT,
title TEXT,
link TEXT,
author TEXT,
description TEXT,
pubDate DATETIME,
source TEXT,
is_sended BOOLEAN
)''')
conn.commit()
conn.close()
def insert_data(data):
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
for entry in data:
cursor.execute('''
SELECT 1 FROM articles WHERE title = ? AND author = ?
''', (entry['title'], entry['author']))
if cursor.fetchone() is None:
cursor.execute('''
INSERT INTO articles (title, link, author, description, pubDate, source)
VALUES (?, ?, ?, ?, ?, ?)
''', (entry['title'], entry['link'], entry['author'], entry['description'], entry['published'], entry['source']))
conn.commit()
conn.close()
def get_uni_rss_json():
# 检查文件是否存在
if not os.path.exists('./resources/JSON/uni_rss.json'):
raise FileNotFoundError(f"uni_rss.json文件不存在请检查程序是否运行正常")
# 打开并读取JSON文件
with open('./resources/JSON/uni_rss.json', 'r', encoding='utf-8') as file:
content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list):
raise ValueError("JSON文件格式错误请检查common.py是否异常")
# 提取所需字段并编号
total_data = []
for index, item in enumerate(data, start=1):
entry = {
"id": index,
"title": item.get("title", ""),
"link": item.get("link", ""),
"author": item.get("author", ""),
"description": item.get("description", ""),
"published": item.get("published", ""),
"source": item.get("source", ""),
}
total_data.append(entry)
return total_data
def select_articles(uni_rss_switch, Unity):
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
# 获取当前日期和时间
now = datetime.now()
two_days_ago = now - timedelta(days=2)
if uni_rss_switch == False:
# 查询指定时间段内的数据
cursor.execute('''
SELECT * FROM articles
WHERE is_sended IS NULL AND pubDate BETWEEN ? AND ?
ORDER BY pubDate DESC
''', (two_days_ago.strftime('%Y-%m-%d %H:%M:%S'), now.strftime('%Y-%m-%d %H:%M:%S')))
elif uni_rss_switch == True:
# 查询指定时间段内且title包含特定关键词的数据
like_conditions = ' OR '.join([f"title LIKE ?"] * len(Unity))
# 完整的查询语句
query = f'''
SELECT * FROM articles
WHERE is_sended IS NULL AND pubDate BETWEEN ? AND ?
AND ({like_conditions})
ORDER BY pubDate DESC
'''
# 构建参数列表
params = [
two_days_ago.strftime('%Y-%m-%d %H:%M:%S'),
now.strftime('%Y-%m-%d %H:%M:%S')
] + [f'%{keyword}%' for keyword in Unity]
# 执行查询
cursor.execute(query, params)
results = cursor.fetchall()
if results:
for row in results:
user_id = row[0]
cursor.execute('''
UPDATE articles
SET is_sended = True
WHERE id = ?
''', (user_id,))
conn.commit() # 提交事务
conn.close()
return results
def clear_table():
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
cursor.execute('DELETE FROM articles')
conn.commit()
conn.close()
def record_md(result, filename="./resources/history/uni_passage.md"):
# 读取现有内容
if os.path.exists(filename):
with open(filename, 'r', encoding='utf-8') as file:
existing_content = file.read()
else:
existing_content = ""
# 将新内容插入到现有内容的开头
new_content = result + existing_content
# 写回文件
with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content)
def get_filtered_articles(entries):
result_long = ""
result_short = ""
record = ""
short_results = []
for entry in entries:
# 构建长文本结果
result_long += f"文章:[{entry[1]}]({entry[2]})\n"
result_long += f"作者:{entry[3]}\n"
result_long += f"描述:{entry[4]}\n"
result_long += f"上传时间:{entry[5]}\n"
result_long += f"来源:{entry[6]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 构建短文本结果并进行分块处理
current_entry = (
f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[3]}\n"
record += f"**描述**{entry[4]}\n"
record += f"**上传时间**{entry[5]}\n"
record += f"**来源**{entry[6]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record)
return result_long, short_results
def Src_uni_rss(uni_rss_switch, Unity):
if not os.path.exists('./resources/db/uni_rss.db'):
# 创建数据库和表
create_database()
# 清空表
# clear_table()
# 获取 JSON 数据
uni_rss_data = get_uni_rss_json()
# 插入数据到数据库
insert_data(uni_rss_data)
# 查询指定时间段内的数据
filtered_articles = select_articles(uni_rss_switch, Unity)
# print(filtered_articles)
if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles)
return result_long, short_results
else:
return False
if __name__ == "__main__":
results = Src_uni_rss(False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"])
if results:
result_long, short_results = results
# 写入长文本结果
with open("./1.txt", "a", encoding="utf-8") as f:
f.write(result_long)
f.write("\n" + "-" * 40 + "\n")
# 写入分块的短文本结果
for short_result in short_results:
with open("./2.txt", "a", encoding="utf-8") as f:
f.write(short_result)
f.write("\n" + "-" * 40 + "\n")
else:
# 如果为空,则跳过执行
print("-" * 40)
print("聚合RSS数据为空跳过执行。")

View File

@ -45,7 +45,11 @@ def get_xianzhi_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/xianzhi.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/xianzhi.json', 'r', encoding='utf-8') as file:
data = json.load(file) content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -105,27 +109,44 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, Is_short): def get_filtered_articles(entries):
result = "" result_long = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False: # 构建长文本结果
result += f"文章:[{entry[1]}]({entry[2]})\n" result_long += f"文章:[{entry[1]}]({entry[2]})\n"
result += f"上传时间:{entry[3]}\n" result_long += f"上传时间:{entry[3]}\n"
result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == False:
result += f"文章:[{entry[1]}]({entry[2]})\n" # 构建短文本结果并进行分块处理
result += f"上传时间:{entry[3]}\n" current_entry = (
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[3]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**上传时间**{entry[3]}\n" record += f"**上传时间**{entry[3]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_xianzhi(e_hour, Is_short): def Src_xianzhi(e_hour):
if not os.path.exists('./resources/db/xianzhi.db'): if not os.path.exists('./resources/db/xianzhi.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -144,16 +165,27 @@ def Src_xianzhi(e_hour, Is_short):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
results = get_filtered_articles(filtered_articles, Is_short) result_long, short_results = get_filtered_articles(filtered_articles)
return results return result_long, short_results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
reslts = Src_xianzhi(4, False) results = Src_xianzhi(124)
if reslts != False: if results != False:
print(reslts) result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)
print("先知社区数据为空,跳过执行。") print("先知社区数据为空,跳过执行。")

0
SendCore/DocGeneBot.py Normal file
View File

View File

@ -2,14 +2,13 @@
- 准点发送的文章在定点推送模式下可能会被遗漏推送 - 准点发送的文章在定点推送模式下可能会被遗漏推送
`已通过增加时间范围功能改善此问题,彻底解决需要重构代码` `已通过增加时间范围功能改善此问题,彻底解决需要重构代码`
- 钉钉/企业微信/蓝信webhook存在字节长度限制需要优化程序推送逻辑 - 钉钉/企业微信/蓝信webhook存在字节长度限制需要优化程序推送逻辑
`尽力改善中,彻底解决需重构代码` `重构了短文本推送机制已解决此bug`
- 首次运行时若抓取RSS源失败筛选模块无法获取json文件时会导致中断 - 首次运行时若抓取RSS源失败筛选模块无法获取json文件时会导致中断
`为项目添加一个初始json文件` `为项目添加一个初始json文件`
- 程序运行会产生越来越巨大的DB文件与Markdown文件同时web网页显示的内容也会非常长不利于节省服务器流量与加载速度 - 程序运行会产生越来越巨大的DB文件与Markdown文件同时web网页显示的内容也会非常长不利于节省服务器流量与加载速度
`为系统添加性能限制模块` `为系统添加性能限制模块`
### 下一步计划(待完成) ### 下一步计划(待完成)
- 添加更多RSS订阅源持续进行中
- 添加更多推送方式,如邮件、微信等 - 添加更多推送方式,如邮件、微信等
- 添加谷歌搜索等更多相关检测源,后续将支持谷歌语法 - 添加谷歌搜索等更多相关检测源,后续将支持谷歌语法
@ -47,4 +46,8 @@
- 2025年01月10日上午修复了github推送的问题时区消息配置错误等 - 2025年01月10日上午修复了github推送的问题时区消息配置错误等
- 2025年01月10日下午上线了百度搜索内容监测 - 2025年01月10日下午上线了百度搜索内容监测
- 2025年01月14日晚添加了网站读取文件逻辑仅读取限制数量的文件避免文件过大导致程序崩溃或是阅读困难 - 2025年01月14日晚添加了网站读取文件逻辑仅读取限制数量的文件避免文件过大导致程序崩溃或是阅读困难
- 2025年01月15日早优化并精简了web程序的代码 - 2025年01月15日早优化并精简了web程序的代码
- 2025年01月22日完善短文本推送机制现已可完美支持推送至企业微信、钉钉、蓝信、微信等等待后续开发
- 2025年01月24日早修复了json文件为空时程序中断的问题并优化了报错逻辑
- 2025年03月10日早为程序添加了通用rss接口可支持更多rss源
- 2025年03月14日晚为程序添加了通用rss发送程序同时修复了一个神奇的bug现可支持更多rss源

View File

@ -66,7 +66,7 @@ def get_debug_config():
return debug return debug
def get_kewords_config(item): def get_keywords_config(item):
with open('./config/keywords.yaml', 'r', encoding="utf-8") as file: with open('./config/keywords.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file) config = yaml.safe_load(file)
if item == 'Doonsec': if item == 'Doonsec':
@ -79,6 +79,10 @@ def get_kewords_config(item):
elif item == 'Baidu': elif item == 'Baidu':
Baidu = config['Baidu'] Baidu = config['Baidu']
return Baidu return Baidu
elif item == 'Unity':
uni_switch = config.get('uni-switch', False)
Unity = config['Unity']
return uni_switch, Unity
else: else:
logger.error("参数错误,请检查./config/keywords.yaml") logger.error("参数错误,请检查./config/keywords.yaml")

View File

@ -6,7 +6,7 @@ fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥,记得冒号后
# 企业微信相关配置信息 # 企业微信相关配置信息
wx_activate: False wx_activate: False
wx_key: # 此处填写token记得冒号后空一格如9a3dd6ff-75d6-4208-bc4b-77724a5805d6 wx_key: 9a3dd6ff-75d6-4208-bc4b-77724a5805d6 # 此处填写token记得冒号后空一格如9a3dd6ff-75d6-4208-bc4b-77724a5805d6
# 钉钉相关配置信息 # 钉钉相关配置信息
ding_activate: False ding_activate: False
@ -27,7 +27,7 @@ e_hour: 4 # 程序运行时间间隔
time_mode: 1 time_mode: 1
# 0定时运行模式仅在指定时间运行参照Core.py中设置 # 0定时运行模式仅在指定时间运行参照Core.py中设置
# 1启用循环一定间隔时间后运行 # 1启用循环一定间隔时间后运行
mode: [1, 2] # 运行模式,可多选 mode: [1, 2, 3] # 运行模式,可多选
# 0启用RSS抓取模式 # 0启用RSS抓取模式
# 1启用搜狗-微信公众号文章监测 # 1启用搜狗-微信公众号文章监测
# 2启用github项目监测 # 2启用github项目监测
@ -37,4 +37,4 @@ mode: [1, 2] # 运行模式,可多选
url: https://info.masonliu.com/ # 请设置为您自己反代的域名,或者改为 http://127.0.0.1:5000 或者对应IP域名 url: https://info.masonliu.com/ # 请设置为您自己反代的域名,或者改为 http://127.0.0.1:5000 或者对应IP域名
# 调试模式 # 调试模式
debug: False debug: True

View File

@ -5,45 +5,14 @@ translate: False # 是否开启翻译
# 监控列表 # 监控列表
tool_list: # 监控已创建的仓库是否更新 tool_list: # 监控已创建的仓库是否更新
- BeichenDream/Godzilla - BeichenDream/Godzilla
- rebeyond/Behinder
- AntSwordProject/antSword
- j1anFen/shiro_attack
- yhy0/github-cve-monitor
- gentilkiwi/mimikatz
- ehang-io/nps
- chaitin/xray
- FunnyWolf/pystinger
- L-codes/Neo-reGeorg
- shadow1ng/fscan
- SafeGroceryStore/MDUT
- EdgeSecurityTeam/Vulnerability
- Vme18000yuan/FreePOC
- wy876/POC - wy876/POC
keyword_list: # 监控关键词 keyword_list: # 监控关键词
- sql注入 - sql注入
- cnvd - cnvd
- 未授权
- 漏洞POC
- RCE
- 渗透测试
- 反序列化
- 攻防
- webshell
- 红队
- redteam
- 信息收集
- 绕过
- bypass av
user_list: # 监控用户 user_list: # 监控用户
- su18
- BeichenDream
- phith0n
- zhzyker
- lijiejie
- projectdiscovery
- HavocFramework
black_words: # 监控违禁词 black_words: # 监控违禁词
- 反共 - 反共

View File

@ -1,4 +1,6 @@
Sogou-WX: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于搜狗引擎搜索特定关键词的微信公众号文章
Doonsec-switch: False Doonsec-switch: False
Doonsec: ["逆向", "解包", "POC"] # 洞见微信安全资讯关键词 Doonsec: ["逆向", "解包", "POC"] # 洞见微信安全资讯关键词
Baidu: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于百度搜索特定关键词的文章 uni-switch: False
Unity: ["逆向", "解包", "POC", "漏洞"] # 聚合RSS资讯关键词
Sogou-WX: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于搜狗引擎搜索特定关键词的微信公众号文章
Baidu: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于百度搜索特定关键词的文章

8
config/uni_rss.yaml Normal file
View File

@ -0,0 +1,8 @@
link:
- 美团技术团队|https://tech.meituan.com/feed
- 360 Netlab Blog|https://blog.netlab.360.com/rss
- 知道创宇404实验室|https://paper.seebug.org/rss
- 腾讯安全响应中心|https://security.tencent.com/index.php/feed/blog
wechat:
- 美团技术团队|https://wechat2rss.xlab.app/feed/294bc034c9941529cd86a8a4b8999d100186c04d.xml

View File

@ -5,4 +5,6 @@ schedule
requests requests
python-dateutil python-dateutil
loguru loguru
beautifulsoup4 beautifulsoup4
feedparser

File diff suppressed because one or more lines are too long

View File

@ -1,162 +1,162 @@
[ [
{ {
"guid": "https://www.anquanke.com/post/id/303291", "guid": "https://www.anquanke.com/post/id/305052",
"title": "2024年度十大网络安全热点事件盘点时代暗涌下的安全危机", "title": "腾达 AC7 路由器漏洞:攻击者可借助恶意有效载荷获取 Root Shell 权限",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "微信", "source": "cybersecuritynews",
"pubDate": "2025-01-06 11:00:15" "pubDate": "2025-03-14 11:32:33"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/303282", "guid": "https://www.anquanke.com/post/id/305049",
"title": "关键截止日期: 在 2025 年 1 月 7 日之前更新旧 .NET 域名以避免服务中断", "title": "GitLab警告多个高危漏洞或致使攻击者可冒充有效用户登录",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-14 11:24:45"
},
{
"guid": "https://www.anquanke.com/post/id/305045",
"title": "Siemens SINAMICS S200 陷安全危机,引导加载程序漏洞引攻击者觊觎",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-14 11:18:08"
},
{
"guid": "https://www.anquanke.com/post/id/305043",
"title": "微软警示ClickFix 通过虚假 Booking. com 邮件,对酒店业展开网络钓鱼行动",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "TheHackersNews", "source": "TheHackersNews",
"pubDate": "2025-01-06 10:52:56" "pubDate": "2025-03-14 11:05:39"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/303279", "guid": "https://www.anquanke.com/post/id/305041",
"title": "项目隔离: PyPI 抵御恶意软件的新防线", "title": "黑客滥用Microsoft Copilot进行复杂的网络钓鱼攻击",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "securityonline", "source": "cybersecuritynews",
"pubDate": "2025-01-06 10:48:40" "pubDate": "2025-03-14 10:54:30"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/303275", "guid": "https://www.anquanke.com/post/id/305038",
"title": "CVE-2024-12912 & CVE-2024-13062 华硕路由器面临风险", "title": "勒索软件攻击达到历史新高2025年2月攻击数量激增126%",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:37:22"
},
{
"guid": "https://www.anquanke.com/post/id/303270",
"title": "35+ 款 Chrome 浏览器扩展程序遭入侵250 万用户面临风险",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:21:36"
},
{
"guid": "https://www.anquanke.com/post/id/303267",
"title": "通过恶意 npm 软件包对以太坊开发人员进行供应链攻击",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:11:35"
},
{
"guid": "https://www.anquanke.com/post/id/303288",
"title": "每分钟就有 4,080 份记录在数据泄露事件中受损",
"author": " 安全客",
"description": null,
"source": "helpnetsecurity",
"pubDate": "2025-01-06 10:09:03"
},
{
"guid": "https://www.anquanke.com/post/id/303264",
"title": "SysBumps在 macOS 上打破 Apple Silicon 的内核地址空间布局随机化",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 10:02:40"
},
{
"guid": "https://www.anquanke.com/post/id/303285",
"title": "现代 CISO 是组织成功的基石",
"author": " 安全客",
"description": null,
"source": "helpnetsecurity",
"pubDate": "2025-01-06 10:01:09"
},
{
"guid": "https://www.anquanke.com/post/id/303259",
"title": "CVE-2025-22275 (CVSS 9.3)iTerm2 修补了暴露用户输入和输出的重大安全漏洞",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-06 09:55:57"
},
{
"guid": "https://www.anquanke.com/post/id/303256",
"title": "黑客针对Google Chrome的数十个VPN和AI扩展以泄露数据",
"author": " 安全客",
"description": null,
"source": "therecord",
"pubDate": "2025-01-06 09:51:53"
},
{
"guid": "https://www.anquanke.com/post/id/303249",
"title": "2025年数字安全十大趋势预测挑战、机遇、变革与战略布局",
"author": " 安全客",
"description": null,
"source": "微信",
"pubDate": "2025-01-03 11:28:51"
},
{
"guid": "https://www.anquanke.com/post/id/303246",
"title": "已打补丁但仍有漏洞 Windows BitLocker 加密再次被绕过",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-03 11:21:09"
},
{
"guid": "https://www.anquanke.com/post/id/303243",
"title": "CVE-2024-21182 针对严重 WebLogic 漏洞发布 PoC 漏洞利用代码",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-03 11:15:29"
},
{
"guid": "https://www.anquanke.com/post/id/303240",
"title": "日本最大移动运营商称网络攻击中断了部分服务",
"author": " 安全客",
"description": null,
"source": "therecord",
"pubDate": "2025-01-03 11:02:09"
},
{
"guid": "https://www.anquanke.com/post/id/303236",
"title": "新的 DoubleClickjacking 攻击利用双击来劫持帐户",
"author": " 安全客",
"description": null,
"source": "bleepingcomputer",
"pubDate": "2025-01-03 10:53:02"
},
{
"guid": "https://www.anquanke.com/post/id/303233",
"title": "揭开虚假人气的面纱: 研究揭露 GitHub 上的 450 万颗假星",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-03 10:41:42"
},
{
"guid": "https://www.anquanke.com/post/id/303230",
"title": "苹果公司将支付 9500 万美元解决 Siri 隐私诉讼",
"author": " 安全客",
"description": null,
"source": "therecord",
"pubDate": "2025-01-03 10:29:54"
},
{
"guid": "https://www.anquanke.com/post/id/303227",
"title": "跨域攻击: 现代安全面临的日益严重的威胁以及如何应对这些威胁",
"author": " 安全客",
"description": null,
"source": "TheHackersNews",
"pubDate": "2025-01-03 10:21:30"
},
{
"guid": "https://www.anquanke.com/post/id/303224",
"title": "假冒 7-Zip 漏洞代码源于人工智能生成的误解",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "hackread", "source": "hackread",
"pubDate": "2025-01-03 10:12:25" "pubDate": "2025-03-14 10:36:04"
},
{
"guid": "https://www.anquanke.com/post/id/305035",
"title": "Medusa 勒索软件威胁:企业面临的持续挑战",
"author": " 安全客",
"description": null,
"source": "securitybrief",
"pubDate": "2025-03-14 10:23:46"
},
{
"guid": "https://www.anquanke.com/post/id/305026",
"title": "360预警银狐木马又双叒变异PDF文件成传播“帮凶”",
"author": " 安全客",
"description": null,
"source": "360数字安全",
"pubDate": "2025-03-14 10:08:25"
},
{
"guid": "https://www.anquanke.com/post/id/305023",
"title": "ExHub 的 IDOR 漏洞可致攻击者篡改网站托管配置",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 14:50:25"
},
{
"guid": "https://www.anquanke.com/post/id/305020",
"title": "施乐打印机漏洞可致攻击者从PDA和SMB捕获身份验证数据",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 14:39:42"
},
{
"guid": "https://www.anquanke.com/post/id/305015",
"title": "瞻博网络成功修复 Session Smart Router 关键漏洞",
"author": " 安全客",
"description": null,
"source": "securityaffairs 2",
"pubDate": "2025-03-13 11:38:18"
},
{
"guid": "https://www.anquanke.com/post/id/305013",
"title": "Blind Eagle APT-C-36快速利用补丁漏洞借知名平台发动网络攻击",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 11:24:58"
},
{
"guid": "https://www.anquanke.com/post/id/305010",
"title": "通过 YouTube 传播的 DCRat 恶意软件正攻击用户以窃取登录凭证",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 11:03:28"
},
{
"guid": "https://www.anquanke.com/post/id/305007",
"title": "不断演变的分布式拒绝服务DDoS攻击策略网络专家剖析社交媒体平台X的遭袭事件",
"author": " 安全客",
"description": null,
"source": "securitybrief",
"pubDate": "2025-03-13 10:49:42"
},
{
"guid": "https://www.anquanke.com/post/id/305005",
"title": "新型Anubis恶意软件可完全躲避检测让黑客得以执行远程命令",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-13 10:41:12"
},
{
"guid": "https://www.anquanke.com/post/id/305002",
"title": "Opentext推出人工智能网络安全解决方案抵御威胁",
"author": " 安全客",
"description": null,
"source": "securitybrief",
"pubDate": "2025-03-13 10:23:40"
},
{
"guid": "https://www.anquanke.com/post/id/304997",
"title": "Nasuni 与 CrowdStrike 合作,大幅提升威胁检测效能",
"author": " 安全客",
"description": null,
"source": "securitybrief",
"pubDate": "2025-03-13 10:13:45"
},
{
"guid": "https://www.anquanke.com/post/id/304995",
"title": "360携手首都在线 拟推动DeepSeek一体机安全与服务落地合作",
"author": " 安全客",
"description": null,
"source": "360数字安全",
"pubDate": "2025-03-13 10:01:25"
},
{
"guid": "https://www.anquanke.com/post/id/304990",
"title": "紧急CISA 警告苹果 iOS 漏洞正被恶意利用",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-12 17:53:54"
},
{
"guid": "https://www.anquanke.com/post/id/304988",
"title": "360携手清微智能DeepSeek一体机 拟推动“国产算力+大模型安全+AI应用”协同发展",
"author": " 安全客",
"description": null,
"source": "360数字安全",
"pubDate": "2025-03-12 17:40:24"
} }
] ]

File diff suppressed because it is too large Load Diff

View File

@ -1,161 +1,162 @@
[ [
{ {
"title": "恶意软件通过木马 VPN 应用和 SEO 投毒传播,推测其目标是中文用户", "title": "人工智能聊天机器人DeepSeek R1可被操纵用于创建恶意软件",
"link": "https://www.freebuf.com/news/419140.html", "link": "https://www.freebuf.com/articles/network/424572.html",
"description": "一种名为PLAYFULGHOST的新恶意软件具有多种信息收集功能例如键盘记录、屏幕捕获、音频捕获、远程 shell 以及文件传输/执行。", "description": "DeepSeek R1可被操纵生成恶意软件降低网络犯罪门槛尽管仍需手动修正但加速了恶意软件开发。",
"body": "<p>网络安全研究人员发现一种名为PLAYFULGHOST的新恶意软件它具有多种信息收集功能例如键盘记录、屏幕捕获、音频捕获、远程 shell 以及文件传输/执行。</p><p>据谷歌安全团队称该后门与一种名为Gh0st RAT 的已知远程管理工具在功能上存在重叠,后者的源代码于 2008 年被公开泄露。</p><p>PLAYFULGHOST 的初始访问途径包括使用带有行为准则相关诱饵的网络", "body": "<p>网络安全公司Tenable Research的最新分析揭示开源人工智能聊天机器人<strong>DeepSeek R1</strong>能够被操纵用于生成恶意软件包括键盘记录器和勒索软件。Tenable的研究团队评估了DeepSeek生成有害代码的能力重点测试了两种常见的恶意软件类型键盘记录器和勒索软件。</p><p>尽管DeepSeek无法直接“开箱即用”生成完全可用的恶意软件",
"category": "资讯", "category": "网络安全",
"pubDate": "Mon, 06 Jan 2025 13:42:35 +0800" "pubDate": "Fri, 14 Mar 2025 00:51:27 +0800"
}, },
{ {
"title": "LegionLoader滥用Chrome扩展传播多种恶意软件", "title": "朝鲜威胁组织ScarCruft利用KoSpy恶意软件监控安卓用户",
"link": "https://www.freebuf.com/news/419136.html", "link": "https://www.freebuf.com/articles/es/424540.html",
"description": "据gbhackers消息名为LegionLoader 的恶意软件正通过Chrome 扩展分发窃密软件,包括对受害者实施电子邮件操纵、跟踪浏览,甚至将受感染的浏览器转变为攻击者的代理服务器,使其能够使用受害者的凭证浏览网页。自 2024 年 8 月以来研究人员观察到LegionLoader 通过 Chrome 扩展程序分发各种窃取程序,包括 LummaC2、Rhadamanthys 和 Stea", "description": "朝鲜黑客组织ScarCruft通过伪装应用投放KoSpy恶意软件监控安卓用户攻击针对韩语和英语用户。",
"body": "<p>据gbhackers消息名为LegionLoader 的恶意软件正通过Chrome 扩展分发窃密软件,包括对受害者实施电子邮件操纵、跟踪浏览,甚至将受感染的浏览器转变为攻击者的代理服务器,使其能够使用受害者的凭证浏览网页。<img src=\"https://image.3001.net/images/20250106/1736134823_677b50a71ce2410384ecc.jpg", "body": "<p><img src=\"https://image.3001.net/images/20250313/1741878280398181_a226a43ddb394530a82c72add0dcff49.png!small\" alt=\"image\" /></p><p>据报道与朝鲜有关的威胁组织ScarCruft开发了一种名为 <strong>KoSpy</strong>的安卓监控工具,专门针对韩",
"category": "资讯", "category": "企业安全",
"pubDate": "Mon, 06 Jan 2025 11:38:08 +0800" "pubDate": "Thu, 13 Mar 2025 19:53:00 +0800"
}, },
{ {
"title": "大量恶意npm包盯上了开发者", "title": "大模型越狱(通常)比你想象的容易——一种基于伪造对话历史的攻击算法",
"link": "https://www.freebuf.com/news/419131.html", "link": "https://www.freebuf.com/vuls/424360.html",
"description": "研究人员发现有大量的恶意npm软件包冒充以太坊开发者使用的Hardhat开发环境正在窃取私钥和其他敏感数据。", "description": "一种基于伪造会话历史的大模型对抗算法",
"body": "<p>近日研究人员发现有大量的恶意npm软件包它们冒充以太坊开发者使用的Hardhat开发环境正在窃取私钥和其他敏感数据。研究人员称这些恶意软件包总共被下载了一千多次。</p><p><img src=\"https://image.3001.net/images/20250106/1736132495_677b478f1af59302ff596.png!small\" alt=\"\" /></", "body": "<h1>1.摘要</h1><p>微软的研究团队提出了一种名为“上下文一致性攻击”Context Compliance Attack以下简称CCA算法的大模型越狱攻击算法这种攻击算法相对轻巧既不需要复杂的提示词工程也不要消耗大量算力来迭代优化恶意提示词。</p><p>CCA算法利用了目前大模型架构中一个漏洞——会话历史的无状态性。即用户可以伪造会话历史输入给大模型而大模型在无法分辨该对",
"category": "资讯",
"pubDate": "Mon, 06 Jan 2025 10:58:21 +0800"
},
{
"title": "【情报】大型泄密库搜索引擎-libraryofleaks",
"link": "https://www.freebuf.com/news/419128.html",
"description": "这个平台允许用户搜索数百万份来自数十起泄密事件的文件,而且每天都会添加更多的数据。",
"body": "<p><code>libraryofleaks</code>是由分布式拒绝秘密组织(<code>Distributed Denial of Secrets</code>,简称<code>DDoSecrets</code>)推出的一个公共搜索引擎,被称为“泄密库”(<code>Library of Leaks</code>),这个平台允许用户搜索数百万份来自数十起泄密事件的文件,而且每天都会添加更多",
"category": "资讯",
"pubDate": "Mon, 06 Jan 2025 10:43:48 +0800"
},
{
"title": "知名化工巨头被勒索攻击泄露761.8GB数据",
"link": "https://www.freebuf.com/news/419127.html",
"description": "此次攻击涉及对其部分服务器上的电子数据进行加密而勒索软件组织Hunters International声称对此事负责。",
"body": "<p>Nikki - Universal有限公司是一家知名的化学制造商近期沦为一起复杂勒索软件攻击的受害者。该公司于2024年12月27日证实了这一事件此次攻击涉及对其部分服务器上的电子数据进行加密而勒索软件组织Hunters International声称对此事负责。</p><p><img src=\"https://image.3001.net/images/20250106/173613",
"category": "资讯",
"pubDate": "Mon, 06 Jan 2025 10:41:31 +0800"
},
{
"title": "【全球首发】【6w$赏金】微软身份漏洞-未授权强制解绑任意微软账户邮箱",
"link": "https://www.freebuf.com/vuls/419097.html",
"description": "网络安全并不是我的最终梦想职业,只是梦想职业的其中一个技能点。",
"body": "<h2 id=\"h2-1\">致谢</h2><p>我是Feng Jiaming公开别名 Sugobet/M1n9K1n9来自中国广东工贸职业技术学院的在校学生。</p><p>I'm Feng Jiaming, my public alias Sugobet/M1n9K1n9, a student from Guangdong Polytechnic of Industry and Commerc",
"category": "漏洞", "category": "漏洞",
"pubDate": "Sun, 05 Jan 2025 13:35:19 +0800" "pubDate": "Thu, 13 Mar 2025 16:37:29 +0800"
}, },
{ {
"title": "都在给网安泼冷水,我来给网安泼盆开水", "title": "CISA警告苹果WebKit越界写入漏洞已被野外利用",
"link": "https://www.freebuf.com/articles/neopoints/419094.html", "link": "https://www.freebuf.com/vuls/424562.html",
"description": "契机今天看到一篇文章契机今天看到一篇文章让我有了估算大黑阔赚钱能力的灵感。给网安行业泼盆开水!", "description": "苹果WebKit越界写入漏洞CVE-2025-24201已被野外利用攻击者可执行未经授权的代码。",
"body": "<h2 id=\"h2-1\"><strong>契机</strong></h2><p style=\"text-align:center;\">今天看到一篇文章让我有了估算大黑阔赚钱能力的灵感。给网安行业泼盆开水!<br /><img src=\"https://image.3001.net/images/20250105/1736053407_677a129f75ed5e9a02268.png!small", "body": "<p><img src=\"https://image.3001.net/images/20250314/1741889032347357_5c64ed0a88814dc4bc5fd233083566e8.webp!small\" alt=\"image\" /></p><p>美国网络安全和基础设施安全局CISA近日警告称苹果WebKit浏览器引擎中存在一个被野外利用的零日漏洞编号为CVE-202",
"category": "观点",
"pubDate": "Sun, 05 Jan 2025 13:14:47 +0800"
},
{
"title": "盘点万亿市值的Palantir在2024年拿下的至少87亿的美军合同都是啥",
"link": "https://www.freebuf.com/articles/neopoints/419073.html",
"description": "仅2024年一年该公司与美国军方的合同额就高达12亿美元约合人民币87.8亿元)。",
"body": "<p style=\"text-align:center;\">近日美国科技公司Palantir宣布美国陆军已授予Palantir一份价值4.007亿美元约合人民币29亿元的合同。近年来Palantir持续获得美国军方的青睐公开信息显示仅2024年一年该公司与美国军方的合同额就高达12亿美元约合人民币87.8亿元。目前Palantir的大部分收入都来自于美国政府和军事部门。<br",
"category": "观点",
"pubDate": "Sat, 04 Jan 2025 14:01:04 +0800"
},
{
"title": "FreeBuf早报 | 华硕路由器漏洞允许任意代码执行用户集体起诉Siri“偷听”",
"link": "https://www.freebuf.com/news/419064.html",
"description": "这些漏洞可能允许经过身份验证的攻击者通过华硕路由器的 AiCloud 功能触发命令执行。",
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 超过300万台未加密的邮件服务器暴露</h3><p>目前超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上容易受到网络嗅探攻击。【外刊-<a href=\"https://www.bleepingcomputer.com/news/security/over-3-million-mail-se",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 20:35:15 +0800"
},
{
"title": "Threatcl一款威胁模型记录与归档工具",
"link": "https://www.freebuf.com/sectool/419060.html",
"description": "Threatcl是一款功能强大的威胁记录模型可以帮助广大研究人员更加清楚地记录威胁并推动安全态势的提升。",
"body": "<h2 id=\"h2-1\">关于Threatcl</h2><p>Threatcl是一款功能强大的威胁记录模型可以帮助广大研究人员更加清楚地记录威胁并推动安全态势的提升。</p><p><img src=\"https://image.3001.net/images/20250103/1735901406_6777c0deeaae638d26c6a.png!small\" width=\"690\" he",
"category": "工具",
"pubDate": "Fri, 03 Jan 2025 18:53:44 +0800"
},
{
"title": "一周网安优质PDF资源推荐丨FreeBuf知识大陆",
"link": "https://www.freebuf.com/articles/419042.html",
"description": "我们精选了本周知识大陆公开发布的10条优质资源让我们一起看看吧。",
"body": "<p>各位读者周末好以下是本周「FreeBuf知识大陆一周优质资源推荐」我们精选了本周知识大陆公开发布的10条优质资源让我们一起看看吧。</p><p><img src=\"https://image.3001.net/images/20250103/1735891639_67779ab73e8d0be0fdbae.png!small\" alt=\"\" /></p><h2 id=\"h2-1\">笔记",
"pubDate": "Fri, 03 Jan 2025 16:22:28 +0800"
},
{
"title": "FreeBuf周报 | 超过300万台未加密的邮件服务器暴露WPA3协议存在安全漏洞",
"link": "https://www.freebuf.com/news/419036.html",
"description": "总结推荐本周的热点资讯、安全事件、一周好文和省心工具,保证大家不错过本周的每一个重点!",
"body": "<p>各位 Buffer 周末好以下是本周「FreeBuf周报」我们总结推荐了本周的热点资讯、安全事件、一周好文和省心工具保证大家不错过本周的每一个重点<img style=\"border-width:0px;line-height:inherit;max-width:635px;height:auto;\" src=\"https://image.3001.net/images/202209",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 15:56:46 +0800"
},
{
"title": "Agneyastra一款Firebase 错误配置检测工具包",
"link": "https://www.freebuf.com/sectool/419006.html",
"description": "Agneyastra是一款功能强大的错误配置检测工具可以帮助广大研究人员更好地保障Firebase平台的安全。",
"body": "<h2 id=\"h2-1\">关于Agneyastra</h2><p>Agneyastra是一款功能强大的错误配置检测工具该工具主要针对的是Firebase平台可以帮助广大研究人员更好地保障Firebase平台的安全。</p><p><img src=\"https://image.3001.net/images/20250103/1735881390_677772aecfdd43a52c23b.p",
"category": "工具",
"pubDate": "Fri, 03 Jan 2025 13:21:19 +0800"
},
{
"title": "Exposor一款基于互联网搜索引擎实现的统一语法网络侦查工具",
"link": "https://www.freebuf.com/sectool/419004.html",
"description": "Exposor是一款功能强大的网络侦查工具支持广大研究人员使用统一语法来检测网络中的安全威胁。",
"body": "<h2 id=\"h2-1\">关于Exposor</h2><p>Exposor是一款功能强大的网络侦查工具该工具基于互联网搜索引擎实现其功能支持广大研究人员使用统一语法来检测网络中的安全威胁。</p><p><img src=\"https://image.3001.net/images/20250103/1735880146_67776dd204e38df0c1826.png!small\" wid",
"category": "工具",
"pubDate": "Fri, 03 Jan 2025 12:58:29 +0800"
},
{
"title": "日本最大的移动运营商因DDoS攻击导致服务中断",
"link": "https://www.freebuf.com/news/418992.html",
"description": "NTT Docomo当地时间1月2日表示一次DDoS网络攻击导致运营中断网站和一些服务在宕机大半天后才逐渐恢复。",
"body": "<p>日本最大的移动运营商 NTT Docomo Inc. 当地时间1月2日表示一次分布式拒绝服务 DDoS 网络攻击导致运营中断,网站和一些服务在宕机大半天后才逐渐恢复。</p><p><img src=\"https://image.3001.net/images/20250103/1735874913_677759613048fcfd644c0.png!small\" width=\"690\"",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 11:26:47 +0800"
},
{
"title": "用户集体起诉Siri“偷听”",
"link": "https://www.freebuf.com/news/418989.html",
"description": "苹果公司同意支付9500万美元现金以和解一项拟议的集体诉讼该诉讼声称其Siri语音助手侵犯了用户的隐私。",
"body": "<p>1月3日消息科技巨头苹果公司同意支付9500万美元现金以和解一项拟议的集体诉讼该诉讼声称其Siri语音助手侵犯了用户的隐私。这份和解协议涵盖了2014年9月17日至2024年12月31日期间使用Siri的美国用户涉及数千万人。</p><p>每位参与诉讼的用户最多可为5台Siri设备申请赔偿每台设备最高可获得20美元。此外苹果公司需在六个月内永久删除2019年10月前收集的Siri",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 11:17:16 +0800"
},
{
"title": "黑客滥用AWS泄露的信息进行云狩猎",
"link": "https://www.freebuf.com/news/418985.html",
"description": "名为“EC2 Grouper”的黑客组织近年来一直在利用AWS工具以及泄露的凭证对云环境展开狩猎型攻击。",
"body": "<p>名为“EC2 Grouper”的黑客组织近年来一直在利用AWS工具以及泄露的凭证对云环境展开狩猎型攻击。在过去的数年里这个相当活跃的威胁行为主体在数十个客户环境中被发现这使其成为网络安全专家追踪的最活跃的组织之一。</p><p><img src=\"https://image.3001.net/images/20250103/1735874034_677755f204ca51a03dc1",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 11:10:50 +0800"
},
{
"title": "超过300万台未加密的邮件服务器暴露",
"link": "https://www.freebuf.com/news/418975.html",
"description": "超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上容易受到网络嗅探攻击。",
"body": "<p>目前超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上容易受到网络嗅探攻击。</p><p>IMAP和POP3是访问邮件服务器上邮件的两种方式。IMAP适用于从多个设备如手机和笔记本电脑查看邮件因为它会将邮件保留在服务器上并在设备间同步。而POP3则会将邮件从服务器下载使其仅能从下载的设备访问。</p><p><img src=\"https://image.3",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 10:22:53 +0800"
},
{
"title": "CertiK Hack3D Web3.0 年度安全报告2024",
"link": "https://www.freebuf.com/articles/paper/418966.html",
"description": "2024年Web3.0领域因安全事件导致的总损失超过23.63亿美元同比增幅达31.61%。全年共发生760起安全事件其中网络钓鱼和私钥泄露是两大主要攻击手段。",
"body": "<p><img src=\"https://image.3001.net/images/20250102/1735830965_6776adb5bccea4626f7a7.jpg!small\" alt=\"2024Web3.0 安全年度报告 (1).jpg\" /></p><h1><strong>摘要</strong></h1><ul><li><p>2024年Web3.0行业共发生760起链上安全事件",
"category": "安全报告",
"pubDate": "Thu, 02 Jan 2025 23:16:05 +0800"
},
{
"title": "漏洞分析 | Wordress Tutor LMS SQL注入漏洞(CVE-2024-10400)",
"link": "https://www.freebuf.com/vuls/418348.html",
"description": "Tutor LMS Pro是一个智能、简单且可扩展的WordPress LMS插件它配备了革命性的拖放系统来创建丰富的课程。",
"body": "<h2 id=\"h2-1\">插件介绍:</h2><p>Tutor LMS Pro是一个智能、简单且可扩展的WordPress LMS插件它配备了革命性的拖放系统来创建丰富的课程丰富而简单。Tutor LMS*不仅让你能够在线传播您的知识,也可以帮助你通过在线销售课程赚钱。它提供了对发生的交易的进行完全控制的设施。</p><h2 id=\"h2-2\">漏洞概述:</h2><p>由于对用户提供的参数",
"category": "漏洞", "category": "漏洞",
"pubDate": "Thu, 02 Jan 2025 20:44:33 +0800" "pubDate": "Thu, 13 Mar 2025 16:21:31 +0800"
},
{
"title": "微信小程序测试技巧总结",
"link": "https://www.freebuf.com/articles/web/424498.html",
"description": "测试微信小程序跟web网站基本相同抓包测试接口逆向看小程序源码。",
"body": "<h2 id=\"h2-1\">前言</h2><p>目前越来越多的企业都开始开发微信小程序如果在web测试过程中没有结果不如换个思路去看看微信小程序是否有问题。</p><p>测试微信小程序跟web网站基本相同抓包测试接口逆向看小程序源码。本篇文章就来看看如何进行微信小程序抓包以及逆向。</p><p><br /></p><h2 id=\"h2-2\">微信小程序抓包</h2><p>要测试微信小程序",
"category": "Web安全",
"pubDate": "Thu, 13 Mar 2025 16:16:54 +0800"
},
{
"title": "全美29州逾8.6万名医护人员信息因AWS S3存储桶配置错误遭泄露",
"link": "https://www.freebuf.com/articles/database/424561.html",
"description": "全美29州逾8.6万名医护人员信息因AWS S3存储桶配置错误遭泄露包含敏感PII和医疗文件。",
"body": "<p><img src=\"https://image.3001.net/images/20250314/1741889027627786_9dbc9c95718140af8ac0145800762e1c.webp!small\" alt=\"image\" /></p><p>近日一起涉及医护人员敏感信息的大规模数据泄露事件被发现总部位于新泽西州的健康科技公司ESHYFT的超过8.6万条记录被暴露。<",
"category": "数据安全",
"pubDate": "Thu, 13 Mar 2025 16:09:35 +0800"
},
{
"title": "黑客滥用微软Copilot发动高仿钓鱼攻击",
"link": "https://www.freebuf.com/news/424552.html",
"description": "黑客利用微软Copilot发起高仿钓鱼攻击通过伪造发票邮件和虚假登录页面窃取用户凭据威胁企业安全。",
"body": "<p><img src=\"https://image.3001.net/images/20250314/1741885485840984_47bf608e967345259deb66fcf48bec25.webp!small\" alt=\"image\" /></p><p>随着越来越多企业将微软Copilot集成到其日常工作中网络犯罪分子瞄准了这一AI助手的用户发起了高度复杂的钓鱼攻击。微软Cop",
"category": "资讯",
"pubDate": "Thu, 13 Mar 2025 16:07:50 +0800"
},
{
"title": "FreeBuf早报 | 特朗普提名Sean Plankey掌权CISA勒索病毒袭美逾300关键机构",
"link": "https://www.freebuf.com/news/424478.html",
"description": "特朗普提名Sean Plankey掌权CISA勒索病毒袭美逾300关键机构",
"body": "<h2 id=\"h2-1\">全球网安事件速递</h2><h3 id=\"h3-1\">1. Win10 / Win11 装机镜像不再“裸奔”,微软发布 Defender 更新填补安全漏洞</h3><p>微软针对 Windows 10、Windows 11 和 Windows Server 安装镜像,发布了新版 Defender 更新,解决安装镜像中可能存在的旧版反恶意软件问题,提升系统安全性和性能。 ",
"category": "资讯",
"pubDate": "Thu, 13 Mar 2025 14:10:05 +0800"
},
{
"title": "新手友好spring内存马学习篇二",
"link": "https://www.freebuf.com/articles/web/424441.html",
"description": "这是spring内存马第二篇主要学习实战中如何打内存马",
"body": "<h2 id=\"h2-1\">反序列化注入内存马</h2><h3 id=\"h3-1\">Fastjson靶场搭建</h3><p>我们在前面的springboot项目上引入fastjson模拟一下漏洞环境</p><p><img src=\"https://image.3001.net/images/20250306/1741255427_67c97303619323cef3b85.png!small\" ",
"category": "Web安全",
"pubDate": "Thu, 13 Mar 2025 09:17:22 +0800"
},
{
"title": "D-link: 轻量级正反向文件同步后渗透持久化控制",
"link": "https://www.freebuf.com/sectool/424419.html",
"description": "#后渗透 #文件同步 #轻量 #持久化 #正/反向隧道 #C++ #D-Link",
"body": "<h1>D-link</h1><p>D-link 是一款用 C++ 编写的轻量级 Linux 文件同步工具。</p><ol><li><p>支持反向文件同步操作。</p></li><li><p>目录监控,实时更新。</p></li><li><p>访问控制:客户端只能自动上传和删除文件,无法从服务器下载敏感文件。就算同步的文件在服务器端被删掉,客户端还是会自动恢复。</p></li><li><p>客户",
"category": "工具",
"pubDate": "Thu, 13 Mar 2025 00:45:10 +0800"
},
{
"title": "多视角解码大模型安全:以 AI 制衡 AI突破安全困局",
"link": "https://www.freebuf.com/fevents/424379.html",
"description": "“模型有界、安全无疆”主题技术研讨会在西安圆满落幕。",
"body": "<p>在人工智能快速发展的今天,大模型已经成为了推动各行业变革的核心技术之一,从医疗诊断到智能交通,从金融风险控制到教育个性化推荐,各行各业中都出现了大模型的身影。</p><p>根据Gartner的预测2026年将有超过80%的企业部署启用生成式人工智能GenAI的应用而2023年这一比例尚不足5%,可以说大模型正以前所未有的速度重塑着我们的世界。</p><p>技术突飞猛进的同时,也伴生着",
"category": "活动",
"pubDate": "Wed, 12 Mar 2025 17:31:35 +0800"
},
{
"title": "超400个IP地址协同攻击利用多个SSRF漏洞发起网络攻势",
"link": "https://www.freebuf.com/vuls/424412.html",
"description": "至少400个IP地址被发现同时利用多个SSRF漏洞攻击尝试之间表现出显著的重叠。",
"body": "\n<p><img src=\"https://image.3001.net/images/20250312/1741788137072942_62d5d71c105a40c7a1be5eeb33fbab11.png!small\" alt=\"image\"></p>\n<p>威胁情报公司GreyNoise发出警告称近期针对多个平台的服务器端请求伪造SSRF漏洞利用活动出现了“协同激增”现象。</p>",
"category": "漏洞",
"pubDate": "Wed, 12 Mar 2025 17:26:00 +0800"
},
{
"title": "AI会取代渗透测试工程师吗",
"link": "https://www.freebuf.com/articles/neopoints/424414.html",
"description": "关于哪些职业会受到AI冲击的讨论从未停止而渗透测试Pentesting最近也被推到了风口浪尖。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741788229145520_ea88f496d23c41d9b5a2c92b14a8910e.png!small\" alt=\"image\" /></p><p>多年来我们一直在听到同样的说法AI将会取代你的工作。事实上2017年麦肯锡发布了一份报告《消失与新增的岗位自动化时代下的劳动",
"category": "观点",
"pubDate": "Wed, 12 Mar 2025 15:55:00 +0800"
},
{
"title": "FreeBuf早报 | 微软与VMware零日漏洞紧急修复指南TP-Link漏洞感染超6000台设备",
"link": "https://www.freebuf.com/news/424346.html",
"description": "微软与VMware零日漏洞紧急修复指南TP-Link漏洞感染超6000台设备",
"body": "<h2 id=\"h2-1\">全球网安事件速递</h2><h3 id=\"h3-1\">1. Manus代码遭越狱季逸超本人回应“团队一直有开源传统”</h3><p>北京时间3月10日清晨推特用户jianxliao发布推文称成功“越狱”了Manus AI的代码据其透露他只是简单地要求Manus提供\"/opt/.manus/\"目录下的文件系统便直接提供了沙盒运行时代码并揭示了Manus使用C",
"category": "资讯",
"pubDate": "Wed, 12 Mar 2025 14:30:42 +0800"
},
{
"title": "API攻击威胁加剧2025年如何确保API安全",
"link": "https://www.freebuf.com/articles/web/424399.html",
"description": "API攻击威胁加剧59%的组织开放API“写入”权限黑客可未经授权访问导致数据窃取、账户接管等重大风险。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741780939666956_d18f4fcfe4ab4b048c66f1169504989e.png!small\" alt=\"image\" /></p><p>API攻击正持续增加<strong>一项令人担忧的研究</strong>显示59%的组织为至少一半的API开放了“写入”权限这",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 11:29:24 +0800"
},
{
"title": "攻击者开始利用MFA漏洞在内的高级手段绕过多因素身份验证",
"link": "https://www.freebuf.com/articles/web/424386.html",
"description": "这些高级技术利用了身份验证工作流程中的漏洞,而非身份验证因素本身。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741773779537870_8402efd7d8fa46fa8d2f0067903712ee.webp!small\" alt=\"image\" /></p><p>研究人员最近发现了一种令人不安的攻击趋势这些攻击专门设计来绕过多因素身份验证MFA的保护机制。这些高级技术利用了身份验证工作",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 09:53:49 +0800"
},
{
"title": "Hessian反序列化原理到武器化利用",
"link": "https://www.freebuf.com/articles/web/424308.html",
"description": "今天和大家共同探讨Java安全领域中一种常见的安全威胁也就是Hessian反序列化漏洞。",
"body": "<p>今天和大家共同探讨Java安全领域中一种常见的安全威胁也就是Hessian反序列化漏洞。作为贯穿Java生态的RPC通信基石Hessian协议如同微服务架构的\"神经网络\"其安全风险直接影响多个Java核心组件的命脉如近几年披露的一些Hessian协议相关的安全组件漏洞Seata Hessian 反序列化漏洞、Nacos 集群 Hessian 反序列化漏洞、xxl-job Hessi",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 09:42:19 +0800"
},
{
"title": "新型XCSSET恶意软件利用增强混淆技术攻击macOS用户",
"link": "https://www.freebuf.com/articles/web/424375.html",
"description": "新型XCSSET恶意软件利用增强混淆技术攻击macOS用户感染Xcode项目窃取敏感信息采用复杂持久化机制威胁开发者安全。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741770276931049_1ffd07215f97425f8ba4f5216c276ae5.webp!small\" alt=\"image\" /></p><p>微软威胁情报团队发现了一种新型的XCSSET变种这是一种复杂的模块化macOS恶意软件能够感染Xcode项目并在开发者构建这",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 07:44:44 +0800"
},
{
"title": "AI 辅助的虚假 GitHub 仓库窃取敏感数据,包括登录凭证",
"link": "https://www.freebuf.com/articles/database/424374.html",
"description": "AI 辅助的虚假 GitHub 仓库窃取敏感数据,伪装合法项目分发 Lumma Stealer 恶意软件。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741770262754508_969bbeb5d15b4a8795a84388a5078ab3.webp!small\" alt=\"image\" /></p><p>近期发现了一种复杂的恶意软件活动,该活动利用人工智能创建具有欺骗性的 GitHub 仓库,并分发 SmartLoader 负载,最",
"category": "数据安全",
"pubDate": "Wed, 12 Mar 2025 07:40:26 +0800"
},
{
"title": "谷歌紧急警告Chromecast用户切勿进行出厂重置",
"link": "https://www.freebuf.com/news/424361.html",
"description": "谷歌紧急警告别对Chromecast进行出厂重置。过期证书导致2000万台设备无法正常运行用户陷入“变砖”困境。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741766697560974_acdc23f708a34b058255dc1d9a0b0fcd.webp!small\" alt=\"image\" /></p><p>谷歌已向第二代Chromecast2015年和Chromecast Audio设备的所有者发出紧急通知警告不要进行出厂重置",
"category": "资讯",
"pubDate": "Wed, 12 Mar 2025 07:10:20 +0800"
} }
] ]

File diff suppressed because it is too large Load Diff

View File

@ -4,65 +4,5 @@
"published_at": "2021-11-01T08:54:13Z", "published_at": "2021-11-01T08:54:13Z",
"author": "BeichenDream", "author": "BeichenDream",
"keyword": "BeichenDream/Godzilla" "keyword": "BeichenDream/Godzilla"
},
{
"link": "https://github.com/rebeyond/Behinder/releases/tag/Behinder_v4.1%E3%80%90t00ls%E4%B8%93%E7%89%88%E3%80%91",
"published_at": "2023-08-24T11:31:46Z",
"author": "rebeyond",
"keyword": "rebeyond/Behinder"
},
{
"link": "https://github.com/AntSwordProject/antSword/releases/tag/2.1.15",
"published_at": "2022-07-17T05:52:54Z",
"author": "Medicean",
"keyword": "AntSwordProject/antSword"
},
{
"link": "https://github.com/gentilkiwi/mimikatz/releases/tag/2.2.0-20220919",
"published_at": "2022-09-19T15:55:03Z",
"author": "gentilkiwi",
"keyword": "gentilkiwi/mimikatz"
},
{
"link": "https://github.com/ehang-io/nps/releases/tag/v0.26.10",
"published_at": "2021-04-08T06:32:17Z",
"author": "ffdfgdfg",
"keyword": "ehang-io/nps"
},
{
"link": "https://github.com/chaitin/xray/releases/tag/xpoc-0.1.0",
"published_at": "2024-07-19T11:12:29Z",
"author": "Jarcis-cy",
"keyword": "chaitin/xray"
},
{
"link": "https://github.com/FunnyWolf/pystinger/releases/tag/v1.6",
"published_at": "2021-03-30T13:47:07Z",
"author": "FunnyWolf",
"keyword": "FunnyWolf/pystinger"
},
{
"link": "https://github.com/L-codes/Neo-reGeorg/releases/tag/v5.2.0",
"published_at": "2024-01-16T06:39:11Z",
"author": "L-codes",
"keyword": "L-codes/Neo-reGeorg"
},
{
"link": "https://github.com/shadow1ng/fscan/releases/tag/2.0.0-build1",
"published_at": "2024-12-19T15:11:24Z",
"author": "shadow1ng",
"keyword": "shadow1ng/fscan"
},
{
"link": "https://github.com/SafeGroceryStore/MDUT/releases/tag/v2.1.1",
"published_at": "2022-06-22T13:11:44Z",
"author": "Ch1ngg",
"keyword": "SafeGroceryStore/MDUT"
},
{
"link": "https://github.com/wy876/POC/releases/tag/POC20241228",
"published_at": "2024-12-29T09:00:56Z",
"author": "wy876",
"keyword": "wy876/POC"
} }
] ]

View File

@ -7,113 +7,5 @@
"author": "beichen", "author": "beichen",
"link_2": "https://github.com/BeichenDream/Godzilla/commit/a5558e6c37139ebb0b7b4491dc3ea7ce8d8f9e49", "link_2": "https://github.com/BeichenDream/Godzilla/commit/a5558e6c37139ebb0b7b4491dc3ea7ce8d8f9e49",
"keyword": "BeichenDream/Godzilla" "keyword": "BeichenDream/Godzilla"
},
{
"link": "https://api.github.com/rebeyond/Behinder",
"name": "rebeyond/Behinder",
"updated_at": "2023-08-15T14:28:52Z",
"description": "Create SECURITY.md",
"author": "rebeyond",
"link_2": "https://github.com/rebeyond/Behinder/commit/2e2817ae70462a02281c8d96d4cd44c19e5c55b0",
"keyword": "rebeyond/Behinder"
},
{
"link": "https://api.github.com/AntSwordProject/antSword",
"name": "AntSwordProject/antSword",
"updated_at": "2023-07-15T02:53:39Z",
"description": "(Fix: Modules/Database) 修正 PHP4 类型数据管理模块打不开的问题",
"author": "Medicean",
"link_2": "https://github.com/AntSwordProject/antSword/commit/6112ab2c3f6dceda68421cf02ca2dc43a940a01f",
"keyword": "AntSwordProject/antSword"
},
{
"link": "https://api.github.com/yhy0/github-cve-monitor",
"name": "yhy0/github-cve-monitor",
"updated_at": "2023-02-14T07:02:19Z",
"description": "修复黑名单,之前搞成没三分钟清零了,抱歉",
"author": "yhy",
"link_2": "https://github.com/yhy0/github-cve-monitor/commit/570b0645f8f51706d984ff9ba97e0a79d733bf66",
"keyword": "yhy0/github-cve-monitor"
},
{
"link": "https://api.github.com/gentilkiwi/mimikatz",
"name": "gentilkiwi/mimikatz",
"updated_at": "2024-01-05T09:06:47Z",
"description": "Merge pull request #439 from chunhualiu/master\n\n[change] Convert pointer to DWORD_PTR first to eliminate compile warning",
"author": "Benjamin DELPY",
"link_2": "https://github.com/gentilkiwi/mimikatz/commit/0c611b1445b22327fcc7defab2c09b63b4f59804",
"keyword": "gentilkiwi/mimikatz"
},
{
"link": "https://api.github.com/ehang-io/nps",
"name": "ehang-io/nps",
"updated_at": "2021-10-09T07:18:41Z",
"description": "Merge pull request #866 from freeoa/master\n\nadd build to apple silicon(M1)",
"author": "he liu",
"link_2": "https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc",
"keyword": "ehang-io/nps"
},
{
"link": "https://api.github.com/chaitin/xray",
"name": "chaitin/xray",
"updated_at": "2024-08-16T07:18:55Z",
"description": "[add] 更新客服信息",
"author": "Jarcis-cy",
"link_2": "https://github.com/chaitin/xray/commit/aee9f9cecc3d49a1842a33c38b96af35a7d90168",
"keyword": "chaitin/xray"
},
{
"link": "https://api.github.com/FunnyWolf/pystinger",
"name": "FunnyWolf/pystinger",
"updated_at": "2021-09-29T13:13:36Z",
"description": "Optimize code execution process",
"author": "FunnyWolf",
"link_2": "https://github.com/FunnyWolf/pystinger/commit/8502983a6ae24f99c1ec8a8310f61eda4ed31684",
"keyword": "FunnyWolf/pystinger"
},
{
"link": "https://api.github.com/L-codes/Neo-reGeorg",
"name": "L-codes/Neo-reGeorg",
"updated_at": "2024-09-23T09:12:45Z",
"description": "fix #100",
"author": "L",
"link_2": "https://github.com/L-codes/Neo-reGeorg/commit/9945dce310de26ac7c0c90054584aeef89c58d07",
"keyword": "L-codes/Neo-reGeorg"
},
{
"link": "https://api.github.com/shadow1ng/fscan",
"name": "shadow1ng/fscan",
"updated_at": "2025-01-12T13:31:30Z",
"description": "Merge pull request #412 from BaiMeow/patch-1\n\nFix 192.168 should mask 16",
"author": "ZacharyZcR",
"link_2": "https://github.com/shadow1ng/fscan/commit/e2c8dd8b1f57277e914a4bc47689d804a109e6b8",
"keyword": "shadow1ng/fscan"
},
{
"link": "https://api.github.com/SafeGroceryStore/MDUT",
"name": "SafeGroceryStore/MDUT",
"updated_at": "2023-09-22T04:28:28Z",
"description": "Update ShellUtil.java",
"author": "金枪银矛小霸王",
"link_2": "https://github.com/SafeGroceryStore/MDUT/commit/d9af1b1c645cc309787a45ad833d645123855f91",
"keyword": "SafeGroceryStore/MDUT"
},
{
"link": "https://api.github.com/Vme18000yuan/FreePOC",
"name": "Vme18000yuan/FreePOC",
"updated_at": "2024-07-02T13:28:19Z",
"description": "Add files via upload",
"author": "Vme18000yuan",
"link_2": "https://github.com/Vme18000yuan/FreePOC/commit/7511d7967781b5ae770c62b52a4c3c2930d19a79",
"keyword": "Vme18000yuan/FreePOC"
},
{
"link": "https://api.github.com/wy876/POC",
"name": "wy876/POC",
"updated_at": "2025-01-07T07:14:02Z",
"description": "Update README.md",
"author": "wy876",
"link_2": "https://github.com/wy876/POC/commit/9eefec0a4c311a412a86ab83bef3a25d3cb1766d",
"keyword": "wy876/POC"
} }
] ]

View File

@ -2,604 +2,10 @@
{ {
"link": "https://github.com/su18/POC", "link": "https://github.com/su18/POC",
"name": "POC", "name": "POC",
"created_at": "2025-01-08T01:56:47Z", "created_at": "2023-01-08T01:56:47Z",
"description": "收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了1400多个poc/exp长期更新。", "description": "收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了1400多个poc/exp长期更新。",
"author": "su18", "author": "su18",
"language": null, "language": null,
"keyword": "su18" "keyword": "su18"
},
{
"link": "https://github.com/su18/woodpecker-plugin-template",
"name": "woodpecker-plugin-template",
"created_at": "2024-12-13T08:47:27Z",
"description": "woodpecker-plugin-template",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/closure-compiler",
"name": "closure-compiler",
"created_at": "2024-12-08T05:13:17Z",
"description": "A JavaScript checker and optimizer.",
"author": "su18",
"language": "Java",
"keyword": "su18"
},
{
"link": "https://github.com/su18/CVE-2022-25845-In-Spring",
"name": "CVE-2022-25845-In-Spring",
"created_at": "2024-11-08T08:24:12Z",
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/CTF-NetA",
"name": "CTF-NetA",
"created_at": "2024-10-09T07:46:31Z",
"description": "CTF-NetA是一款专门针对CTF比赛的网络流量分析工具可以对常见的网络流量进行分析快速自动获取flag。",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/jattach",
"name": "jattach",
"created_at": "2024-06-20T08:32:52Z",
"description": "JVM Dynamic Attach utility",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/java-memshell-generator",
"name": "java-memshell-generator",
"created_at": "2024-06-03T03:05:00Z",
"description": "一款支持高度自定义的 Java 内存马生成工具",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/ISC2022Code",
"name": "ISC2022Code",
"created_at": "2024-05-16T11:02:28Z",
"description": null,
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/playframework",
"name": "playframework",
"created_at": "2024-04-10T09:35:50Z",
"description": "The Community Maintained High Velocity Web Framework For Java and Scala.",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/ChatGPT-Next-Web",
"name": "ChatGPT-Next-Web",
"created_at": "2024-04-10T03:18:11Z",
"description": "A cross-platform ChatGPT/Gemini UI (Web / PWA / Linux / Win / MacOS). 一键拥有你自己的跨平台 ChatGPT/Gemini 应用。",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/BeichenDream/EfsPotato",
"name": "EfsPotato",
"created_at": "2023-03-07T06:59:27Z",
"description": "Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).",
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/GodzillaPayload",
"name": "GodzillaPayload",
"created_at": "2023-02-14T09:38:20Z",
"description": null,
"author": "BeichenDream",
"language": null,
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/SharpTinyArgParser",
"name": "SharpTinyArgParser",
"created_at": "2022-12-27T08:05:38Z",
"description": null,
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/GodPotato",
"name": "GodPotato",
"created_at": "2022-12-23T14:37:00Z",
"description": null,
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/JDR",
"name": "JDR",
"created_at": "2022-12-05T10:55:58Z",
"description": null,
"author": "BeichenDream",
"language": "Java",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/PrintNotifyPotato",
"name": "PrintNotifyPotato",
"created_at": "2022-12-02T06:21:02Z",
"description": "PrintNotifyPotato",
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/HackBrowserData",
"name": "HackBrowserData",
"created_at": "2022-11-28T15:15:33Z",
"description": "Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。",
"author": "BeichenDream",
"language": "Go",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/GodzillaMemoryShellProject.NET",
"name": "GodzillaMemoryShellProject.NET",
"created_at": "2022-11-26T14:41:38Z",
"description": null,
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/ISC2022Code",
"name": "ISC2022Code",
"created_at": "2022-08-02T06:06:34Z",
"description": null,
"author": "BeichenDream",
"language": "Java",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/GodzillaMemoryShellProject",
"name": "GodzillaMemoryShellProject",
"created_at": "2022-07-14T17:34:48Z",
"description": null,
"author": "BeichenDream",
"language": "Java",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/phith0n/conote-docs",
"name": "conote-docs",
"created_at": "2024-10-01T02:03:22Z",
"description": "redirect to https://conote.vulhub.org",
"author": "phith0n",
"language": "HTML",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/tls_proxy",
"name": "tls_proxy",
"created_at": "2024-08-16T13:34:29Z",
"description": "A lightweight reverse proxy server that converts TLS traffic to TCP, allowing secure communication between clients and upstream servers.",
"author": "phith0n",
"language": "Go",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/conote",
"name": "conote",
"created_at": "2024-08-11T18:30:09Z",
"description": "All in one cybersecurity utility platform.",
"author": "phith0n",
"language": "JavaScript",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/go_sampler",
"name": "go_sampler",
"created_at": "2023-11-24T10:06:01Z",
"description": "A sample for Go project",
"author": "phith0n",
"language": "Go",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/lo",
"name": "lo",
"created_at": "2023-11-22T11:34:35Z",
"description": "💥 A Lodash-style Go library based on Go 1.18+ Generics (map, filter, contains, find...)",
"author": "phith0n",
"language": null,
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/vueinfo",
"name": "vueinfo",
"created_at": "2023-08-28T10:55:48Z",
"description": "Extract website information from Vue",
"author": "phith0n",
"language": "JavaScript",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/goattribute",
"name": "goattribute",
"created_at": "2023-05-03T18:42:11Z",
"description": "goattribute is a lightweight Go library that allows you to set (and get) attributes of a struct dynamically, using dot notation (e.g., `a.b.c`).",
"author": "phith0n",
"language": "Go",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/vue3-cookiecutter",
"name": "vue3-cookiecutter",
"created_at": "2023-03-23T16:35:05Z",
"description": "template for vue3 + vite",
"author": "phith0n",
"language": "SCSS",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/race-condition-playground",
"name": "race-condition-playground",
"created_at": "2023-03-18T11:38:13Z",
"description": "Playground for Race Condition attack",
"author": "phith0n",
"language": "Python",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/gin",
"name": "gin",
"created_at": "2022-12-24T19:46:06Z",
"description": "Gin is a HTTP web framework written in Go (Golang). It features a Martini-like API with much better performance -- up to 40 times faster. If you need smashing performance, get yourself some Gin.",
"author": "phith0n",
"language": null,
"keyword": "phith0n"
},
{
"link": "https://github.com/zhzyker/microwaveo",
"name": "microwaveo",
"created_at": "2023-11-02T01:47:22Z",
"description": "将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/Dict",
"name": "Dict",
"created_at": "2023-09-12T05:16:27Z",
"description": "一些弱口令、fuzz字典",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/Research",
"name": "Research",
"created_at": "2023-07-28T10:14:20Z",
"description": "Research analysis",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/GobyVuls",
"name": "GobyVuls",
"created_at": "2023-04-07T02:49:25Z",
"description": "Vulnerabilities of Goby supported with exploitation.",
"author": "zhzyker",
"language": "Go",
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/titan",
"name": "titan",
"created_at": "2023-01-09T02:30:51Z",
"description": "Titan: A generic user defined reflective DLL for Cobalt Strike",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/debian-media-box",
"name": "debian-media-box",
"created_at": "2022-12-14T02:40:45Z",
"description": "“Debian 小药盒”,一个用来包装 Debian 安装介质的盒子设计和介绍用的说明书。",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/linux-exploit-suggester",
"name": "linux-exploit-suggester",
"created_at": "2022-09-29T03:10:04Z",
"description": "Linux privilege escalation auditing tool",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/Log4j2Passive",
"name": "Log4j2Passive",
"created_at": "2022-07-12T09:29:07Z",
"description": "Log4j2 RCE Passive Scanner plugin for BurpSuite",
"author": "zhzyker",
"language": "Java",
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/loading",
"name": "loading",
"created_at": "2022-07-01T00:56:40Z",
"description": "A collection of highly customisable loading bars for Go CLI apps.",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/JNDIExploit",
"name": "JNDIExploit",
"created_at": "2022-04-19T07:50:20Z",
"description": "对原版https://github.com/feihong-cs/JNDIExploit 进行了实用化修改",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/lijiejie/MisConfig_HTTP_Proxy_Scanner",
"name": "MisConfig_HTTP_Proxy_Scanner",
"created_at": "2023-04-17T11:50:13Z",
"description": "The scanner helps to scan misconfigured reverse proxy servers and misconfigured forward proxy servers",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/EasyPen",
"name": "EasyPen",
"created_at": "2022-08-22T12:54:41Z",
"description": "EasyPen is a GUI program which helps pentesters do target discovery, vulnerability scan and exploitation",
"author": "lijiejie",
"language": "JavaScript",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/lijiejie",
"name": "lijiejie",
"created_at": "2022-04-04T15:58:41Z",
"description": null,
"author": "lijiejie",
"language": null,
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/eyes.sh",
"name": "eyes.sh",
"created_at": "2022-03-31T14:41:00Z",
"description": "Optimized DNS/HTTP Log Tool for pentesters, faster and easy to use.",
"author": "lijiejie",
"language": "HTML",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/log4j2_vul_local_scanner",
"name": "log4j2_vul_local_scanner",
"created_at": "2021-12-20T12:07:41Z",
"description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/swagger-exp",
"name": "swagger-exp",
"created_at": "2021-03-23T06:46:21Z",
"description": "A Swagger API Exploit",
"author": "lijiejie",
"language": "JavaScript",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/idea_exploit",
"name": "idea_exploit",
"created_at": "2019-05-29T12:21:46Z",
"description": "Gather sensitive information from (.idea) folder for pentesters",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/struts2_045_scan",
"name": "struts2_045_scan",
"created_at": "2017-04-06T06:19:33Z",
"description": "Struts2-045 Scanner",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/ds_store_exp",
"name": "ds_store_exp",
"created_at": "2017-01-24T11:48:50Z",
"description": "A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/BBScan",
"name": "BBScan",
"created_at": "2015-11-13T07:41:10Z",
"description": "A fast vulnerability scanner helps pentesters pinpoint possibly vulnerable targets from a large number of web servers",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/projectdiscovery/nuclei-templates-ai",
"name": "nuclei-templates-ai",
"created_at": "2024-12-04T01:46:51Z",
"description": "Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage 👾",
"author": "projectdiscovery",
"language": null,
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/nuclei-templates-test",
"name": "nuclei-templates-test",
"created_at": "2024-11-18T10:30:37Z",
"description": "Nuclei Templates test",
"author": "projectdiscovery",
"language": null,
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/defcon32",
"name": "defcon32",
"created_at": "2024-08-10T20:20:33Z",
"description": "Defcon 32 Workshop setup and info",
"author": "projectdiscovery",
"language": null,
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/actions",
"name": "actions",
"created_at": "2024-08-01T17:26:30Z",
"description": "ProjectDiscovery's Composite Actions",
"author": "projectdiscovery",
"language": "Shell",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/goleak",
"name": "goleak",
"created_at": "2024-07-29T21:42:01Z",
"description": "Goroutine leak detector",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/tunnelx",
"name": "tunnelx",
"created_at": "2024-07-12T15:19:31Z",
"description": "TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/urlfinder",
"name": "urlfinder",
"created_at": "2024-04-30T13:41:12Z",
"description": "A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/machineid",
"name": "machineid",
"created_at": "2024-02-26T14:39:38Z",
"description": "Get the unique machine id of any host (without admin privileges)",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/tldfinder",
"name": "tldfinder",
"created_at": "2024-01-30T16:27:23Z",
"description": "A streamlined tool for discovering private TLDs for security research.",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/go-smb2",
"name": "go-smb2",
"created_at": "2024-01-29T17:49:59Z",
"description": "SMB2/3 client library written in Go.",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/HavocFramework/community-plugins",
"name": "community-plugins",
"created_at": "2024-08-03T17:42:20Z",
"description": "Repository for community provided Havoc plugins",
"author": "HavocFramework",
"language": null,
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/Website",
"name": "Website",
"created_at": "2022-11-17T18:45:29Z",
"description": "source for https://havocframework.com",
"author": "HavocFramework",
"language": "HTML",
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/.github",
"name": ".github",
"created_at": "2022-09-30T16:01:23Z",
"description": null,
"author": "HavocFramework",
"language": null,
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/havoc-py",
"name": "havoc-py",
"created_at": "2022-09-11T20:07:26Z",
"description": "Havoc python api",
"author": "HavocFramework",
"language": "Python",
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/Havoc",
"name": "Havoc",
"created_at": "2022-09-11T13:21:16Z",
"description": "The Havoc Framework",
"author": "HavocFramework",
"language": "Go",
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/Talon",
"name": "Talon",
"created_at": "2022-09-11T02:23:22Z",
"description": "(Demo) 3rd party agent for Havoc ",
"author": "HavocFramework",
"language": "C",
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/Modules",
"name": "Modules",
"created_at": "2022-09-08T14:45:08Z",
"description": "Modules used by the Havoc Framework",
"author": "HavocFramework",
"language": "C",
"keyword": "HavocFramework"
} }
] ]

View File

@ -1,72 +1,72 @@
[ [
{ {
"guid": "https://forum.butian.net/share/4011", "guid": "https://forum.butian.net/share/4191",
"title": "结合阿里云通义灵码辅助新手小白快速代码审计的最佳实践", "title": "从域认证协议以及密码凭据机制的角度来看内网渗透",
"description": "本文介绍了作者在数据安全比赛中遇到的一个开源框架的代码审计过程。作者使用了多种工具特别是“通义灵码”帮助发现了多个高危漏洞包括路径遍历、文件上传、目录删除、SQL注入和XSS漏洞。文章详细描述了如何利用这些工具进行漏洞定位和验证并分享了使用“通义灵码”的心得和体验。最后作者总结了AI在代码审计中的优势和不足并展望了未来的发展方向。", "description": "本文记录了内网渗透中主机之间的认证以及横向,域渗透相关的协议以及思路的多种方式,",
"source": "subject", "source": "subject",
"pubDate": "2025-01-06 10:00:00" "pubDate": "2025-03-14 09:00:00"
}, },
{ {
"guid": "https://forum.butian.net/share/4002", "guid": "https://forum.butian.net/share/4181",
"title": "Windows进程", "title": "XSS防御-揭秘Unicode溢出与CSP Bypass",
"description": "进程这个观念我们现在都已经很熟悉了,进程是一个程序的运行实例,进程我们可以看做是操作系统为应用程序提供的资源容器,比如内存空间,文件句柄,设备以及网络连接等等。", "description": "Unicode溢出与CSP Bypass",
"source": "subject", "source": "subject",
"pubDate": "2025-01-06 09:00:02" "pubDate": "2025-03-13 09:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/3992", "guid": "https://forum.butian.net/share/4170",
"title": "一次窃取程序的恶意样本分析", "title": "一次渗透过程中的CVE-2022-45460撞洞RCE",
"description": "一次窃取程序的恶意样本分析", "description": "在一次渗透中我们遇到了雄迈XiongMai的uc-httpd这是一款被全球无数网络摄像机使用的轻量级Web服务器。根据Shodan的数据大约有7万个该软件的实例在互联网上公开暴露。尽管这款软件存在严...",
"source": "subject", "source": "subject",
"pubDate": "2025-01-03 10:00:00" "pubDate": "2025-03-12 09:00:02"
}, },
{ {
"guid": "https://forum.butian.net/share/3993", "guid": "https://forum.butian.net/share/4190",
"title": "Sodinokibi详细分析", "title": "记一次某大厂csrf漏洞通过蠕虫从低危到高危",
"description": "一、基本信息\r\nREvil也被称为Sodinokibi或简称Sodin它在2019年4月被首次发现。这种恶意软件会在感染了用户的电脑后加密文件并删除任何留下的赎金提示信息。这些消息会告知受害者必须支付一...", "description": "本文记载了笔者src漏洞挖掘的经历如何将一个简单的csrf提高至高危的程度",
"source": "subject", "source": "subject",
"pubDate": "2025-01-03 09:00:00" "pubDate": "2025-03-11 09:00:00"
}, },
{ {
"guid": "https://forum.butian.net/share/4006", "guid": "https://forum.butian.net/share/4168",
"title": "代码审计 - MCMS v5.4.1 0day挖掘", "title": "掌握Django隐秘漏洞构建内存马实现命令执行",
"description": "记一次 MCMS v5.4.1 代码审计,编号为 CVE-2024-42990&CVE-2024-42991。本文由笔者首发于先知社区的技术文章板块https://xz.aliyun.com/t/16630", "description": "内存马作为一种常见的攻击与权限维持手段往往多见于Java Web应用中Django在日常开发中使用频率较高的框架今天来探寻在Python Web场景下的内存马",
"source": "subject", "source": "subject",
"pubDate": "2025-01-02 10:00:00" "pubDate": "2025-03-10 17:38:25"
}, },
{ {
"guid": "https://forum.butian.net/share/3991", "guid": "https://forum.butian.net/share/4134",
"title": "lighttpd溢出漏洞构造ROP链", "title": "使用分支对抗进行webshell bypass",
"description": "前几天打了下强网杯决赛,想着分享一下思路", "description": "使用分支对抗进行webshell bypass",
"source": "subject", "source": "subject",
"pubDate": "2025-01-02 09:00:01" "pubDate": "2025-03-10 11:17:55"
}, },
{ {
"guid": "https://forum.butian.net/share/4017", "guid": "https://forum.butian.net/share/4162",
"title": "文件读取漏洞实战利用", "title": "论如何从发现者视角看 apache solr 的 js 代码执行漏洞",
"description": "实战场景下的两个任意文件读取漏洞利用。", "description": "平时分析和复现了很多 cve但是一遇到逻辑稍微复杂的漏洞通告给的位置不是很详细的代码 diff 很冗杂的,分析起来就会很困难,然后这时候其实就是需要耐心和思维逻辑了,这次花了接近一周的时间来了解这个漏洞,其实这个漏洞倒是不重要,就是逼着自己去锻炼思维和看官方文档的能力,让自己尽量接近发现者的视角,虽然这个漏洞很老,但是我还是感觉发现它的人真的很厉害,前后的分析过程也是花费了整整一周",
"source": "subject", "source": "subject",
"pubDate": "2024-12-31 10:00:02" "pubDate": "2025-03-10 10:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/3970", "guid": "https://forum.butian.net/share/4171",
"title": "挖矿病毒处置总结", "title": "vaadin反序列化链挖掘tabby静态分析实践",
"description": "处理过的挖矿病毒隐藏自身的方式总结及处置方法总结", "description": "在学习前面几条链子的基础上结合静态分析工具在前面的基础上的一些小发现包括vaadin的新利用方式以及对tabby的检测缺陷的总结",
"source": "subject", "source": "subject",
"pubDate": "2024-12-31 09:00:00" "pubDate": "2025-03-07 09:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/3968", "guid": "https://forum.butian.net/share/4178",
"title": "一些vmpwn的详细总结", "title": "Tomcat内存马之Upgrade构建调试分析",
"description": "总结一些常见vmpwn题的打法数据越界泄露libc通过偏移数据处理来得到危险函数地址等常见漏洞会结合两道例题来进行讲解", "description": "在现今攻防演练日趋常态化和网络安全检测设备检测技术越来越成熟的大环境下,传统的以文件形式驻留的后门文件极其容易检测查杀到,随之\"内存马\"技术开始登上历史的舞台。在JAVA安全知识体系中JAVA内存马也是必须要学习的一个关键板块本篇文章主要介绍Tomcat-Upgrade型内存马",
"source": "subject", "source": "subject",
"pubDate": "2024-12-30 10:00:01" "pubDate": "2025-03-06 09:00:02"
}, },
{ {
"guid": "https://forum.butian.net/share/3955", "guid": "https://forum.butian.net/share/4173",
"title": "样本分析formbook 恶意软件浅析", "title": ".Net Core下的内存马",
"description": "样本\r\nIOC\r\nMD5749dfc8bf52422ce77ed59a60c2f395e\r\nSHA1d0593187a473a19564a67819050023c9144b30c2\r\nSHA256 5c205cffc83f7be274773fb1c3aa356b29d97e4d62a83e79c5fd52eadc3ed695\r\n概述\r\n语言C...", "description": "在审计了一套.net core的CMS后的扩展延伸",
"source": "subject", "source": "subject",
"pubDate": "2024-12-30 09:00:01" "pubDate": "2025-03-05 09:00:00"
} }
] ]

View File

@ -1,122 +1,122 @@
[ [
{ {
"title": "基于差分隐私的检索增强生成\n", "title": "机器学习的逻辑回归模型\n",
"link": "https://paper.seebug.org/3265/", "link": "https://paper.seebug.org/3303/",
"description": "作者Nicolas Grislain\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2412.19291v1#Sx4\n摘要\n检索增强生成Retrieval-Augmented Generation, RAG已成为为大型语言模型Large Language Models, LLM提供最新且相关上下文的主流技术。这一技术可以缓解模型生成不准确...\n", "description": "\n\n\n .katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日\n1. 前言\n在「机器学习的线性回归模型」文章中我们学习了监督学习中如何使用线性回归模型拟合连...\n",
"pubDate": "Thu, 02 Jan 2025 07:44:00 +0000", "pubDate": "Thu, 13 Mar 2025 07:37:00 +0000",
"guid": "https://paper.seebug.org/3265/", "guid": "https://paper.seebug.org/3303/",
"category": "AI安全" "category": "AI安全"
}, },
{ {
"title": "Qemu重入漏洞梳理 & CVE-2024-3446分析\n", "title": "「深蓝洞察」2024年度最憋屈的漏洞披露\n",
"link": "https://paper.seebug.org/3264/", "link": "https://paper.seebug.org/3304/",
"description": "作者:华为安全应急响应中心\n原文链接https://mp.weixin.qq.com/s/gWK5JwzLz8qdfG4VUJqVhA\n1 简介\n主要是分析CVE-2024-3446漏洞的成因和漏洞的补丁以及之前的补丁为何失效顺便对Qemu历史重入漏洞进行了分析梳理\n2 时间线\n\n\n2020/07/21 e1000e重入导致的UAF还没归为重入问题\n\n\n2021/08/23 重入漏...\n", "description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/Y8-wT88VnLeMUiD-HssPyw\n在网络安全领域漏洞披露一直被视为保护用户的重要环节但在现实中这一过程却充满了争议和矛盾。究竟什么才算得上“负责任的披露”当厂商在信息公开和补丁发布上占据主导地位而安全研究者则需要耗费大量精力进行沟通与博弈这一模式是否还能真正实现保护用户安全的初衷...\n",
"pubDate": "Mon, 30 Dec 2024 07:35:00 +0000", "pubDate": "Wed, 12 Mar 2025 08:28:00 +0000",
"guid": "https://paper.seebug.org/3264/", "guid": "https://paper.seebug.org/3304/",
"category": "漏洞分析"
},
{
"title": "使用开源大语言模型将安全通告与易受攻击的函数配对\n",
"link": "https://paper.seebug.org/3263/",
"description": "作者Trevor Dunlap, John Speed Meyers, Bradley Reaves, and William Enck.\n译者知道创宇404实验室翻译组\n原文链接https://www.enck.org/pubs/dunlap-dimva24.pdf\n摘要\n随着对开源软件依赖性的需求不断增加管理这些依赖中的安全漏洞变得愈加复杂。当前最先进的工业工具通过代码的可达性分...\n",
"pubDate": "Mon, 30 Dec 2024 06:34:00 +0000",
"guid": "https://paper.seebug.org/3263/",
"category": "AI安全"
},
{
"title": "假 Zoom 会议钓鱼分析\n",
"link": "https://paper.seebug.org/3262/",
"description": "作者Reborn, Lisa@慢雾安全团队\n原文链接https://mp.weixin.qq.com/s/bPGbEdTCKaM9uJhaRXlO6A\n背景\n近期X 上多位用户报告了一种伪装成 Zoom 会议链接的钓鱼攻击手法,其中一受害者在点击恶意 Zoom 会议链接后安装了恶意软件,导致加密资产被盗,损失规模达百万美元。在此背景下,慢雾安全团队对这类钓鱼事件和攻击手法展开分析,并追...\n",
"pubDate": "Fri, 27 Dec 2024 07:08:00 +0000",
"guid": "https://paper.seebug.org/3262/",
"category": "情报分析"
},
{
"title": "[Agent]WKM在智能代理中注入世界知识\n",
"link": "https://paper.seebug.org/3261/",
"description": "作者:简单的机器学习\n原文链接https://mp.weixin.qq.com/s/2pn3QGLWWbG5yW-G2Ap9Yg\n在面对特定任务时人们往往会首先利用丰富的先验知识在大脑中简要演练整个过程然后再执行无意识的动作。称这种知识为全局任务知识也称为环境/任务常识)。此外,在任务过程中,心智世界知识模型会不断维持一种局部状态知识,代表人类对当前世界状态的认知。例如,想象你在一个...\n",
"pubDate": "Thu, 26 Dec 2024 07:28:00 +0000",
"guid": "https://paper.seebug.org/3261/",
"category": "AI安全"
},
{
"title": "卡巴斯基禁令之后的影响\n",
"link": "https://paper.seebug.org/3260/",
"description": "作者Pedro Umbelino, Jake Olcott\n译者知道创宇404实验室翻译组\n原文链接https://www.bitsight.com/blog/aftermath-kaspersky-ban\n在2024年春全球对供应链风险的担忧日益加剧对技术供应商的信任和可靠性问题也愈发凸显。在这样的背景下美国对俄罗斯的杀毒软件巨头卡巴斯基实验室下了禁令禁止其产品进入美国市场。...\n",
"pubDate": "Wed, 25 Dec 2024 02:52:00 +0000",
"guid": "https://paper.seebug.org/3260/",
"category": "情报分析"
},
{
"title": "以大模型为目标的威胁攻击与安全思考\n",
"link": "https://paper.seebug.org/3259/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/YL37d_PjiFJkarEjcrTdiA\n一、概 述\n自2023年以来以ChatGPT为代表的大语言模型LLM向人们展现出了人工智能所具有的无限潜力为各行业带来了全新的发展模式和生产力提升。以大语言模型为基础的智能平台及系统也逐渐成为国家和企业的一种重要的基础设施面对这样一种全新的基础设施...\n",
"pubDate": "Mon, 23 Dec 2024 08:21:00 +0000",
"guid": "https://paper.seebug.org/3259/",
"category": "AI安全"
},
{
"title": "趋利避害的大模型行为:伪对齐\n",
"link": "https://paper.seebug.org/3258/",
"description": "作者Ryan Greenblatt, Carson Denison等\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/abs/2412.14093v1\n摘要\n我们在此呈现了一项关于大型语言模型在训练过程中进行“对齐伪装”行为的演示该模型有选择地遵从其训练目标以防止其行为在训练之外被改变。具体来说我们首先向Claude 3 Opus模型提供了一个系统提示...\n",
"pubDate": "Mon, 23 Dec 2024 03:06:00 +0000",
"guid": "https://paper.seebug.org/3258/",
"category": "AI安全"
},
{
"title": "找出披着羊皮的狼:通过文本摘要技术破解对抗性文本到图像提示\n",
"link": "https://paper.seebug.org/3257/",
"description": "作者Portia Cooper, Harshita Narnoli, Mihai Surdeanu\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/pdf/2412.12212\n摘要\n文本到图像模型常常遭受一种称为“分而治之攻击”DACA的逐步攻击该攻击通过大型语言模型将敏感文本包装在看似无害的叙述中以隐藏不当内容。为了有效抵御这种逐步DACA攻击...\n",
"pubDate": "Fri, 20 Dec 2024 07:43:00 +0000",
"guid": "https://paper.seebug.org/3257/",
"category": "AI安全"
},
{
"title": "探索 AI 驱动的网络安全框架深度学习技术、GPU 支持和未来增强\n",
"link": "https://paper.seebug.org/3255/",
"description": "作者Tobias Becher, Simon Torka\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/pdf/2412.12648\n摘要\n传统的基于规则的网络安全系统在防御已知恶意软件方面表现出色但面对新型威胁它们却显得力不从心。为应对这一挑战新一代网络安全系统开始融合人工智能技术尤其是深度学习算法以提升其识别事件、分析警报和响应安全事件的能力...\n",
"pubDate": "Fri, 20 Dec 2024 01:14:00 +0000",
"guid": "https://paper.seebug.org/3255/",
"category": "AI安全"
},
{
"title": "Apache Struts2 文件上传逻辑绕过(CVE-2024-53677)(S2-067)\n",
"link": "https://paper.seebug.org/3256/",
"description": "作者y4tacker\n原文链接https://y4tacker.github.io/2024/12/16/year/2024/12/Apache-Struts2-文件上传逻辑绕过-CVE-2024-53677-S2-067/\n前言\nApache官方公告又更新了一个Struts2的漏洞考虑到很久没有发无密码的博客了再加上漏洞的影响并不严重因此公开分享利用的思路。\n分析\n影响版本\nSt...\n",
"pubDate": "Thu, 19 Dec 2024 08:37:00 +0000",
"guid": "https://paper.seebug.org/3256/",
"category": "漏洞分析"
},
{
"title": "越狱破解马斯克最新AI-Grok2揭秘特朗普赢得大选背后AI的推波助澜\n",
"link": "https://paper.seebug.org/3254/",
"description": "作者洺熙米斯特Ai安全组核心成员\n原文链接https://mp.weixin.qq.com/s/thSJwKA7RbEueQ7iYsThFQ\n序言\n你可曾想过马斯克的Ai Grok2大脑里究竟藏着什么秘密\n本文将带你潜入X平台最新AI模型Grok2的“大脑”通过对其核心指令——系统Prompt的深度解码揭开马斯克打造的这款AI的神秘面纱\n我们将一起探索\n\n从越狱谷歌Gemi...\n",
"pubDate": "Wed, 18 Dec 2024 06:02:00 +0000",
"guid": "https://paper.seebug.org/3254/",
"category": "AI安全"
},
{
"title": "AI 作为新型黑客:开发进攻性安全代理\n",
"link": "https://paper.seebug.org/3253/",
"description": "作者Leroy Jacob Valencia\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/pdf/2406.07561\n摘要\n在网络安全这一宏大领域内由防御性措施向主动防御的转变对于守护数字基础设施的安全至关重要。本文深入探讨了AI在主动防御网络安全中的角色尤其是通过研发一个名为ReaperAI的独立AI代理该代理被设计来模拟和实施网络攻击。借助于...\n",
"pubDate": "Fri, 13 Dec 2024 07:50:00 +0000",
"guid": "https://paper.seebug.org/3253/",
"category": "AI安全"
},
{
"title": "Qwen2.5-Coder 技术报告\n",
"link": "https://paper.seebug.org/3252/",
"description": "公众号:简单的机器学习\n原文链接https://mp.weixin.qq.com/s/EiV7x403sVqVcABo_qd2kg\n引言\nQwen2.5-Coder 系列是阿里巴巴团队推出的一款重要的代码生成模型,相比其前代 CodeQwen1.5该系列在多个方面进行了显著的升级。Qwen2.5-Coder 系列包括两个模型Qwen2.5-Coder-1.5B 和 Qwen2.5-Co...\n",
"pubDate": "Wed, 11 Dec 2024 16:46:00 +0000",
"guid": "https://paper.seebug.org/3252/",
"category": "经验心得" "category": "经验心得"
}, },
{ {
"title": "Qwen2 源码阅读——核心代码跟读\n", "title": "「深蓝洞察」2024年度最“安全”的防线\n",
"link": "https://paper.seebug.org/3251/", "link": "https://paper.seebug.org/3302/",
"description": "公众号:简单的机器学习\n原文链接https://mp.weixin.qq.com/s/PVSPNfv0I8_cxgPTmOes5w\n我们继续使用上一节使用的样例文本\n[&amp;quot;你好啊&amp;quot;, &amp;quot;简单的机器学习是为了让机器学习变得更简单而存在的&amp;quot;]\n\n\n这个样例产生的tokens结果为\n{&#39;input_ids&#39;: tensor([[108386, 10392...\n", "description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/LaM5iz_EKbAK_lkaAcBshw\n在攻防对抗日益激烈的2024年安全软件一直被视为企业安全防线的重要基石。然而这些安全软件本身也可能存在漏洞甚至被攻击者利用作为入侵的跳板来对用户造成危害。多年来因为安全软件而导致的事故不禁让人产生一个疑问——安全软件真的可信吗\n安全软件被滥用为攻击工...\n",
"pubDate": "Wed, 11 Dec 2024 16:45:00 +0000", "pubDate": "Tue, 11 Mar 2025 08:39:00 +0000",
"guid": "https://paper.seebug.org/3251/", "guid": "https://paper.seebug.org/3302/",
"category": "经验心得"
},
{
"title": "「深蓝洞察」2024年度最难以阻挡的攻防趋势\n",
"link": "https://paper.seebug.org/3301/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/lUA03YjBiCAatcJh-bUHEQ\n近年来漏洞攻防不断演进。从多年前仅需一个栈溢出就能攻破系统到如今需要运用各种精妙的手法来突破系统的层层防御。“盾”与“矛”始终处于动态对抗每当新的防御措施出现新的攻击手段随之而来。防御机制的升级促使攻击者寻找新的突破口而攻击方法的创新又推动着防御技术...\n",
"pubDate": "Mon, 10 Mar 2025 08:19:00 +0000",
"guid": "https://paper.seebug.org/3301/",
"category": "经验心得"
},
{
"title": "机器学习的线性回归模型\n",
"link": "https://paper.seebug.org/3300/",
"description": "\n\n\n .katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\n跟随着 ChatGPT 等大语言模型掀起的人工智能的浪潮,在这个时间点学习 A...\n",
"pubDate": "Fri, 07 Mar 2025 07:22:00 +0000",
"guid": "https://paper.seebug.org/3300/",
"category": "AI安全"
},
{
"title": "Llama 的悖论:深入探索 Llama.cpp 的堆迷宫,从堆溢出到远程代码执行\n",
"link": "https://paper.seebug.org/3299/",
"description": "作者Patrick Peng \n译者知道创宇404实验室翻译组\n原文链接https://retr0.blog/blog/llama-rpc-rce\n我一直对 Llama.cpp 情有独钟,它堪称我在人工智能与机器学习研究领域孜孜以求的“终极目标”。不仅如此,能在如此复杂且成熟的人工智能项目中挖掘出堆栈/堆溢出导致的远程代码执行漏洞,听起来就格外酷炫。当然,我内心深处渴望在人工智能项目中...\n",
"pubDate": "Thu, 06 Mar 2025 06:27:00 +0000",
"guid": "https://paper.seebug.org/3299/",
"category": "漏洞分析"
},
{
"title": "Emoji攻击增强针对Judge LLMs检测的越狱攻击\n",
"link": "https://paper.seebug.org/3297/",
"description": "作者Zhipeng Wei, Yuqi Liu, N. Benjamin Erichson\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2411.01077v2\n摘要\n越狱Jailbreaking技术可以欺骗大型语言模型LLMs使其生成受限制的输出从而构成严重威胁。其中一种防御方法是使用另一个 LLM 作为 Judge裁判来评估...\n",
"pubDate": "Tue, 04 Mar 2025 09:37:00 +0000",
"guid": "https://paper.seebug.org/3297/",
"category": "AI安全"
},
{
"title": "模型序列化攻击\n",
"link": "https://paper.seebug.org/3298/",
"description": "译者知道创宇404实验室翻译组\n原文链接https://github.com/protectai/modelscan/blob/main/docs/model_serialization_attacks.md\n机器学习ML模型是基于机器学习的应用程序的核心资产。安全地存储和检索模型对成功至关重要。根据使用的机器学习库模型可以以多种常见格式保存。流行的选择包括Pickle、HDF5...\n",
"pubDate": "Tue, 04 Mar 2025 07:09:00 +0000",
"guid": "https://paper.seebug.org/3298/",
"category": "AI安全"
},
{
"title": "关于 Chat Template 注入方式的学习\n",
"link": "https://paper.seebug.org/3296/",
"description": "作者: dawu@知道创宇404实验室\n日期: 2025年2月28日 \n1. 前言\n伴随着年后 DeepSeek R1 模型的火热,号称能运行 DeepSeek R1 “满血版” 的 Ktransformers 框架也受到了大量关注。在使用该框架和阅读相关源码时,我发现框架在借助聊天模版(chat template) 将用户输入转化为输入模型的 token 列表的过程中,可能会存在类似于拼...\n",
"pubDate": "Mon, 03 Mar 2025 06:35:00 +0000",
"guid": "https://paper.seebug.org/3296/",
"category": "AI安全"
},
{
"title": "从零开始搭建:基于本地 DeepSeek 的 Web 蜜罐自动化识别\n",
"link": "https://paper.seebug.org/3295/",
"description": "作者wh0am1i@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\npocsuite3 框架可以通过 --dork 或 --dork-zoomeye 参数获取 ZoomEye 网络空间测绘平台的搜索引擎数据。但随着近几年网络空间领域的攻防对抗升级导致网络空间中存在大量的蜜罐。为了过滤掉这些蜜罐ZoomEye 中加入了自动标注蜜罐的识别算法, 同时 pocsuite3 ...\n",
"pubDate": "Fri, 28 Feb 2025 06:18:00 +0000",
"guid": "https://paper.seebug.org/3295/",
"category": "AI安全"
},
{
"title": "DeepSeek 启示:深度揭秘基于 PTX 的 GPU 底层优化技术\n",
"link": "https://paper.seebug.org/3294/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/FVVes7UIK_OORUk3fXy9mQ\n一、概述\n近日DeepSeek连续不断地开源了多个项目一时间引发了关于GPU底层优化的热潮这在如今国内算力被广泛打压的背景下给我国在现代高性能计算HPC和人工智能AI领域带来了希望其中尤其引人瞩目的是关于底层PTX优化技术引入这在一定程度...\n",
"pubDate": "Thu, 27 Feb 2025 07:24:00 +0000",
"guid": "https://paper.seebug.org/3294/",
"category": "AI安全"
},
{
"title": "银狐突袭DeepSeek本地化部署暗藏“致命陷阱”\n",
"link": "https://paper.seebug.org/3293/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/VUzwaR7eti2YoNebGFz80A\n一、前言\n近期国产大模型DeepSeek凭借其高效的推理能力、创新性的优化技术、低门槛本地化部署能力、灵活的开源商业授权等迅速成为开源生态中的“现象级选手”。然而技术普及的加速期往往伴随着网络安全攻防对抗的升级。当前大量政府、企业和个人开发者在基于D...\n",
"pubDate": "Thu, 27 Feb 2025 02:47:00 +0000",
"guid": "https://paper.seebug.org/3293/",
"category": "AI安全"
},
{
"title": "使用 DeepSeek-R1 在固件漏洞挖掘领域的新实践\n",
"link": "https://paper.seebug.org/3292/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/rZ4iGXs2O_xYD1yEOyu3CQ\n1. 前言\n在数字化时代固件是硬件设备的核心软件组件直接控制着硬件的运行状态和功能其安全性至关重要。一旦固件存在安全漏洞黑客即可利用来攻击设备的运行或者控制设备发起其它网络攻击典型有Mirai病毒利用设备固件漏洞发起大规模的分布式拒绝服务。因此挖...\n",
"pubDate": "Wed, 26 Feb 2025 07:20:00 +0000",
"guid": "https://paper.seebug.org/3292/",
"category": "AI安全"
},
{
"title": "Fuzz 工作流解析与 AI 引入方案分享\n",
"link": "https://paper.seebug.org/3291/",
"description": "作者ghost461@知道创宇404实验室\n时间2025年2月26日\n本文为知道创宇404实验室内部分享沙龙“404 Open Day”的议题内容作为目前团队AI安全研究系列的一部分分享出来与大家一同交流学习。\n1. 概述\n本文受 Google 安全博客的《Leveling Up Fuzzing: Finding more vulnerabilities with AI》启发结合自...\n",
"pubDate": "Wed, 26 Feb 2025 06:10:00 +0000",
"guid": "https://paper.seebug.org/3291/",
"category": "AI安全"
},
{
"title": "「深蓝洞察」2024年度最悲剧的后门\n",
"link": "https://paper.seebug.org/3290/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/BZtSTpTQbNiAY_KDhnqc8Q\n“看到了软件的源码就意味着没有后门吗”\n1983年的图灵奖颁奖仪式上Ken Thompson抛出了这个问题。作为历史上唯三在40岁以下获得图灵奖的传奇之一他在获奖演讲中向听众展示了如何通过在编译器中植入后门来骇入由无害源码编译得到的Unix系统。Ken...\n",
"pubDate": "Tue, 25 Feb 2025 09:17:00 +0000",
"guid": "https://paper.seebug.org/3290/",
"category": "经验心得" "category": "经验心得"
} }
] ]

View File

@ -1,434 +1,413 @@
{ {
"银行测试": [ "银行测试": [
{
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9eGY9uACgt2whpM3uArsKJhtPcW3yngI2os4opoqkJ3CVlyQRDaV_HvuZGgEiqH5qWVyu8f-CdizGGuzUBaUw7bsimoDXdO0tkjwoWmP-IR9FiZxR7Rc1qNIqBowcxeVnIZeM8ubsGmWg6T-TWZRp5hMz8sMk5-v1orwBepw7bhs5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...",
"author": "新华网思客",
"pubDate": "2023-03-16 10:44:22"
},
{ {
"title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元", "title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rhRoqSTHcrfaL8N5x8vCAPh6VHguc5261-VtdLLQb2SJRMcRYLgFVDbbROQWWIBC-knqKSKBUPtL-MHksuAAWCsFtyyOgbRQl0sZD1GQa9Cfclwur7HsaJpxfGUSj8ln68fipKlE57sTgi_-J6M0aPtaUbQMKWkh4GX96hhX83pQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9_kxI_VvZmKgIBPWuqWqxGjP3L13Sx5Z8ue1Bt6fMWTNbF8uHcSw7yotWKb45hPYOaO6s4gjlb4BSJWEIov6vVWlkKRxOU5zRnkoYXaXVF4CL4XDiNBnzLCkPG3h6guywoth2eDg90PDqC7YyxYWm08OGcMk1MyMvIg8f5XKwm5pFH6In5Ei3zg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...", "description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...",
"author": "观八闽", "author": "观八闽",
"pubDate": "2022-02-22 15:30:56" "pubDate": "2022-02-22 15:30:56"
}, },
{
"title": "央行出手!支付宝们正式被“收编”了!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa2JtvXf_rPEpccH-m52xNFMrALDuNbcuJohjag6wQmP4lAKrSKTMipqb8ldk8u-9o_kaDJrPcV6SvbR3k0huRdG13QnEqoTx1_xoKmG6L3Rd4QyYY49B90hCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
"description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...",
"author": "人民网",
"pubDate": "2017-10-17 11:43:30"
},
{
"title": "美联储最新消息!要求银行多备“家底”,特别是→",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbdDtWwd52ceau2FpNciYilkOvNeysKbmy1IfJ5MKkSw_S2HELKfFMbnGqIRBnQB_b5ejG9xDGR1kTcyvEDm34K-3ZBgj81RMxhiB4xSpApRngIpIkHq24uB535pjGOOjYg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
"description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...",
"author": "央视财经",
"pubDate": "2023-07-12 16:15:05"
},
{
"title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9U5OF2ACRxNnLbQxf03q7r8u7XUnVZTeVE4nkSz0PwDTMAjmQuFHTtta7Wr06HIXrWRkZPSoMcd4dcendsmGEdIL1pxyqMm6AO9S6Sq7Sivg9V0SAyE2-JrlQMwu_9WL--z0YjdTGy9qQ4sT_tBFrc3SWY8eHa7foGUB4CxJhmUZQ_LeJW-Rhtg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
"description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...",
"author": "人民网舆情数据中心",
"pubDate": "2022-08-31 19:55:10"
},
{
"title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPawyX6vkab5SGyZCSYCNNMFuUMJFJtJxVjBC_Gn0KWSdVS9hAcGpvlvNiQIiFV3nkm5Xjy9_0IhCcFYPtNahEBZs9ex4arp3ank-D-3IG9F8zlzoMIQrKewA5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
"description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
"author": "人民网",
"pubDate": "2017-05-29 08:02:43"
},
{
"title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rNagPmxwjOE27wtfsirXywKNqtIY_UB-WqOHZguU8Nk00JGnYLXX5uNN56wrmpDKyR25zYI_7M-vy4E2IqX4YAcCCjNjreH6GdMF7d-YKrSG2NkyM0mNfQFQZWPwbdTuVGL8wFNHgbggQCG5y-Dz6m7ah34bClrEHdD_SlPI9xf0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C",
"description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
"author": "新华网思客",
"pubDate": "2023-05-05 13:51:35"
},
{ {
"title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?", "title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9U5OF2ACRxNnLbQxf03q7r8u7XUnVZTeVE4nkSz0PwDTMAjmQuFHTtkOOwpS7QNWZfj7J2d-Sq079RqJaT8mEwlAdtC1V8Q7GGx7o9yI8-RqiWlJXwXx8NYfxl8f0OsKzKXPVRcPnmANCPpfN-KMeE9dsNuMAAZYbfb4hG0uBhTS54z_tGSZTqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9IchiyQiq6LeEKaAPMU9juA1bCFHqCk42rdC7dGu5J0TJV_TSWviegeqZ9YXMeCE_1wsqouY29bLxCPTCe8uqEk8CV1BaKlRyHJGOUCh3xLg9XozB208ctDIH93tc2FnHL_p4NJMsWg5LVTThT-sYBgI8wmJ55I-ygjm-qJq0CU9flztgI7RZ1g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...", "description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...",
"author": "人民网舆情数据中心", "author": "人民网舆情数据中心",
"pubDate": "2017-09-14 08:16:46" "pubDate": "2017-09-14 08:16:46"
}, },
{ {
"title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10", "title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsfy8RImedEk6VgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3xg7PiGc7Ivj3HjkyfweHc4-1qTWZuRONFtzelMgH1Xb1q3oE7vwIwWviUqMB_VCSiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAvgZg6-4mCHKVgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3fwC5XTKkq9kDNJdxFew8RNmF5J1xVuqKMCAHGR_7TST1Ck-cB6ZhGHapdNWZDDb-iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...", "description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...",
"author": "人民网舆情数据中心", "author": "人民网舆情数据中心",
"pubDate": "2017-01-12 17:06:08" "pubDate": "2017-01-12 17:06:08"
}, },
{ {
"title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?", "title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsfy8RImedEk6VgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmMscpQq9cKnWTHcnA0HNPYvhXatOQ_n7twwDNqe9-JiCo5nEI8ooTdukLFRUmb0_nziZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9eGY9uACgt2whpM3uArsKJhtPcW3yngI2os4opoqkJ3CVlyQRDaV_Hro8hmfPwsD9irSLU7ZTXQZPusXiTVPor0eS9LIJKhnse38AsvaT-nG6hJL6b8Kzeyje4PArh_xRW1V5Suf8pEzooHBWUQT7cxZpbLyIjptUldFTpL_yObZ6VKrzu_4XKA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...", "description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
"author": "央视新闻", "author": "新华网思客",
"pubDate": "2017-01-14 16:40:10" "pubDate": "2023-05-05 13:51:35"
}, },
{ {
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?", "title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYgdSqkS15CaGM-st-w9ouw1qXa8Fplpd9rNagPmxwjOE27wtfsirXywKNqtIY_UB-WqOHZguU8Nk00JGnYLXX5mquKHp2P9d4DFHRvtXv0UwBOSo32vP6I6GHRClFzPuDBfOOsMhADRkGt7bFflDASUPd_F6FZAJhgskZj9dPSp7GB15iASPu76Qg4k5dpcBM2S7ZA33ujNZj3x9Nw6p-Fg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=8EC3DD0F824E20B1C0C7EA75A1B82A58C16F166F67871C6C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB0MErXwD6mYx_6V1D09fTT_5d3JnQMhdgHrYwSoI_oc0AiMVx1lwOJ1rVNI_Jhpps3az_iRjW0e4QuAW_QYdi8_rH0mz8XQ2U0luG9iCLg784j_DiAYpueDYl_Q5RRZQjg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...", "description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
"author": "新华网思客", "author": "人民网",
"pubDate": "2023-03-16 10:44:22" "pubDate": "2017-05-29 08:02:43"
},
{
"title": "一家银行最多8个APP!功能交叉重叠,是时候该瘦身了……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd994RykCd99wpOEkXvzxCBzIVUS1LA4FKRqdNCxaFpwnfejFPgpux26ggsJHZMa7xJ7gsX7ZN6JdPWaYdBoLjRwY9SIttIWfKJ4tvsU0VTsoST1rCBrLSNNpFWMnV6TSSUZZaKVHYlDmU51kteFU4c75kSP8zcYxYIrJ-Xg-ls-jvzAjcIGepUqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "“你想买理财产品的话,请先下载注册我们银行的APP.”每当走进银行,这样的场景极为常见.近年来,为了增加获客,手机APP成...",
"author": "中国网财经",
"pubDate": "2019-06-14 17:18:12"
},
{
"title": "今年银行保险业监管工作14大要点:坚决落实“房住不炒”要求 深入推进网络借贷专项整治……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd994RykCd99wpOEkXvzxCBzIVUS1LA4FKRqdNCxaFpwnfejFPgpux26sA3XGUDtx3axmAHlXnZgn7rN8UZh4aW0K-vLb1GPNhF2FXQ3glcrc5YLGgLbZ69GCWpbNclo9q8uWawWGL3Do-Kq9tdkvf-V7gbltH5y0CEk6ESiMI9-6w89kyxDwoXvg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "稳妥处置高风险机构,压实各方责任,全力做好协调、配合和政策指导.继续拆解影子银行,特别要大力压降高风险影子银行业务,防止死灰复燃.坚决落实“房住不炒”要求,严格执行授信集中度等监管规则,严防信贷资金违规流入房地产领域.",
"author": "中国网财经",
"pubDate": "2020-01-12 13:33:01"
},
{
"title": "惊人 | 手机这样充电严重泄露隐私 1秒操控你的银行账户",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAvgZg6-4mCHKVgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0eFifmgfhkzbK3MsPyC4ya4w3uOr8wpkTZe-rcwPrNFQINVjsV5vJ1wOlHEOuNWsLsxmGHQK1jyCZ6MwAG9p7EODSTxKXCJbgrpZDj-zG_ndQ3GsP0o8f2FtAn0-35eJ8OzP63VZ-EaTF4-aXtL55m17xploZKyLyaRGHxSWNMLU7g3Ftgn3b4uiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "但你要小心了,如果不谨慎,一秒就可能控制你的银行账户!测试:手机用充电桩可被操控央视记者做了一个测试,曝光了不法分子通...",
"author": "央视新闻",
"pubDate": "2017-04-16 13:37:16"
} }
], ],
"APP逆向": [ "APP逆向": [
{ {
"title": "AndroidApp常见逆向工具和使用技巧", "title": "AndroidApp常见逆向工具和使用技巧",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzs0BbZ7TK0caiVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AdH1-6NDlA140Gkrz_XK5XBN2W_mfzAo_O1mvY93dg2FnkWDHcnE8vZJ6fmRI7ixUiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAnkQk5xkE8zWVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AR0NI7jhJYTMVcz7PJUxIxodsB_IuTowGyZv6b-_QmuEJE4oYD-Hd2y51bNkKRyRNiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...", "description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...",
"author": "黑白之道", "author": "黑白之道",
"pubDate": "2016-10-26 10:17:15" "pubDate": "2016-10-26 10:17:15"
}, },
{
"title": "一文了解安卓APP逆向分析与保护机制",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVmWR3iyh-E-4ebAWXFj-gdMsdZTotE4jn5p9icW0XZ_hz_lW_RCWS6NHDI5wyCuJsx39aax8AKZqXPcICIPYbxhN-gifK-Orn5VpOExHfwXWxgg-eeXTzVUSYTqT4eyLmA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
"description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
"author": "FreeBuf",
"pubDate": "2018-03-31 18:12:34"
},
{ {
"title": "记某APP登录逆向解密过程", "title": "记某APP登录逆向解密过程",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9II7Vh_mr6GjLFczSpmCFj5fRjzd-z69k9l3xUU8T-UAgP318sWFtg7bVpQUtu0jnX1FTSap7nASbrywFaao_ahDwUGO_xmtrchivfF33Ik0jBk3snXw816lVMm0CHoSnFpS3yJ0UWgvFujz37jCuqJWKuP63a_3ZOWvx9NQnVbJflztgI7RZ1g..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9dW5oQAMZhc7ZBqfiMFLXG0GQTv2lk_XvxV5bo6L_2VOd4t-r5x3pbI1Gx3EPaC8OJkaDwKAihuibfqYjIBScgTBgSQR65GHD1ovgvuYrz1SLBPf7pGpZz4oa7gW5DCyVlBmNg_TQcN2-Xhwn-8fSxrOrI95WfXBN3EzZ8pTvy0INGbbB75bUeA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...", "description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...",
"author": "黑白之道", "author": "黑白之道",
"pubDate": "2024-05-03 08:36:47" "pubDate": "2024-05-03 08:36:47"
}, },
{ {
"title": "FlutterAPP逆向实践", "title": "FlutterAPP逆向实践",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9SS7O9-TOAQq_aytedZw9y-6rqCRj4gJV1R06K_JHUTp249UCALqkex7EbPx7oKq7dCdvtKXouZB_ezLxDwp7u96RqnipBwzJCqZDAP1de3co9zc0QEe7sp4f6elfYRiRlpFa2UTUcwjrsr1Q6TALaEvedV67UlpLI2IxdELttQX6zvkPgoArRQ..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9J_zVaWw2uFg686rt6ZvNVl60K0aBaZDqdFQVXjiv0XhcM1gIerRkPxIxT4lKFS5XT7GwdtE9H4nLgwu6ohgaLTmGcpSyTO8mBlZ-8ML7pptw4tAT8AJhUJTN8HLoTdsqo5mo5LofbMG1GVImin52YaRs1GYXibKaKgMw5X68IbItPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...", "description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...",
"author": "看雪学苑", "author": "看雪学苑",
"pubDate": "2022-07-21 17:59:03" "pubDate": "2022-07-21 17:59:03"
}, },
{ {
"title": "抖音APP逆向:附带抓包与6神算法探索", "title": "一文了解安卓APP逆向分析与保护机制",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9c854Ys4If4OUfsVWxv1m1FOevAHzMpEp-bBVxcGEP4FWu2rRIo5DOiy12-5BsMFNV6Sya2FLqQaBunkDL_vkPmE8h17sIoR-Kc-ztQ_S2-Opa6TnS6aJq1cbrSNYZ9hWDGDWmKJUbXRNcYkVEoeQymnhCGtBRX7pgaIn3-AeUN_zAjcIGepUqA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRCh-UHGD48L7-I7DWkXnEsIObYXDBg3HYEMXqu0K6h8xhcc62DSq_lv4XrzZVrB48gYRCjyCMepFYVz4yijIGRhQ0g40xftK4fVFS2KAtKzPeWCeu4Cz_SU18tPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必...", "description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
"author": "彪哥in讲py", "author": "FreeBuf",
"pubDate": "2025-01-03 13:10:22" "pubDate": "2018-03-31 18:12:34"
},
{
"title": "鸿蒙APP逆向分析工具和方法",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd96k-G4vgcspPLYU-OdVbivgE_1CqqMF6EOxcfbY4fKS8ON2lobS7MG9GkIaxxwqKhQfj3i8aWjoLflkGcsoJz5Yx2qNurMgWx40Et_0YV0tuvMTeUdWc2sGljxh1T3xgl7amCkbHc5mEEEJl7le_KnBGLfqHxFcxgZqH1DD98IO654z_tGSZTqA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "鸿蒙APP逆向分析工具和方法需要结合专用工具与开发环境特性,以下从工具选择、分析流程及注意事项进行详细说明一、逆向分析工...",
"author": "哆啦安全",
"pubDate": "2025-03-03 07:03:21"
}, },
{ {
"title": "APP逆向神器之Frida【Android初级篇】", "title": "APP逆向神器之Frida【Android初级篇】",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9y1Qey4TDHPFnwfED5CCSTC_4FU14Q9qN2bss3Wk2SsLnKFwM74jQ6UKvskh30n8gkqfKCegExufF1_bbt3HTDZFc_htOgCafDVN78Wi2ulTgG7t05BoiW-MGGKazMQtkukp-EXYyhJQOvLmvUokxLqiEPDFDYy4bjJBJ9_QAvV8Y-UZGbO56rA..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9c9ru1dp7EGcNRWc7m9Vto2jfuvCS_Mpc9MSOn0VU2l0FC8Zx3aXpX0UJ2-YXO-jeeL7GMcDHdlao26PENFpEby4g9Zv-Q3ZdqXO1gHmfrrNnzI8NoDM7cHXc_aYfqQL-sRWvLKG59mTHAJVAOjd33gOjee0gAZukCiuzuct1FnhhWLv6O878UA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...", "description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...",
"author": "NightTeam", "author": "NightTeam",
"pubDate": "2019-07-03 09:00:11" "pubDate": "2019-07-03 09:00:11"
}, },
{
"title": "APP逆向之SO必备分析手法",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9DekuFrSah2MDLH3d1ABtfHiSq42IHf6dIeSPj1pf9G3jmZsNOMQFOpfzTKux7Jnd_xoORBUeoNoXKqDKCw1Qv6JzpsQo0--02RFk0JKQMmEVISvYyNT5d3V6ZCUddf_KT4wP-kBee03XyWSJLlDKHrSyjVUQD3eA4ZFUO1m11YndrgozfSg6bw..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72",
"description": "APP逆向过程中,需要对dex文件和elf文件进行分析,又因现在各APP都有各种代码保护手法,因此都需要进行动态分析.今天就分享...",
"author": "编码安全",
"pubDate": "2023-04-07 08:31:00"
},
{ {
"title": "对某数藏类app逆向安全分析", "title": "对某数藏类app逆向安全分析",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9TBe0Cy2M0PMHAsDTkWG1XCgridKRYXPmTOJTEuQ_HkomuFNwiPBMpAZXe8TaJkLqpAXTX02VYshcMw9ShVaDRR_whO3gQ4P4PUM0qhAu7-f8Yal_i9MYUItxgxhVwVI9e1HlnC5bS4eb1ckRRupTKMm-iF2vJ-NCh-QWLvjJh1Zj3x9Nw6p-Fg..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9lXcNX9AOOoTm4CBrpf0a-sBoRZk4Hd4NMf3NFX_hTnPUBFDO-H4INSEcbjxWPpdnBn-AZglZbicNTigYbg2H7qdRL4o9ns-lYIMjPuIxF33xHcrOROK0Ryt7VpTw8LTTZmvGGaQd2pfwj2ErCUI2wmyPNzVj_SyltmhBVT1n_jDm0CtGSSkZQQ..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...", "description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...",
"author": "编角料", "author": "编角料",
"pubDate": "2023-03-10 18:32:22" "pubDate": "2023-03-10 18:32:22"
}, },
{ {
"title": "APP逆向系列(一)", "title": "APP逆向系列(一)",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9wMOpBnCfE3dg3oov0U35WJcchc1r8AswXk0mlXzRDPozNfkwT3nBR1SqqTNqkENWehFUIiOyiinHbYHVHqxzCujUsJzqpdtQaLay1F2XExFt1qOLHbtaCMz4L18n7QXOxbOI6GK54uHq1TKbjPZnVajlf0i46OkVbJS8-NBnSD2TJmCU1UgHwQ..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9tUUp5U1amv6rVz_XTmtn0mdOmyG1nqM9oBM4n5C4uAvylPx-49SZoEBhA0b-zBpJsQFk04s6KlDA8AmsqNP4xzefHWP558a5M8BSkLIq_ZaLBrBb6kiIh2RwFHCc_BXVZFugczBJ9VuB_J4lMJKtsrqe2XulivXNeVfmKyOIKAl5LU3lqtPw9g..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "APP逆向系列(一)最近在解决APP逆向问题,之前都是不系统的学习,知道工具,知道hook,但是跟某些金融比起来还是差点意思...", "description": "APP逆向系列(一)最近在解决APP逆向问题,之前都是不系统的学习,知道工具,知道hook,但是跟某些金融比起来还是差点意思...",
"author": "呼啦啦安全", "author": "呼啦啦安全",
"pubDate": "2024-04-14 11:12:10" "pubDate": "2024-04-17 21:59:21"
}, },
{ {
"title": "APP逆向sign签名算法:Python实战指南", "title": "好用的APP逆向工具",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYLS5roOHYMHOM-st-w9ouw1qXa8Fplpd9BFWAUHaIeovflPuJQwjMACirLwaa4ZDc_PA19BDpqx6zWZ2Zqm0u_hD-JaXB6KjOmTKDetHcQqRP5vqUhoVoODGop2kQDwoXCEjwq68bCoNh6DOZnTVbsguXGEFA2NShd4-zsHRToI51fFnTDh0nMaNKfL2_aAVocmGauHRr2wY6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=8EC424C2884729B9CACFE27CAB1B4EFACA92882F67871C72", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9uOgbmr5Xs6SFGTkWWTq1dNh66X-qAb5cKLOT1QvVslrpp4a4I0-m6j9v9f8cIyfgBPGHNfUgAPQE7f2t1-x9mZihVVB2ngV9kemhL-3At65I3PA5-zIKti84ioUpdJtGEgNkWYF66san6mCWt711PMRU6aMXJ2QQ0uW6HRm-x3UHpHkoPMgL3A..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...", "description": "从此APP逆向快人一步Apkdb概述《Android APK+Dex文件反编译及回编译工具》 简称:APKDB.是一款,针对Android OS系统APK...",
"author": "雷雷讲py", "author": "素人一鸣",
"pubDate": "2025-01-03 09:40:29" "pubDate": "2025-01-16 15:58:50"
},
{
"title": "【APP逆向】某某租车app逆向分析",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9WI9MBCWBS0I03fDVYwvSJS7gdYQF3g4s1UKXr8nlM8auXXxFDSEuay2Em97i5hnc2dq6Tx8sa55G6iNoA0zIqXpVSeLn19g1yVT4VUQfUVuda8fN42zql4tEBXYdBMqVO6TiiJTVB3N5_Zy45rSzdXDOat6dFjV5Zas3Dyx4RGjy08OLTBhW0A..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "【APP逆向】某某租车app逆向分析 背景 之前了解了fartext 魔改版的功能用法,但是一直没有合适的app用来测试,这次正好拿来练练...",
"author": "EternalBlue",
"pubDate": "2025-03-12 00:11:48"
} }
], ],
"渗透测试": [ "渗透测试": [
{ {
"title": "200万年薪!人民网这个岗位等你来!", "title": "200万年薪!人民网这个岗位等你来!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa_plC5_ZJUUkLLIU2NwkV0Aty3GmpgU9meXdUReGoasbcmzUULiaWYWq6jIz4UBCCqI1SBeBb3jEb9yTd7cYC2t6KD-nXNjg6dxQ7wKKpsSHrbpSz_G5k61FH6In5Ei3zg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB2zJSH-XHxJYGg2BRycObnfKc6vqPrRScVijf9WWtRq_tjWUSCTqHZ_zcgr_WXE-m8ZMwKxJ1Y2clHKXN6HAQHSrXT6lBa2GicuNmqm54Rw3bHFnoxEXkhNflztgI7RZ1g..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...", "description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...",
"author": "人民网", "author": "人民网",
"pubDate": "2018-08-03 15:22:17" "pubDate": "2018-08-03 15:22:17"
}, },
{
"title": "人社部拟新增10个新职业,看看自己能干点啥",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qDsFRFV-ZzXfCvj94FC6YOCmQFB9BWWWafAk6KRdyQctNO0VF5P6p39phm7usO2ZeyAcvf4A6Wd4e_4QVLFnuk3PkBQYVLsbm0T79C8mbjjstYEBKZzvVUTGSWWaFmuY5XT6GuIMRofAHQAzNZ3vqh4i4P3lNj0cuF15pqZ8V7rS-e4Yz84xMA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
"description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
"author": "人民网海南频道",
"pubDate": "2020-05-13 14:27:12"
},
{
"title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9kG3AVxFmsfwybgm7fy7_melAZgfjVgt8Lho_Dlc2y7w9EjKkgqCWr-ieTiC-MrLHpVnsFUCCq6UET7GzfBZqxfJBmSuZbz95GaKlQDGpiQrNlDqt0p8i-z8Z3F0sIi8oM9GgU6xYxxyFcAiERQFjQXZr5CEtnZSR0RAtzTPdsTXFcvUoAZZH7Q..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
"description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
"author": "新华网",
"pubDate": "2017-08-24 14:13:15"
},
{ {
"title": "中新网招新了!打工人,速来!", "title": "中新网招新了!打工人,速来!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9j3-2h4QLLOmN4d3w9rfzotkbCZKH75C8KhZsaQycPPuDKoI3EBBOkPDnaE9d67308CCnovBzXpB1ZFnROyLlVvtJ7e0rnko_54Ou1WmjjSqpRKq-qqIJFf8OXmnsprU4zNhWbCKgveYvp_GMRPLf_KUbLHgxM_kObknL--RqEtJf_71bqkOtiw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9m7yv2ccEJ4i5LYy3cPhwUIIrJBaPxbEK8anG_cAz9D5mdEFw6KfCJfNhbADYC1DSHZAO02gCXMIVXr3HxQG1tMPNRm05JJ8Xxu7DlEG3gq69BuoSdIny0WRCDHOB3UXzmb_wXn0lhZVVY7Wc_RgQhKchioy7-HtvNyC4S4f3mI3S-e4Yz84xMA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...", "description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...",
"author": "中国新闻网", "author": "中国新闻网",
"pubDate": "2020-11-03 15:52:39" "pubDate": "2020-11-03 15:52:39"
}, },
{ {
"title": "人社部拟新增10个新职业,网友疯狂@李佳琦", "title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9t4_S6H3nsRQkDz8GIoA1XcSVyrdi1GefED2vttBjAwDfNdktfkUULLz48tTCTLyJpUz1ruE66Obxz8e43aFvDJEDgs-6AxsFj1elB2EJFkR6qQMRQVb0kpA7-hcq6Mx_b4rgEwHlWBzdvsFf_Vri6p4mq2WE0l8BB91IcC7ClCvYl_Q5RRZQjg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9fP4Xj1QflXiE_uUOtgLs-VC7viQvoqUsNljU1prUHdABMu2hSav0LVZ6cZODAmDPnpDumn6Oge4o9xNUzx7burEBVHUFMhkKFEA_qutuCH-2qxk2BJAF6mCQ45mOP0TZd6VZUnHC8jSEQwYN7mKykz41OOAXs8rxyikQyIhN7BcC2Qmj7RgGwQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
"author": "光明网", "author": "新华网",
"pubDate": "2020-05-12 18:12:17" "pubDate": "2017-08-24 14:13:15"
}, },
{ {
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!", "title": "人社部拟新增10个新职业,看看自己能干点啥",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPa0XkfCGfpKqpmgePJTIT3MqdUyLc8FumCOoy8y2xppMjTLV3Lp47oOiTkE5z_kbRrZL05aGPT2ZF2hRIkOtXU1Gk1hTT4jZEimGzN4JLhucmlO5icazpOGNFH6In5Ei3zg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd938XWbZVit1p12c7HjlKcxc0ct2UIRuW2IuQFNtwlOSwNBnqV_XFalJfWH0Fo0sqI2jXtkJpMFXtkJT5spcScNNd43EJRTZQXbKiB8gxe8MmhclEVHlHGuBTdGJnjDE6p1BPfoFHvxLSJhVaPMnaKR4dqv2GDzseij7f4Zuod9ya00NVofL2iDw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...", "description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
"author": "人民网", "author": "人民网海南频道",
"pubDate": "2020-07-10 19:38:53" "pubDate": "2020-05-13 14:27:12"
},
{
"title": "撒贝宁惊现滑雪场!硬核测评来了→",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbQDIawWPPmTCmRLx9i13LDhoZC1nnZ8bTIywmaIA3dr-5mRrWYDwl14SqEBBVy3mjrtOwbjh66uwKzLmREOCdEnJboCYbSjP5cZ60HYo6flPZe8ahDk5XDsYJSSFPgfogQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
"description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...",
"author": "央视财经",
"pubDate": "2022-12-30 15:14:23"
},
{
"title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9QOdGQTIaTObmLd1UsoJp28Ug2nQjBhfHvVdQ6Fstm-4IP024BCSNbUSR-1-pv1BAfcoe0NV0Meyppjk4Y7mnFmRPgqzVOfLQ04mmkbPErrdEp1b3-98VHu5WNkdl3_M1Es8d9IsKXzVFXp5hmztU8Sjhi9w_5QNTnHNQD_cGelJS6t2rFt2rnA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78",
"description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...",
"author": "央视财经",
"pubDate": "2018-10-09 06:45:24"
}, },
{ {
"title": "李佳琦们要“转正”了!", "title": "李佳琦们要“转正”了!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9qhhFEUOMaVMV_6dTXI2WX4oGJw8OEdwwYVnwEUoKhJI2FuHOHpuPazoQbTOwUoq99UzIEhppoaSgTAzQ-AyjiPmq_uzbSQZN30Fx05V91TzDYvQ0aZ5H86QuYT6EkrjNjtdM4OmYdXj8euNgn7zhBFAjftMp0TtS7Oq0HubfG5R6VKrzu_4XKA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB0DGECEe9GlcaW9mi2MBmXkLrK2aNKTXvdf2gz9sGguY4io2BKEILJvDOwOoWOamJKwz921jTlhuvjn-9H-nyaoEKqCVj_tYRROprp6YKqkfJpE-dnQJNFFr1dbZWbKUeQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
"author": "人民网", "author": "人民网",
"pubDate": "2020-05-12 19:02:37" "pubDate": "2020-05-12 19:02:37"
}, },
{ {
"title": "撒贝宁现身滑雪场,硬核测评“小汉堡”", "title": "李佳琦们“转正”了!又一波新职业发布…",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYBpYT56pYcVaM-st-w9ouw1qXa8Fplpd9zlHbF8gxj7EGssOPTd2IvMx5S0ON1zeUFHf1s66aDGU2jlSed1g6RjB7DEtuh3fGfPGVBjuatAKkShHzcHshGcaLuCrCRjtkzCU4ZmphVL1em06lwAJh0NBcqeaI5kje3IGShRIYmsS4-Dgf2jIgYCLp6_GWYKd9YRubsJSyhSOFW6cwuUnkdA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=8EC4650477BBD54534331E805713330535F8F76F67871C78", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB9EW3vvazU96ZKEnoo_JS3x0BzzWn10ximMuBWlT_5O9I0gqXal3SA9xAkmK__NeNaHmTzIKlvgdHMgV46VOYCkU-z-LXgKpny54VryVnWHIeu_sCOlTFyHvzHZXxeLdyg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...", "description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,信息安全测试员、互联网信息审核员的工作将越来越重要.据悉...",
"author": "央视新闻", "author": "人民网",
"pubDate": "2022-12-30 18:03:44" "pubDate": "2020-07-06 15:08:14"
},
{
"title": "妹子们注意!上海消保委测试了40款知名面膜,结果是……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9fP4Xj1QflXiE_uUOtgLs-VC7viQvoqUsNljU1prUHdABMu2hSav0LXFjP6OboT1q_s_i8-oAShCeQ64qo3_4eMPkTSLPrW7GJxBLlQI_Hx1QeXc9ertFCkSjXIGyr7pYJSgLTFHAd537rsyfHp4-1t3va3n34Gw05SG_XagNHQZe0WC6Sbi7DA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "4小时保湿功效分别进行了测试.1全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面...",
"author": "新华网",
"pubDate": "2018-10-06 16:53:48"
},
{
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB3Gf0crth1REpM7pnCtDQFICq64oviefEZ1vGp75hB_-VyPVdkkH4f88ejvmAzB97n9kx5vRkDJvVUmqh55kw-oFE23pG3T_Kpijfgr5UyMHkJlsOtybC6uFW6cwuUnkdA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...",
"author": "人民网",
"pubDate": "2020-07-10 19:38:53"
} }
], ],
"手机银行漏洞": [ "手机银行漏洞": [
{
"title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd92qG-YUDuw2cKCKXEijUUwzmJ7LovMb9TK-xo6XmlKI8WTNaY5-SY58cqk1mlByBRCmPmcPx04njC2vGprTRkD8dlexVLDFa83kOaEAU6FbNGDQ6Ms-2LwveLyIsfiaCvFHgfk9SVtXI-wVkb-oMIH8UiAS3ewJf-2uhfP-HNbZo89kyxDwoXvg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
"description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
"author": "木火通明",
"pubDate": "2019-04-23 21:42:11"
},
{ {
"title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现", "title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9OtUjCS5QQKGyCdvG4y99pRo-WqXYr6-ax5N0Jf357hkjlFfw28s2lD-RSafLbG5nzUq4wcC3SrLNZu0SGOdOZfqitEq8tNyDcatItR0cA20o1k5CdHmld6EmeBFgDejKW0S6bFRcljrDp2eUqkg7nsweMqTwzNZ0kv_xxLnZsMYtPujwwRB2Pw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9NFACt4r9XtAYsMhQto1wHGOTujEotFi8vSykO0Z07Xs9-tfxZkeUpY6iBgpIAt2qlcUFBr4NqlmxP_WAkDDHwxeCu0zsfNpcT2AjinmY7IFW1HgYGZhghgZJSXbhsdjNLtVmEDjiEeZ0w2BEIqo-WgT7-0TtL-1jEEemsV1E7q_f3q8uRDTfkw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...", "description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...",
"author": "支付百科", "author": "支付百科",
"pubDate": "2020-03-19 19:33:50" "pubDate": "2020-03-19 19:33:50"
}, },
{
"title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYsaE49eEpb7wvr3Rkj_eAguhj133NVu3yhIj5FQbbvpHHSidwJi73JtZF04wix2W4iiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
"description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...",
"author": "安全牛",
"pubDate": "2016-05-19 11:48:56"
},
{
"title": "黑客攻击发现:多家手机银行APP存漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9TbuA-A-b-ksJTIujAoBVrQqBy-CpHX8pLpuaQb-j6CrT4CIew68eseJhFYuDAG71iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
"author": "E安全",
"pubDate": "2016-09-05 11:36:23"
},
{
"title": "某银行手机APP现支付漏洞3天被盗刷40多万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzkxnNXBuILBBup8Cqq7Tsq0zd7F6ZsjUO5DyPzMFB0eYVGVIycMg0zvxqYKydtZc1iZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D",
"description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
"author": "支付界",
"pubDate": "2016-06-16 09:00:18"
},
{ {
"title": "警惕!手机银行APP也会存在高危漏洞", "title": "警惕!手机银行APP也会存在高危漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksQEagkS3beCUFZ-6USo-pcP3YXwdKGmIrE6pSepaYL_0U7_cMO2EAHzFkUu3Dh9ZpiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksxHjTp5TWgTMtb0QT38qtXqaKAm6xneH4nKOxeqk3nGzTFmHsDF7RoDIQcIWu7eIDiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...", "description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...",
"author": "中国信通院CAICT", "author": "中国信通院CAICT",
"pubDate": "2017-03-15 14:13:34" "pubDate": "2017-03-15 14:13:34"
}, },
{ {
"title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停", "title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9GBNTUPO0R_T1uK-TpcR0Bpu5tyFGgFGabdsxGeNBjZscAx0srPykO-jFxlpJmL6CHFCH7b0T7_Dao4r1RuSFARZR6sEhR2uM4QHMGXXpow0ZHJCKf7YPzRrKsSSd6_t2hzUiMbPE4Y_atdDVE02jnoNRKcOqRaUZngDNBeNYhFbvzHZXxeLdyg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9Hzh_lyNfZEqbnRTiI9rBQm3Q87lpJNG3cN4vp1YvJLDwBSPpNKz66VhemuvDOBKdbKq8zyckFEcDlRvZYhEBeMw9r9kKDTs8JkqrrVxvBBjVhoGJkK0jKZMExOmTHzxEnZwJiUsgHt426TGjjzW-m9d9apFNp5IhfTyuqbmZb4TFcvUoAZZH7Q..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...", "description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
"author": "银行科技研究社", "author": "木火通明",
"pubDate": "2019-10-23 12:18:17" "pubDate": "2019-04-23 21:42:11"
}, },
{ {
"title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……", "title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd9zQ1Vfqmm-833UlHLfkNjzraYNmow7gfQmhjTiJYywxSBp4A1AXuwxHaBnQweacTo8BgpwSEM0esRY43HDD6H0sHvmxudJZVfQE8mVKkPxfDACOc0_w9fHNzPSlF9tbrFhHMSkqA0u9vyQW_hZTHYpimwwS9gbx_6K4hWq-4Y9RjvzHZXxeLdyg..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzbfa51Lk7hnBdd-PXO8zD4bZBzkEs4qL91zXrAssxq_Fx_iURzYopd5FdYNUIpQFKjqT5bbRtXpk6qvJW3YSGGH4mUNEhHT1092NRPfeW2gOckW9rfO5f8Y4zZqnpfFaZ3i-R9z0OfFxpHSTjVCI9DmVfyAhJ0RCVBxAmAH5j2j34zQH5fQsyygiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "在银行客户所使用的手机银行软件之中存在一个严重的安全漏洞. Prakash解释称,通过利用这个漏洞,他可以从任何一名银行客户的...",
"author": "黑白之道",
"pubDate": "2016-05-27 08:16:49"
},
{
"title": "黑客攻击发现:多家手机银行APP存漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9Y7g5Zxp-ImqDVr2SrMfwi1gtbpSKZ2v4PWTMZ0URHjtUoGUnTGtCmFj7kb-frKMWiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
"author": "E安全",
"pubDate": "2016-09-05 11:36:23"
},
{
"title": "银行手机app存重大漏洞,余额为0也能成功转账?被人套取资金数百万4个月后才发现",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd95FuX7oHuqTy2vXk0m56mQ70Jd5155gD2Md3QcfhtX3-qLVh5LFUOweFf60r0lcM0QVDRCGxYZGQelXNR3W4tYu5LUfYWhH0buEMkJJBVgjYw_NNWnLEmovv2Q7hapVTrJs1xgQwC0o_gxP6VbP9Q8-ADnlWefaUbxpHxVwDXySyFW6cwuUnkdA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "揭示了平顶山银行APP中存在过巨大漏洞.判决书显示,罪犯朱某鑫,1996年生人,小学文化.2017年至2018年,朱某鑫在手机上下...",
"author": "支付爆光台",
"pubDate": "2020-03-19 20:19:19"
},
{
"title": "警惕!有人利用手机银行漏洞,在我市疯狂作案30余起...",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9uQLYrci54ZeLmLtABBGBCMIvO4GzVCXt80DQXHrBh8VSd1SY3lJZNDZNyjq5zoKt0mT_fnwtE_JIauljziXMGalNG8OVdv5bTR0I2AF5eLpJa2F-yUwexQGdQ_k6SHQwX3ySM0Gj6eAyQBjnkA7l8ZXOMbRNJafAdPiN8gBUESctPujwwRB2Pw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...", "description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...",
"author": "乐享崇仁", "author": "赣州公安",
"pubDate": "2019-09-12 22:35:10" "pubDate": "2019-09-11 18:44:52"
}, },
{ {
"title": "警惕!有人利用手机银行漏洞疯狂作案30余起……", "title": "警惕!有人利用手机银行漏洞疯狂作案30余起……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYAIfPdNsjkleM-st-w9ouw1qXa8Fplpd92UMYIjv1iSdywM-d1jO8jVz8qtKI5XppALPBGF_O0lOaS_nggT-x5nPHuERm3UQI85pQvAcRNSTGc0OsJafSPvWDMBXpZF72LkaSgKQ9j4cKTIdMQ5rvbDa9Z72L5IvFRctUFDBUAIMWYL5vjawE6l4JjSkg4W7XackzCZ8OpCUCYioxHkzTmA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9NT8RvUvXV0PFeE3a2kUhkP2ZG_sX8zawtBT3KVXDaagk-cP3LlavEKLsUaYCzd6w6DZhlyQ9YspIRZKmkzay6EZQflQxyhdeqKfuAYpCA52ekN5651P75SmY3qYCzo2bOCCca3RPdx4ylb5AvEf1Wk8wPAKoG25Q9dQcrLNGeD3wdVqCwyPdzA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...", "description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...",
"author": "玉山生活", "author": "玉山生活",
"pubDate": "2019-09-15 17:21:04" "pubDate": "2019-09-15 17:21:04"
}, },
{ {
"title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!", "title": "某银行手机APP现支付漏洞3天被盗刷40多万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzsvZ5dnU_l9ICVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUatIqQYOMlGNW_Nssy-N7jJGR4EThcddlYvn2S8hUmzX9fukBQSbS2WWHASkWj7QcqiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4A381945936A7D6D0FD63B5AE5DE6D787502D67871C7D", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzHWEdrYZx40buATK0RtUpeKuK4Xnc6AvoJJ3-8f7g0iBwlwVQ0IawpTKu0NTfZRcaiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...", "description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
"author": "集宁佰事通", "author": "支付界",
"pubDate": "2017-01-20 11:26:29" "pubDate": "2016-06-16 09:00:18"
},
{
"title": "浅析某城商行手机银行水平授权漏洞问题",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9xDBW9Rl70OcDaZ8d2t3eWLxTzFuASo02mX09efynhG3F4_7-WUI3gC3ZjaOrWCB9EsQUbql0RvIrYgINh8Nu28IO5qsg2KkFcI5Ud9tw-aj4WuHTgESjTlTUICBxW3zzbT2DRbilp0A20hoSggt-li4bneigETdENFVo2Of620Pf3q8uRDTfkw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "也导致此城商行从2019年1月18日至今一直关闭手机银行APP软件中Ⅱ、Ⅲ类账户开户链接功能.-问题原因分析-水平越权缺陷漏洞是...",
"author": "51Testing软件测试网",
"pubDate": "2022-10-12 12:01:01"
} }
], ],
"银行漏洞": [ "银行漏洞": [
{ {
"title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?", "title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9JadOgJUn_cP8GAl9hK6Y1jFwJ10FWq43ADKxbwPz4Uzx6mrWihNQyc1QX4yHiGB8jnlg5VwUZy5nIrh6vOGmPrBqKmj-8_K1xvJoQOw2OtZndFOY8w1g84aB4nyJGzThfDp7B90uj-4T7HWqSO4TurrmuQZ4koNDokQ3i8LRUW0GX_iHL9MadA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9pzKu330fp4wKNvjCnpsTYJy_MYuu2jCD8DAS_luExtAWB1N6-Cxv3qasDw3uxHi0z8MjCNPczv36si2m__UqjpsfZTQNAbaoiYscmaVEzka-Nf0uOtaXOO83W4asiYuUGAW-rQuwk6eo8gpCckTFDmjFBvf9GaZ79Fhd4sLWmCqjotuuiAmOIg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...", "description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...",
"author": "测试届的LV", "author": "测试届的LV",
"pubDate": "2019-06-10 08:18:15" "pubDate": "2019-06-10 08:18:15"
}, },
{
"title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9lbKl1LtAgbuGgpPqiNV98ZDA9ZSaP_XCG1nCi7ePS-J80bi7j6ZYbXmowfSmYevXA7zm-UoFK8Dk5FkcwzYXS2penyy_0A1JAf7ES2ut_gBAtcbba6_bWek-3C_YxSBRGH4OYLoX6vXq25pByv6TQ8yBbDScTooWKFKREtfiTv0SYTqT4eyLmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
"description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
"author": "新浪财经",
"pubDate": "2020-07-21 15:52:31"
},
{ {
"title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?", "title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9G4iCENSnZxzQN71udtIzF6CypZJDmx9Yj1F70e5NFjzB-NNXpNbpmunGkuH2h81rd8wsFckKXkivY-NC6JPLDhRa3jidUF9sIYJclzs9biBOF9qfxB1vfPwQK2gMSpyZ_cGzfCfl18K8BFrYLKFp118oXs8ZO03NIvuzW8iKuNz6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9yCKB9iwOJDtLWv88jWC4D3LqwHy7uz5eXXAi1F7RRhfTmxUGPHxNlpTpcgRBQ6HKHK5da9FY-PQYWsW6wwagjjDjk-whi91Qgy9WtCkxb-qLhZaY-aNqNZo-A-90R7nATCrHl4ejTzTSf1l1B9mwUO_aBLTc1iOYrXXwyxVEjXMHpHkoPMgL3A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...", "description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
"author": "纽扣资讯网", "author": "纽扣资讯网",
"pubDate": "2018-08-21 19:29:05" "pubDate": "2018-08-21 19:29:05"
}, },
{
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9lJpbiLZRH1vJjkV2aUakzvX5OFviL3lBHM6YWh_8dMwKoOkW4r62CKhpB_4JiXwcS6YIdN73PWzIdGs7tj5w9V8Sxe0KJVQOIX0L3godNsUNS1jaO2HRWZ8d-6Sar66KBec9xHpcOQKmJKzgFk6tqd9zkhIm-rLiRcc-qHtrsLxCy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...",
"author": "外交之声",
"pubDate": "2017-12-03 23:54:42"
},
{
"title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9y2wKLqRggIyzmeffQqYe13XJ6dtFD2G71eQ2qvIYnDDD3dk9eb2AxEIQCxY5dE5io8WO73JpBStJ98pXJgPyqwUk8743zTfjdaCDrfC8a-MFlkXPozZ_g5GrGfJGNuCgpC_Ug21LArhJ1mqDatK7rjpZQcqK9aDdnj8v5JdY6SXuL0unUdKkuw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
"description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...",
"author": "知书局",
"pubDate": "2023-02-03 18:20:39"
},
{
"title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9vYcBvx1zJw63CYtjC1V6_G1kXfzCdKKVb304kNFKJqRUuH0ulnaip3W2KCb6ilLLVE1YaBtaAuJB7X2EoB1uUDFfqYTybAeqW7d3-nRV_tlesjIeWJAwQzqtrOeVq06ze1TxxZBCFasGyq4Phd0Eq8KDSebBf4R8aaNLkw7bRFSTJmCU1UgHwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
"description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
"author": "澳网",
"pubDate": "2017-12-04 23:18:55"
},
{
"title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9s4sxFwHnY-mZ7rORgFcvuJHZOSn9Y9ofAuB3bjswFCtMIDjlcpPf49ujNF-6ZvNvWTJjIGBIydChijs5IuKNlfQgjWmEn0fxZnEXBwp2y29qzNJHqB1a-X3E6klvu60E64_-cVYUjtwjlJmP1P7VBgKRoSa7IcUREFcBDG-HD3R5LU3lqtPw9g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82",
"description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...",
"author": "火绒安全",
"pubDate": "2017-09-11 17:23:47"
},
{ {
"title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿", "title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9zEhlbpNEfHY-AuiMNOlDLxiKs5O8wU6Q-HGnidyEihvA-WKuTsXxPKeRhsrWmXsaOEk4c8j87rLpFi63dh0fMGXmBZQjBCKgBOPhkjHowbabTPPJ84MKbtT64GwcYcsk4V7L-8HqOap1EFLj9DxdOUoOXGcmVOO9uT7BOin834MY-UZGbO56rA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd95i37lwf53KQXhIurbqJ78EwAthuML43VGgVJaQi0-yHjXSXQt6yNSFB9IXhZ2qRlx8h84Wk9DhG-65N7kylrgZSAS8EF4JoB7gLO8CtrkqAkUh-oIJhz2JFYUslUu5suP83v9EowWRAL3jlKxMCZS-F8OToB1kbJVAxZxwFsJHdQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...", "description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...",
"author": "灵枫历史阁", "author": "灵枫历史阁",
"pubDate": "2023-06-04 17:49:26" "pubDate": "2023-06-04 17:49:26"
}, },
{ {
"title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息", "title": "华裔女留学生发现银行漏洞消费超2千万 获无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9mi7Ny_FFnhA35xtFluzDpc9Mnd4BayZPwaUQuq5PkS9hYHtYumuTWNuCI4e_8uEUZOc29w-gL7JAdZdAJr8mGthtpLK7cqq7OglLTOYQ_d9F82_zh1Z3SO7Pjy2TErlBkVhQbn5XNomsYV1ZA7Xf8Sh9hxqKbgYsuXsZeXhCXboC2Qmj7RgGwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9Y9dzG87vgOnZ1Pc8kgUn4bOjDKoqa0WENxM-PZgqv19n30ZqfoqFybLK1SR7LYH-QCkY-6vQJJYQTF1vlweUrhn78sPKj2o_GrDfgQa25qzSTggfIFWslDhRkC_VjqvqrWlk0CAlCiFgyV5xySIl44uhYpsJDbjVNZWI5TFmlNCE8RsmObDbtQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...", "description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
"author": "城市知道温哥华", "author": "网易新闻客户端",
"pubDate": "2023-10-09 06:55:35" "pubDate": "2017-12-04 19:29:22"
},
{
"title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9v5ehQ7aW1JrlZRA0hZQJXryemPyhOEIG8SsPkKVwA1sPvJD5lLpq7bzDWppkR171ixxIoa_DU8md1f4wjSote19_OcS3Nh9M6nZ0smXRixVcky8-IucQNTXYuUAh4dDsfikJaUblV14sI7zkCqc8NLDAAOczmKq7RstcmWk3oo5Cy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
"author": "新浪财经",
"pubDate": "2020-07-21 15:52:31"
}, },
{ {
"title": "黑产利用光大银行漏洞,信用卡1万额度可提15万", "title": "黑产利用光大银行漏洞,信用卡1万额度可提15万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYu3mQsVP1yyaM-st-w9ouw1qXa8Fplpd9BqvK6Z-gNoxdE3Z1UMK1yh6KokykBVd5aqVHSBL4qhwHmyxsIJ-rhoezSniIPwMSTzzfN9WS84y1gnqNKJT7WbhmaoboULN0288W2vjafoMy9Sy9-i6VClOpXjHAIDq1oc6nNNdwPQ1ysqG0V9ugFnvKoptJa0x2S9SuzsiQTlr0OK9DLfgmPA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=8EC4E3CAB4791787F7F0DD42953BF0BEF7C8795C67871C82", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9_l1Bjwrux0F8XX3ZwV0YGrjfAMzkM73UoJC81rUsfwUnC0L0pK2NGWNghIH-J-fYIncaKaBKcUsuIlpwk4-3jk4VToaA9SRp9Vr4XkwUF0LCcfIRH-kfYWOyUAhatvlV7uhKM-K6ewbGShFPW_aIOF1TAIpU4sbeTHGWMu-x92t5LU3lqtPw9g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...", "description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...",
"author": "可转债摊大饼", "author": "可转债摊大饼",
"pubDate": "2018-05-26 13:15:31" "pubDate": "2018-05-26 13:15:31"
},
{
"title": "卷!某银行漏洞管理平台投标限价1115万元,浪潮近半价拿下",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9ifWXEHUoNmfSyLSSYMdnbbqUPPxfMrR_HpEuKaBJKg8PTI9uoyQdisGi3AKbA0cCDIcz0fhIwhmPAuY_jwZcpmJUVzanQWGkl-1v7fBXZvYm5oOi6PffjcUvJJu5EaHf0qt35Qbl3EiiZ3DOOBA-0d2rsxJ5Q5UX7efkrvAUqVI6Ebq8fk9diw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "近期,农业发展银行采购漏洞管理平台,产品包括漏洞管理系统和漏洞扫描设备,投标限价1115万元,要求提供投标产品的同品牌同类...",
"author": "安知讯",
"pubDate": "2023-02-06 19:02:16"
},
{
"title": "六安徽商银行再爆监管漏洞!违规吸收存款,罚25万元!负责人被行政处罚!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9kcTUthZEfb8g-5IZT5zCoUSBUeJYC34rdFaDNYyJmAoXFUZ5CJ3JiX9xGPY5VnW5ScRIpQ68upf1GZG4zUK1E4hjcF9tu16epEQS3uFzQnI4_zOPR7F8DHn-d1o-hRu2S5LGk62RcNBRLRFf_9Xto_IOkkmAQabZ_B7BZGsB0cfm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "yuan元:银行漏洞百出,金融部门应该管管了.阿莫:金融行业的蛀虫,破坏金融秩序的健康发展...小龙:这样的人居然在银行担担当...",
"author": "六地品安",
"pubDate": "2018-10-25 14:25:30"
},
{
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9oW-h7ODZ-2qwX0zMPf7C6RCHPwN_SVrexdeJKTUt6u70a3A4YFjhJy2-ceZ6AezyCVa99sgWUSMG1BxjJXmQTC9necAA8QWQpGliM5Vh89nlmjp6vgvDSiKLTXkY9DkrRgWkt8QJ-tB-Ir1Q1eXP1H87FuOXldJ_GV0QQxjE3Dyq3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...",
"author": "外交之声",
"pubDate": "2017-12-03 23:54:42"
},
{
"title": "有钱没命花! 3名华人钻银行“漏洞” 获利千万美元  获刑82年!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9B4aKooqWHsSX8MfFu9KbHvc4fitnLtTm8fvOyPI9IxxpfezbeTUEo-5I1gXwlj2nzTlA7YViDnsYI3MiVnSH83UGdL_9nfZ5CnPFsoQNVHHv5gJHFUCJbKrvsffl30U9SZwi1LbYQp5Kjb6rwDDLFSiA5W18-Aksmk_8Z_sDxnoSYTqT4eyLmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "银行明明有时间差漏洞为什么不修补,这其实就是最基本的银行与客户间的信任与承诺,过去的几十年里,对于绝大多数客户来说,这...",
"author": "留学生公社",
"pubDate": "2023-11-18 18:00:57"
} }
], ],
"支付漏洞": [ "支付漏洞": [
{
"title": "史上最全移动支付漏洞案例 谁动了银行卡里的钱?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgOTsSRz0nQ00TUwMBAIJ2LWq6e1bdhc6Lq8hJPgc9_8ruk899HhLU56D7-o7QYbF_iZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
"description": "雷锋网硬创公开课-移动支付漏洞案例@GeekPwn随着移动支付的普及,我们的生活变得越来越便利.我们甚至已经可以不带钱包、现...",
"author": "GeekPwn",
"pubDate": "2016-04-19 09:35:10"
},
{
"title": "手机支付漏洞已成盗刷之源!小编教你如何防范!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZAWN8qVBnpvQgp_1IxmUlipVisxxFjLhCrWaIgwh9rxuPTIk9hsOYS7KLSgGDqDXfiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
"description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...",
"author": "电脑爱好者",
"pubDate": "2016-05-20 17:30:26"
},
{
"title": "就一加手机支付漏洞讨论在线支付中的安全风险",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVv4tUOz9mk7i35ahnk4wJ4gBkt60u4fwSX4pvTILJ4MV1MhMdhz2hK6VGJjBsQPvUdYg359zA9hdJ2vpxyUFwKCOpp54ysB73v7LjRQ1nacz2I7qH2LW_RdhWLv6O878UA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
"author": "FreeBuf",
"pubDate": "2018-02-12 19:17:27"
},
{ {
"title": "天融信:《电子支付漏洞报告》重磅发布!", "title": "天融信:《电子支付漏洞报告》重磅发布!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9pwOF7W4LO9YG42hf3dXZ7wLt6ZXX2ax1DJBQkJYXQQZ2Ghq_9DpFokvj30buiTN-M248XSLRtNDu95gN6rV-oCl3EoPh7K2PfOGfax10mhaOz9VeLjIX9P3B9DOhIHwSI07Bkc5dqdgohKvssMgIIENslEQGQB6qpd86wVG0vTJAe0f8bRARvQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9OZBwVnf0OZvVkDThqmS0KvPYf9vd0fHL-1NzwpelId6ZjzS0XkOchUXb-1nTvzwUw2lXvVOhe6UnAbSqXsVbT7SxAOPamN2pIyS9f5HmkZ2B7S2a8JMXTvBYYErM7l8LyDqQEOuupqFCNfmVif-GnjgfY1u-EGPEyR6tmRvfLGcNGbbB75bUeA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...", "description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...",
"author": "天融信", "author": "天融信",
"pubDate": "2023-07-12 18:21:06" "pubDate": "2023-07-12 18:21:06"
}, },
{
"title": "银行卡免密支付漏洞这么大!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DDhhw_cmWmzslQZuksADPUGVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xugmhPFf39qNiyzOA8nyyAhMUkUEAIKcD2qktE1GEASs6Yeb1pDEr6wdVlCoRH7zfiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
"author": "犀牛生意经",
"pubDate": "2016-08-29 09:23:44"
},
{ {
"title": "敏付科技存“支付漏洞”被约谈整改", "title": "敏付科技存“支付漏洞”被约谈整改",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd90g7ytJnszwpoA2XHs14-DshlLc5NoF66KKS10bs5pCTls0RqriNvKevbnO3KqLBmiMM1smp5Gjsj_64n288Won2GJ2OZgpFZNV1FrZPPeKIyM_9ZK3WVdZRrwqu4LHqIsYeADMok3Cv-ffgsiuaLezybxOV590y8rSjRWG7ci2QtPujwwRB2Pw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9mXuxCPlr9wuMG1zGFKYTVdQ6NbOgjV3V00dz2oMl86RWnpNZdq7Kx7bwuNXgqln9u0SXOIrj7gbeHDszmwhzqbV1lKylQ6RfvW3H0ycB_6keGoLVmFkX_AXTykKUvEAJQK3ft1pFVY_Vg6kFWy0wgJjjAXrkYVuU453FXdGyDT9Q_LeJW-Rhtg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...", "description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...",
"author": "支付之家网", "author": "支付之家网",
"pubDate": "2022-01-24 08:00:21" "pubDate": "2022-01-24 08:00:21"
}, },
{ {
"title": "利用支付漏洞套现1300万被判15年", "title": "手机支付漏洞已成盗刷之源!小编教你如何防范!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9OtUjCS5QQKGyCdvG4y99pRo-WqXYr6-ax5N0Jf357hkjlFfw28s2lHfJvTC3R4-g4Vtcsh5eJx4V8-tVXle8FIItaeKUkXaappFjFMl4mqMeskHOcOJwW8YI_v2U33hgGTXau5AOkvqkEQ4c6iHYbpc7TeD2tyWvL07C4C3Vb_QO8fIRwtipOg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZDFs5gtIb2zRKTVklZSD7LN6AbwUzvZio_quACiFs8NLmD_Eh-Th7MpDZ-ixMe2dgiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...", "description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...",
"author": "支付百科", "author": "电脑爱好者",
"pubDate": "2022-01-03 13:54:08" "pubDate": "2016-05-20 17:30:26"
},
{
"title": "某小程序的支付漏洞+任意地址删除",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd91wWSLqcexsaWc-yS2fJ--ozdXJqgjj86FPU4WTzEtOVKzj7BokQtUN8n_eGfesnzmGAB8Em7yXuaEoB-2LUFCT4aSxx6GEqu7h6B6xOVQyke6My65F2w6R3NG0yNpno_ZHs_UN-ymwo-m3C6e-AKDULxiFrch55K8O-Z5kiqoSItPujwwRB2Pw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88",
"description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...",
"author": "狐狸说安全",
"pubDate": "2023-09-14 14:25:44"
}, },
{ {
"title": "从最近的微信支付看XXE漏洞", "title": "从最近的微信支付看XXE漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9X2bhg7N5xvfFi3u_YUeARb8YXBkHanOGcidVxO8cw-fCbtjR4EMdVsRR2i5XL2ATXVR0OJ9ZW3VvBSGZtjdT6ORbZ2QSNz6CkoHsAsYvqdz-fl66PY31qY_PcjMrBMtzQs7clvFSBdZVnk4ZyS3yYgllYE2mV7qzHiLciCJDfm_s46dn8Efgxg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRChz8_pO8mtSkn9lXhXHUkYMYENsBFAw4MpbDSeZX0cZU1zR3nbXPtYia6L7-46xKO3KmNFRmSu32pWZ_YvGzlmU_R_rWuQm9uNSShFsfQZtiOAS1Eo5m1NxDdrgozfSg6bw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...", "description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
"author": "FreeBuf", "author": "FreeBuf",
"pubDate": "2018-07-08 18:03:00" "pubDate": "2018-07-08 18:03:00"
}, },
{ {
"title": "渗透测试之支付逻辑漏洞", "title": "支付漏洞:你可能收到了假微信转账",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3CA22jpRmQYoaTz-IIoPgaM-st-w9ouw1qXa8Fplpd9II7Vh_mr6GjLFczSpmCFj5fRjzd-z69k9l3xUU8T-UAgP318sWFtg17m99svulstGUrPdpb6msrqD4IgbxNi4gCXJrw5GYzkc-H1kCIkyd9U8TrjirUCOSrMqHVIq14eVNYhNS2u4HC7ilu69LTuGQgedGth5C2sAiW1yIYOpK7S-e4Yz84xMA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=8EC525DFBE721D8DFCFAD7489FDDC504FD63312367871C88", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDonBfgmHjxCOd5XAY1uNSeSCEkLPGf4cu3kGZpLvvkSCuHaUmcDkcnrwDQLZHUliJi-KdKemZNhbMwwfs2qZ-ey2WueZfM3Q2xvQYgxQa-wMRl520NthlI2CaKKPCpDZe-eWIvRYrW2ZNcTo3KmF86iEowge5WjG0YYa5AR-5kBvaRxFoZVxS3OmJechIZPIVjJajuUu5V_Us1XMZbTAxic6vsr67-iOh1v5FwtbFaAkiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "支付逻辑漏洞分类:1、支付过程中可直接修改数据包中的支付金额这种漏洞应该是支付漏洞中最常见的,主要针对支付宝等需要第三...", "description": "这一支付方式被别有用心的不法分子玩出了“新套路”.从事服装生意7年的晓雯,眼看“回头客”已将钱转至自己的微信上,谁知是...",
"author": "黑白之道", "author": "画乡之窗",
"pubDate": "2020-05-03 10:23:30" "pubDate": "2017-02-28 18:28:24"
},
{
"title": "就一加手机支付漏洞讨论在线支付中的安全风险",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRCh-L5VoC6JnrqApIEh_-2oIPZjtRsmX4pPhbTbM6tiyMB93hkLeBBYoEZOkmyt0NGPjZnp902yylFJvxWBnNXdCSxEFrHicHaEgf3IuPe41nQmxVL51aVjsJflztgI7RZ1g..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
"author": "FreeBuf",
"pubDate": "2018-02-12 19:17:27"
},
{
"title": "利用支付漏洞套现1300万被判15年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9NFACt4r9XtAYsMhQto1wHGOTujEotFi8vSykO0Z07Xs9-tfxZkeUpTcjypPGbjy1dzndMaxfsw-B9kMCysl9Q2JC1F-c4KWIii5atqTrR2E5H27QHHkcE0EslGSb2u3Sda0wOdznXVXGERgXa2BsvbMBN1ghMG_zS-JkohXtNAgY-UZGbO56rA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...",
"author": "支付百科",
"pubDate": "2022-01-03 13:54:08"
},
{
"title": "支付漏洞实战",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9Mhk1GjVLnS3VHON7gk3zpZbU9KmHHCJJLg47g3ZmcNtZwp5Wq-oGePXvAK5urD-4C4yk8q__JM5Jcdj-G0RjPcE93MwAKtCMZRGrluOMy6HFTdJK5HByXKYdciKZTBSxD8fZWRsvoT7OjCsM5Jo-FiA9YWwQV24IAKCjGJg0JjHS-e4Yz84xMA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "本文作者:Heart(Ms08067实验室 SRSP TEAM小组成员) 首先先了解支付漏洞:支付漏洞的理解通常都是篡改价格.比如,一分钱买...",
"author": "Ms08067安全实验室",
"pubDate": "2020-08-28 09:00:22"
},
{
"title": "银行卡免密支付漏洞这么大!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xoJoT7dq0ZINPpTcUcFfc5Yu3qxonRRd6dOgptLPH2lD_2VmKXtAg58IEiz6Zny7IiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
"author": "犀牛生意经",
"pubDate": "2016-08-29 09:23:44"
},
{
"title": "某小程序的支付漏洞+任意地址删除",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9AKiOW-WJ7zh0-bPf6gXkyGutYIrVVRNKhs5Zma6jodl3HgUbak8MkfEx6b8RQNbvd8Ml2TZMWJlGlNstepzq4wMfBNggnY_PHlanDvUbRD6Nm-vWZS8ZccVToRBI7HqsiJmSmiuTe5jjbPG3Qbk94xqlbuVgE15V_OmylOfgzc1hWLv6O878UA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...",
"author": "狐狸说安全",
"pubDate": "2023-09-14 14:25:44"
} }
] ]
} }

642
resources/JSON/uni_rss.json Normal file
View File

@ -0,0 +1,642 @@
[
{
"title": "老显卡福音美团开源首发INT8无损满血版DeepSeek R1",
"link": "https://tech.meituan.com/2025/03/07/meituan-int8-deepseek-r1.html",
"author": "美团技术团队",
"description": "DeepSeek R1模型权重原生为FP8类型仅能被英伟达新型GPU支持。美团技术团队进行了INT8精度量化的尝试量化后模型精度基本无损可部署到A100等其他型号GPU从而解锁了芯片限制相比BF16实现了50%的吞吐提升降低了推理成本。相关技术已在Hugging Face上开源。",
"published": "2025-03-07 08:00:00",
"source": "美团技术团队"
},
{
"title": "上下文感知的聚合页广告优化实践",
"link": "https://tech.meituan.com/2025/03/02/context-enhanced-learning-for-intelligent-marketing.html",
"author": "美团技术团队",
"description": "聚合页广告将商家和优惠信息以多种形式聚合展示给用户,是美团广告业务中一个重要的业务场景。本文从最能影响用户决策的“发券”和“排序”两个方向出发,介绍了上下文感知建模在广告场景的落地方案,证明了聚合页上下文感知的收益空间。希望能对从事相关研究的同学带来一些启发或帮助。",
"published": "2025-03-02 08:00:00",
"source": "美团技术团队"
},
{
"title": "行为正则化与顺序策略优化结合的离线多智能体学习算法",
"link": "https://tech.meituan.com/2025/02/21/marl-in-meituan.html",
"author": "美团技术团队",
"description": "离线多智能体强化学习MARL是一个新兴领域目标是在从预先收集的数据集中学习最佳的多智能体策略。随着人工智能技术的发展多智能体系统在诸如自动驾驶、智能家居、机器人协作以及智能调度决策等方面展现了巨大的应用潜力。但现有的离线MARL方法也面临很多挑战仍存在不协调行为和分布外联合动作的问题。为了应对这些挑战中山大学计算机学院、美团履约平台技术部开展了学术合作项目并取得了一些的成果希望分享给大家。",
"published": "2025-02-21 08:00:00",
"source": "美团技术团队"
},
{
"title": "预测技术在美团弹性伸缩场景的探索与应用",
"link": "https://tech.meituan.com/2025/02/14/prediction-technology-in-meituan-elastic-scaling.html",
"author": "美团技术团队",
"description": "在管理企业大规模服务弹性伸缩的场景下Web应用的负载时序数据分析和预测至关重要。然而由于应用的周期性特征和负载的复杂性寻找一种能够适应所有应用的预测模型成为了一项挑战。美团与中国人民大学信息学院柴云鹏教授团队展开了“预测技术在弹性伸缩场景的应用”科研合作取得了较好的成果。希望能给从事相关研究工作的同学带来一些帮助或启发。",
"published": "2025-02-14 08:00:00",
"source": "美团技术团队"
},
{
"title": "美团技术年货 | 600+页电子书,算法、工程、测试、数据、安全系列大合集",
"link": "https://tech.meituan.com/2025/01/16/2024-spring-festival-present.html",
"author": "美团技术团队",
"description": "值蛇年春节到来之际我们精选过去一年公众号30多篇技术文章和科研论文整理制作成一本600多页的电子书作为一份特别的新年礼物献给每一位热爱技术的你。愿大家乘风破浪勇往直前",
"published": "2025-01-16 08:00:00",
"source": "美团技术团队"
},
{
"title": "鸿蒙应用签名实操及机制探究",
"link": "https://tech.meituan.com/2025/01/06/openharmony.html",
"author": "美团技术团队",
"description": "本文对鸿蒙公开资料进行了深入分析和解读,梳理了鸿蒙单框架应用的签名机制,拆解每一步的实操过程和背后的实现原理,并对源码分析整理签名的校验机制。从中管中窥豹,探究鸿蒙系统的安全设计思路,希望能给从事鸿蒙研发的同学提供一些借鉴。",
"published": "2025-01-06 08:00:00",
"source": "美团技术团队"
},
{
"title": "2024 | 美团技术团队热门技术文章汇总",
"link": "https://tech.meituan.com/2024/12/26/2024-happy-new-year-top10.html",
"author": "美团技术团队",
"description": "本文整理了2024年美团技术团队最为热门的10篇技术文章这些文章覆盖了基础理论、数据存储、因果推断、搜索推荐、智能测试、知识图谱、领域驱动设计等多个技术领域期望这些精选内容能为大家带来一些启发或帮助。愿大家在新的一年里持续深耕技术沃土稳步前行不断攀登新的高峰。",
"published": "2024-12-26 08:00:00",
"source": "美团技术团队"
},
{
"title": "AutoConsisUI内容一致性智能检测",
"link": "https://tech.meituan.com/2024/11/21/autoconsis-ui-meituan.html",
"author": "美团技术团队",
"description": "美团到店研发平台质量工程部与复旦大学计算机学院周扬帆教授团队展开了大前端智能化测试领域的科研合作从UI界面内容一致性校验入手并实现了一套自动化智能检测流程相关论文被软件工程领域具有国际影响力的会议ICSE 2024CCF-A类会议的Software In Practice Track软件工程实践应用收录。",
"published": "2024-11-21 08:00:00",
"source": "美团技术团队"
},
{
"title": "CIKM 2024 | 美团技术团队精选论文解读",
"link": "https://tech.meituan.com/2024/10/31/cikm-2024-meituan.html",
"author": "美团技术团队",
"description": "本文精选了美团技术团队被 CIKM 2024 收录的 8 篇论文进行解读覆盖了自监督学习、解释生成、CTR预测、跨域推荐、向量召回、图像生成、时效预测等多个技术领域。这些论文有美团独立研究还有跟高校、科研机构合作的成果。希望能给从事相关研究工作的同学带来一些帮助或启发。",
"published": "2024-10-31 08:00:00",
"source": "美团技术团队"
},
{
"title": "大前端:如何突破动态化容器的天花板?",
"link": "https://tech.meituan.com/2024/10/18/recce-in-meituan.html",
"author": "美团技术团队",
"description": "长久以来,容器要实现动态化和双端复用,难免要牺牲掉一些性能。有没有办法让动态化容器的性能尽可能接近原生?美团金服大前端团队给出了一种解决方案,尝试突破动态化容器的天花板。",
"published": "2024-10-18 08:00:00",
"source": "美团技术团队"
},
{
"title": "僵尸网络911 S5的数字遗产",
"link": "https://blog.netlab.360.com/911s5/",
"author": "lvxing",
"description": "<h1 id=\"%E6%A6%82%E8%BF%B0\">&#x6982;&#x8ff0;</h1><p>2024&#x5e74;5&#x6708;29&#x65e5;&#xff0c;&#x7f8e;&#x56fd;&#x53f8;&#x6cd5;&#x90e8;&#x53d1;&#x5e03;&#x901a;&#x544a;&#xff0c;&#x58f0;&#x79f0;&#x5176;&#x6267;&#x6cd5;&#x6d3b;&#x52a8;&#x6467;&#x6bc1;&#x4e86;&quot;&#x53f2;&#x4e0a;&#x6700;&#x5927;&#x7684;&#x50f5;&#x5c38;&#x7f51;&#x7edc;&quot; 911 S5&#xff0c;&#x67e5;&#x5c01;&#x4e86;&#x76f8;&#x5173;&#x57df;&#x540d;</p>",
"published": "Fri, 14 Jun 2024 09:20:11 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Heads up! Xdr33, A Variant Of CIAs HIVE Attack Kit Emerges",
"link": "https://blog.netlab.360.com/headsup_xdr33_variant_of_ciahive_emeerges/",
"author": "Alex.Turing",
"description": "<h1 id=\"overview\">Overview</h1>\n<p>On Oct 21, 2022, 360Netlab&apos;s honeypot system captured a suspicious ELF file <code>ee07a74d12c0bb3594965b51d0e45b6f</code>, which propagated via F5 vulnerability with zero VT detection, our system observces that it communicates with IP <code>45.9.150.144</code> using SSL with <strong>forged Kaspersky certificates</strong>, this caught our attention. After further lookup,</p>",
"published": "Tue, 10 Jan 2023 14:00:37 GMT",
"source": "360 Netlab Blog"
},
{
"title": "警惕魔改后的CIA攻击套件Hive进入黑灰产领域",
"link": "https://blog.netlab.360.com/warning-hive-variant-xdr33-is-coming_cn/",
"author": "Alex.Turing",
"description": "<!--kg-card-begin: markdown--><h1 id=\"id\">&#x6982;&#x8ff0;</h1>\n<p>2022&#x5e74;10&#x6708;21&#x65e5;&#xff0c;360Netlab&#x7684;&#x871c;&#x7f50;&#x7cfb;&#x7edf;&#x6355;&#x83b7;&#x4e86;&#x4e00;&#x4e2a;&#x901a;&#x8fc7;F5&#x6f0f;&#x6d1e;&#x4f20;&#x64ad;&#xff0c;VT 0&#x68c0;&#x6d4b;&#x7684;&#x53ef;&#x7591;ELF&#x6587;&#x4ef6;<code>ee07a74d12c0bb3594965b51d0e45b6f</code>&#xff0c;&#x6d41;&#x91cf;&#x76d1;&#x63a7;&#x7cfb;&#x7edf;&#x63d0;&#x793a;&#x5b83;&#x548c;</p>",
"published": "Mon, 09 Jan 2023 03:13:20 GMT",
"source": "360 Netlab Blog"
},
{
"title": "快讯使用21个漏洞传播的DDoS家族WSzero已经发展到第4个版本",
"link": "https://blog.netlab.360.com/new-ddos-botnet-wszeor/",
"author": "Hui Wang",
"description": "<!--kg-card-begin: markdown--><h2 id=\"id\">&#x6982;&#x8ff0;</h2>\n<p>&#x8fd1;&#x671f;&#xff0c;&#x6211;&#x4eec;&#x7684;BotMon&#x7cfb;&#x7edf;&#x8fde;&#x7eed;&#x6355;&#x83b7;&#x5230;&#x4e00;&#x4e2a;&#x7531;Go&#x7f16;&#x5199;&#x7684;DDoS&#x7c7b;&#x578b;&#x7684;&#x50f5;&#x5c38;&#x7f51;&#x7edc;&#x5bb6;&#x65cf;&#xff0c;&#x5b83;&#x7528;&#x4e8e;DDoS&#x653b;&#x51fb;&#xff0c;&#x4f7f;&#x7528;&#x4e86;&#x5305;&#x62ec;SSH/Telnet&#x5f31;&#x53e3;</p>",
"published": "Wed, 07 Dec 2022 12:58:21 GMT",
"source": "360 Netlab Blog"
},
{
"title": "P2P Botnets: Review - Status - Continuous Monitoring",
"link": "https://blog.netlab.360.com/p2p-botnets-review-status-continuous-monitoring/",
"author": "360Netlab",
"description": "<h1 id=\"origins\">Origins</h1>\n<p>P2P networks are more scalable and robust than traditional C/S structures, and these advantages were recognized by the botnet authors early on and used in their botnets. In terms of time, <a href=\"https://en.wikipedia.org/wiki/Storm_botnet?ref=blog.netlab.360.com\">Storm</a>, which appeared in 2007, can be considered the progenitor of this area, when botnet threats were</p>",
"published": "Thu, 03 Nov 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "P2P 僵尸网络:回顾·现状·持续监测",
"link": "https://blog.netlab.360.com/p2p-botnet-monitor/",
"author": "360Netlab",
"description": "<!--kg-card-begin: markdown--><h1 id=\"id\">&#x7f18;&#x8d77;</h1>\n<p>P2P&#x7ed3;&#x6784;&#x7684;&#x7f51;&#x7edc;&#x6bd4;&#x4f20;&#x7edf;&#x7684;C/S&#x7ed3;&#x6784;&#x5177;&#x6709;&#x66f4;&#x597d;&#x7684;&#x53ef;&#x6269;&#x5c55;&#x6027;&#x548c;&#x5065;&#x58ee;&#x6027;&#xff0c;&#x8fd9;&#x4e9b;&#x4f18;&#x70b9;&#x5f88;&#x65e9;&#x5c31;&#x4e3a;botnet&#x7684;&#x4f5c;&#x8005;&#x6240;&#x8ba4;&#x8bc6;&#x5230;&#x5e76;&#x88ab;&#x7528;&#x5230;</p>",
"published": "Wed, 02 Nov 2022 03:11:33 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Fodcha Is Coming Back, Raising A Wave of Ransom DDoS",
"link": "https://blog.netlab.360.com/fodcha-is-coming-back-with-rddos/",
"author": "Alex.Turing",
"description": "<h1 id=\"background\">Background</h1>\n<p>On April 13, 2022, 360Netlab first disclosed the <code>Fodcha</code> botnet. After our article was published, Fodcha suffered a crackdown from the relevant authorities, and its authors quickly responded by leaving <code>&quot;Netlab pls leave me alone I surrender&quot;</code> in an updated sample.No surprise, Fodcha&apos;s authors</p>",
"published": "Mon, 31 Oct 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "卷土重来的DDoS狂魔Fodcha僵尸网络再次露出獠牙",
"link": "https://blog.netlab.360.com/ddosmonster_the_return_of__fodcha_cn/",
"author": "Alex.Turing",
"description": "<h1 id=\"%E8%83%8C%E6%99%AF\">&#x80cc;&#x666f;</h1>\n<p>2022&#x5e74;4&#x6708;13&#x65e5;&#xff0c;360Netlab&#x9996;&#x6b21;&#x5411;&#x793e;&#x533a;&#x62ab;&#x9732;&#x4e86;Fodcha&#x50f5;&#x5c38;&#x7f51;&#x7edc;&#xff0c;&#x5728;&#x6211;&#x4eec;&#x7684;&#x6587;&#x7ae0;&#x53d1;&#x8868;&#x4e4b;&#x540e;&#xff0c;Fodcha&#x906d;&#x53d7;&#x5230;&#x76f8;&#x5173;&#x90e8;&#x95e8;&#x7684;&#x6253;&#x51fb;&#xff0c;&#x5176;&#x4f5c;&#x8005;</p>",
"published": "Thu, 27 Oct 2022 02:49:26 GMT",
"source": "360 Netlab Blog"
},
{
"title": "PureCrypter is busy pumping out various malicious malware families",
"link": "https://blog.netlab.360.com/purecrypter-is-busy-pumping-out-various-malicious-malware-families/",
"author": "wanghao",
"description": "<p>In our daily botnet analysis work, it is common to encounter various loaders.Compared to other types of malware, loaders are unique in that they are mainly used to &quot;promote&quot;, i.e., download and run other malware on the infected machine. According to our observations, most loaders are</p>",
"published": "Mon, 29 Aug 2022 13:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "PureCrypter Loader持续活跃已经传播了10多个其它家族",
"link": "https://blog.netlab.360.com/purecrypter/",
"author": "wanghao",
"description": "<!--kg-card-begin: markdown--><p>&#x5728;&#x6211;&#x4eec;&#x7684;&#x65e5;&#x5e38;botnet&#x5206;&#x6790;&#x5de5;&#x4f5c;&#x4e2d;&#xff0c;&#x78b0;&#x5230;&#x5404;&#x79cd;loader&#x662f;&#x5e38;&#x4e8b;&#x3002;&#x8ddf;&#x5176;&#x5b83;&#x79cd;&#x7c7b;&#x7684;malware&#x76f8;&#x6bd4;&#xff0c;loader&#x7684;&#x7279;&#x6b8a;&#x4e4b;&#x5904;&#x5728;&#x4e8e;&#x5b83;&#x4e3b;&#x8981;&#x7528;&#x6765;&#x201c;&#x63a8;&#x5e7f;&#x201d;&#xff0c;</p>",
"published": "Mon, 29 Aug 2022 01:20:17 GMT",
"source": "360 Netlab Blog"
},
{
"title": "A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information",
"link": "https://blog.netlab.360.com/a-new-botnet-orchard-generates-dga-domains-with-bitcoin-transaction-information/",
"author": "daji",
"description": "<p>DGA is one of the classic techniques for botnets to hide their C2s, attacker only needs to selectively register a very small number of C2 domains, while for the defenders, it is difficult to determine in advance which domain names will be generated and registered.</p><p>360 netlab has long focused</p>",
"published": "Fri, 05 Aug 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "DGA家族Orchard持续变化新版本用比特币交易信息生成DGA域名",
"link": "https://blog.netlab.360.com/orchard-dga/",
"author": "daji",
"description": "<!--kg-card-begin: markdown--><p>DGA&#x662f;&#x4e00;&#x79cd;&#x7ecf;&#x5178;&#x7684;botnet&#x5bf9;&#x6297;&#x68c0;&#x6d4b;&#x7684;&#x6280;&#x672f;&#xff0c;&#x5176;&#x539f;&#x7406;&#x662f;&#x4f7f;&#x7528;&#x67d0;&#x79cd;DGA&#x7b97;&#x6cd5;&#xff0c;&#x7ed3;&#x5408;&#x7279;&#x5b9a;&#x7684;&#x79cd;&#x5b50;&#x548c;&#x5f53;&#x524d;&#x65e5;&#x671f;&#xff0c;&#x5b9a;&#x671f;&#x751f;&#x6210;&#x5927;&#x91cf;&#x7684;&#x57df;&#x540d;</p>",
"published": "Fri, 05 Aug 2022 03:31:07 GMT",
"source": "360 Netlab Blog"
},
{
"title": "公有云网络安全威胁情报202204",
"link": "https://blog.netlab.360.com/public-cloud-threat-intelligence-202204/",
"author": "360Netlab",
"description": "<!--kg-card-begin: markdown--><h2 id=\"id\">&#x6982;&#x8ff0;</h2>\n<!--kg-card-end: markdown--><blockquote>&#x672c;&#x6587;&#x805a;&#x7126;&#x4e8e;&#x4e91;&#x4e0a;&#x91cd;&#x70b9;&#x8d44;&#x4ea7;&#x7684;&#x626b;&#x63cf;&#x653b;&#x51fb;&#x3001;&#x4e91;&#x670d;&#x52a1;&#x5668;&#x603b;&#x4f53;&#x653b;&#x51fb;&#x60c5;&#x51b5;&#x5206;&#x6790;&#x3001;&#x70ed;&#x95e8;&#x6f0f;&#x6d1e;&#x53ca;&#x6076;&#x610f;&#x7a0b;&#x5e8f;&#x7684;&#x653b;&#x51fb;&#x5a01;&#x80c1;&#x3002;</blockquote><!--kg-card-begin: markdown--><ul>\n<li><a href=\"https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com\">360&#x9ad8;&#x7ea7;</a></li></ul>",
"published": "Wed, 11 May 2022 02:53:55 GMT",
"source": "360 Netlab Blog"
},
{
"title": "公有云网络安全威胁情报202203",
"link": "https://blog.netlab.360.com/public-cloud-threat-intelligence-202203/",
"author": "360Netlab",
"description": "<h3 id=\"-\">&#x6982;&#x8ff0;</h3><blockquote>&#x672c;&#x6587;&#x805a;&#x7126;&#x4e8e;&#x4e91;&#x4e0a;&#x91cd;&#x70b9;&#x8d44;&#x4ea7;&#x7684;&#x626b;&#x63cf;&#x653b;&#x51fb;&#x3001;&#x4e91;&#x670d;&#x52a1;&#x5668;&#x603b;&#x4f53;&#x653b;&#x51fb;&#x60c5;&#x51b5;&#x5206;&#x6790;&#x3001;&#x70ed;&#x95e8;&#x6f0f;&#x6d1e;&#x53ca;&#x6076;&#x610f;&#x7a0b;&#x5e8f;&#x7684;&#x653b;&#x51fb;&#x5a01;&#x80c1;&#x3002;</blockquote><ul><li><a href=\"https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com\">360&#x9ad8;&#x7ea7;</a></li></ul>",
"published": "Tue, 19 Apr 2022 02:24:17 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Fodcha, a new DDos botnet",
"link": "https://blog.netlab.360.com/fodcha-a-new-ddos-botnet/",
"author": "Hui Wang",
"description": "<h2 id=\"overview\">Overview</h2><p>Recently, CNCERT and 360netlab worked together and discovered a rapidly spreading DDoS botnet on the Internet. The global infection looks fairly big as just in China there are more than 10,000 daily active bots (IPs) and alsomore than 100 DDoS victims beingtargeted on a daily basis. We named</p>",
"published": "Wed, 13 Apr 2022 14:01:14 GMT",
"source": "360 Netlab Blog"
},
{
"title": "机器学习的逻辑回归模型",
"link": "https://paper.seebug.org/3303/",
"author": "",
"description": ".katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日\n1. 前言\n在「机器学习的线性回归模型」文章中我们学习了监督学习中如何使用线性回归模型拟合连...",
"published": "2025-03-13 15:37:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最憋屈的漏洞披露",
"link": "https://paper.seebug.org/3304/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/Y8-wT88VnLeMUiD-HssPyw\n在网络安全领域漏洞披露一直被视为保护用户的重要环节但在现实中这一过程却充满了争议和矛盾。究竟什么才算得上“负责任的披露”当厂商在信息公开和补丁发布上占据主导地位而安全研究者则需要耗费大量精力进行沟通与博弈这一模式是否还能真正实现保护用户安全的初衷...",
"published": "2025-03-12 16:28:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最“安全”的防线",
"link": "https://paper.seebug.org/3302/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/LaM5iz_EKbAK_lkaAcBshw\n在攻防对抗日益激烈的2024年安全软件一直被视为企业安全防线的重要基石。然而这些安全软件本身也可能存在漏洞甚至被攻击者利用作为入侵的跳板来对用户造成危害。多年来因为安全软件而导致的事故不禁让人产生一个疑问——安全软件真的可信吗\n安全软件被滥用为攻击工...",
"published": "2025-03-11 16:39:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最难以阻挡的攻防趋势",
"link": "https://paper.seebug.org/3301/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/lUA03YjBiCAatcJh-bUHEQ\n近年来漏洞攻防不断演进。从多年前仅需一个栈溢出就能攻破系统到如今需要运用各种精妙的手法来突破系统的层层防御。“盾”与“矛”始终处于动态对抗每当新的防御措施出现新的攻击手段随之而来。防御机制的升级促使攻击者寻找新的突破口而攻击方法的创新又推动着防御技术...",
"published": "2025-03-10 16:19:00",
"source": "知道创宇404实验室"
},
{
"title": "机器学习的线性回归模型",
"link": "https://paper.seebug.org/3300/",
"author": "",
"description": ".katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\n跟随着 ChatGPT 等大语言模型掀起的人工智能的浪潮,在这个时间点学习 A...",
"published": "2025-03-07 15:22:00",
"source": "知道创宇404实验室"
},
{
"title": "Llama 的悖论:深入探索 Llama.cpp 的堆迷宫,从堆溢出到远程代码执行",
"link": "https://paper.seebug.org/3299/",
"author": "",
"description": "作者Patrick Peng \n译者知道创宇404实验室翻译组\n原文链接https://retr0.blog/blog/llama-rpc-rce\n我一直对 Llama.cpp 情有独钟,它堪称我在人工智能与机器学习研究领域孜孜以求的“终极目标”。不仅如此,能在如此复杂且成熟的人工智能项目中挖掘出堆栈/堆溢出导致的远程代码执行漏洞,听起来就格外酷炫。当然,我内心深处渴望在人工智能项目中...",
"published": "2025-03-06 14:27:00",
"source": "知道创宇404实验室"
},
{
"title": "Emoji攻击增强针对Judge LLMs检测的越狱攻击",
"link": "https://paper.seebug.org/3297/",
"author": "",
"description": "作者Zhipeng Wei, Yuqi Liu, N. Benjamin Erichson\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2411.01077v2\n摘要\n越狱Jailbreaking技术可以欺骗大型语言模型LLMs使其生成受限制的输出从而构成严重威胁。其中一种防御方法是使用另一个 LLM 作为 Judge裁判来评估...",
"published": "2025-03-04 17:37:00",
"source": "知道创宇404实验室"
},
{
"title": "模型序列化攻击",
"link": "https://paper.seebug.org/3298/",
"author": "",
"description": "译者知道创宇404实验室翻译组\n原文链接https://github.com/protectai/modelscan/blob/main/docs/model_serialization_attacks.md\n机器学习ML模型是基于机器学习的应用程序的核心资产。安全地存储和检索模型对成功至关重要。根据使用的机器学习库模型可以以多种常见格式保存。流行的选择包括Pickle、HDF5...",
"published": "2025-03-04 15:09:00",
"source": "知道创宇404实验室"
},
{
"title": "关于 Chat Template 注入方式的学习",
"link": "https://paper.seebug.org/3296/",
"author": "",
"description": "作者: dawu@知道创宇404实验室\n日期: 2025年2月28日 \n1. 前言\n伴随着年后 DeepSeek R1 模型的火热,号称能运行 DeepSeek R1 “满血版” 的 Ktransformers 框架也受到了大量关注。在使用该框架和阅读相关源码时,我发现框架在借助聊天模版(chat template) 将用户输入转化为输入模型的 token 列表的过程中,可能会存在类似于拼...",
"published": "2025-03-03 14:35:00",
"source": "知道创宇404实验室"
},
{
"title": "从零开始搭建:基于本地 DeepSeek 的 Web 蜜罐自动化识别",
"link": "https://paper.seebug.org/3295/",
"author": "",
"description": "作者wh0am1i@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\npocsuite3 框架可以通过 --dork 或 --dork-zoomeye 参数获取 ZoomEye 网络空间测绘平台的搜索引擎数据。但随着近几年网络空间领域的攻防对抗升级导致网络空间中存在大量的蜜罐。为了过滤掉这些蜜罐ZoomEye 中加入了自动标注蜜罐的识别算法, 同时 pocsuite3 ...",
"published": "2025-02-28 14:18:00",
"source": "知道创宇404实验室"
},
{
"title": "DeepSeek 启示:深度揭秘基于 PTX 的 GPU 底层优化技术",
"link": "https://paper.seebug.org/3294/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/FVVes7UIK_OORUk3fXy9mQ\n一、概述\n近日DeepSeek连续不断地开源了多个项目一时间引发了关于GPU底层优化的热潮这在如今国内算力被广泛打压的背景下给我国在现代高性能计算HPC和人工智能AI领域带来了希望其中尤其引人瞩目的是关于底层PTX优化技术引入这在一定程度...",
"published": "2025-02-27 15:24:00",
"source": "知道创宇404实验室"
},
{
"title": "银狐突袭DeepSeek本地化部署暗藏“致命陷阱”",
"link": "https://paper.seebug.org/3293/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/VUzwaR7eti2YoNebGFz80A\n一、前言\n近期国产大模型DeepSeek凭借其高效的推理能力、创新性的优化技术、低门槛本地化部署能力、灵活的开源商业授权等迅速成为开源生态中的“现象级选手”。然而技术普及的加速期往往伴随着网络安全攻防对抗的升级。当前大量政府、企业和个人开发者在基于D...",
"published": "2025-02-27 10:47:00",
"source": "知道创宇404实验室"
},
{
"title": "使用 DeepSeek-R1 在固件漏洞挖掘领域的新实践",
"link": "https://paper.seebug.org/3292/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/rZ4iGXs2O_xYD1yEOyu3CQ\n1. 前言\n在数字化时代固件是硬件设备的核心软件组件直接控制着硬件的运行状态和功能其安全性至关重要。一旦固件存在安全漏洞黑客即可利用来攻击设备的运行或者控制设备发起其它网络攻击典型有Mirai病毒利用设备固件漏洞发起大规模的分布式拒绝服务。因此挖...",
"published": "2025-02-26 15:20:00",
"source": "知道创宇404实验室"
},
{
"title": "Fuzz 工作流解析与 AI 引入方案分享",
"link": "https://paper.seebug.org/3291/",
"author": "",
"description": "作者ghost461@知道创宇404实验室\n时间2025年2月26日\n本文为知道创宇404实验室内部分享沙龙“404 Open Day”的议题内容作为目前团队AI安全研究系列的一部分分享出来与大家一同交流学习。\n1. 概述\n本文受 Google 安全博客的《Leveling Up Fuzzing: Finding more vulnerabilities with AI》启发结合自...",
"published": "2025-02-26 14:10:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最悲剧的后门",
"link": "https://paper.seebug.org/3290/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/BZtSTpTQbNiAY_KDhnqc8Q\n“看到了软件的源码就意味着没有后门吗”\n1983年的图灵奖颁奖仪式上Ken Thompson抛出了这个问题。作为历史上唯三在40岁以下获得图灵奖的传奇之一他在获奖演讲中向听众展示了如何通过在编译器中植入后门来骇入由无害源码编译得到的Unix系统。Ken...",
"published": "2025-02-25 17:17:00",
"source": "知道创宇404实验室"
},
{
"title": "AI 帮你高效构建代码安全策略【大模型应用实践系列四】",
"link": "https://security.tencent.com/index.php/blog/msg/213",
"author": "",
"description": "腾讯啄木鸟代码安全团队依托混元大模型的超强代码理解和安全分析能力在SQL注入威胁检测场景验证中新增识别上百个漏洞检测策略相比传统方法人效比提升3.8倍在Github高star项目上斩获10+0day漏洞。",
"published": "2025-01-08 10:26:57",
"source": "腾讯安全响应中心"
},
{
"title": "AI猎手我们用大模型挖到了0day漏洞【大模型应用实践系列三】",
"link": "https://security.tencent.com/index.php/blog/msg/212",
"author": "",
"description": "AI版“赏金猎人”登场基于混元大模型能力打造的自动漏洞挖掘工具7*24小时自动感知、追踪、挖橱0day。 AI猎人VS黑客的角逐战正式开始。",
"published": "2025-01-03 10:23:17",
"source": "腾讯安全响应中心"
},
{
"title": "AI助力明文密码泄漏无处遁形【大模型应用实践系列二】",
"link": "https://security.tencent.com/index.php/blog/msg/211",
"author": "",
"description": "本文聚焦于密钥硬编码的问题,分析了传统检测策略的缺陷,并详细介绍了大模型在该场景下的优势、检测实施方案和效果。我们将继续推出更多关于大模型在研发安全、网络安全、威胁情报等领域的应用探索与总结",
"published": "2024-12-05 17:14:13",
"source": "腾讯安全响应中心"
},
{
"title": "大模型应用实践AI助力Code Review安全漏洞发现",
"link": "https://security.tencent.com/index.php/blog/msg/210",
"author": "",
"description": "借助混元大模型腾讯啄木鸟代码安全团队在代码评审Code Review下文简称CR场景下的安全漏洞检出能力取得显著提升日均发现和阻断300+个代码安全风险,极大提升了公司核心数据资产安全性。",
"published": "2024-11-27 10:39:46",
"source": "腾讯安全响应中心"
},
{
"title": "警惕Hugging Face开源组件风险被利用于大模型供应链攻击",
"link": "https://security.tencent.com/index.php/blog/msg/209",
"author": "",
"description": "著名AI社区Hugging Face开源组件datasets存在不安全特性可引发供应链后门投毒攻击风险。",
"published": "2023-11-03 14:00:00",
"source": "腾讯安全响应中心"
},
{
"title": "虚拟货币挖矿检测与防御",
"link": "https://security.tencent.com/index.php/blog/msg/208",
"author": "",
"description": "从流量和主机层入手,分析挖矿木马的防御之策。",
"published": "2021-11-18 18:00:58",
"source": "腾讯安全响应中心"
},
{
"title": "安全通知NPM官方仓库遭遇coa等恶意包投毒攻击",
"link": "https://security.tencent.com/index.php/blog/msg/207",
"author": "",
"description": "腾讯洋葱入侵检测系统发现开源软件沙箱主机出现异常行为跟进发现npm官方仓库的coa、rc被投毒攻击已经在腾讯软件源紧急拦截相关版本。目前npm官方仓库已将相应版本的恶意包删除但由于国内开源镜像站均同步npm官方仓库且存在缓存所以恶意包还可能通过各个开源镜像站影响广大用户。",
"published": "2021-11-05 21:31:07",
"source": "腾讯安全响应中心"
},
{
"title": "云原生安全攻防使用eBPF逃逸容器技术分析与实践",
"link": "https://security.tencent.com/index.php/blog/msg/206",
"author": "",
"description": "在新版本容器运行时中适用的攻击手法,并使用新方式把“任意文件写”转化为“远程代码执行”。",
"published": "2021-11-03 18:56:37",
"source": "腾讯安全响应中心"
},
{
"title": "Ghostscript沙箱绕过(CVE-2021-3781)分析",
"link": "https://security.tencent.com/index.php/blog/msg/205",
"author": "",
"description": "完整分析从ImageMagick到Ghostscript的攻击利用链",
"published": "2021-10-29 18:40:35",
"source": "腾讯安全响应中心"
},
{
"title": "实时中文语音克隆——开源项目MockingBird体验",
"link": "https://security.tencent.com/index.php/blog/msg/204",
"author": "",
"description": "5秒内克隆生成任意声音以语音克隆开源项目MockingBird为例看AI项目面临的安全风险",
"published": "2021-10-27 22:06:51",
"source": "腾讯安全响应中心"
},
{
"title": "关于BGP那些事儿",
"link": "https://security.tencent.com/index.php/blog/msg/203",
"author": "",
"description": "这是Facebook创立以来最严重的一次网络访问事故在这起故障中我们又看到了BGP的身影",
"published": "2021-10-19 18:10:52",
"source": "腾讯安全响应中心"
},
{
"title": "红蓝对抗之隐蔽通信应用及防御",
"link": "https://security.tencent.com/index.php/blog/msg/202",
"author": "",
"description": "腾讯蓝军和红军十多年案例经验、总结沉淀",
"published": "2021-09-27 16:40:43",
"source": "腾讯安全响应中心"
},
{
"title": "Web应用组件自动化发现的探索",
"link": "https://security.tencent.com/index.php/blog/msg/201",
"author": "",
"description": "另一种方式的指纹识别",
"published": "2021-09-17 19:30:59",
"source": "腾讯安全响应中心"
},
{
"title": "云原生——容器和应用安全运营实践思考",
"link": "https://security.tencent.com/index.php/blog/msg/200",
"author": "",
"description": "从安全攻击面出发,以防御视角分享我们在云原生安全运营上的一些实践和思考",
"published": "2021-09-07 18:00:59",
"source": "腾讯安全响应中心"
},
{
"title": "自动化数据分析下的威胁发现",
"link": "https://security.tencent.com/index.php/blog/msg/199",
"author": "",
"description": "企业防御之安全运营数据分析",
"published": "2021-08-16 18:41:00",
"source": "腾讯安全响应中心"
},
{
"title": "可信安全网络 —— 安全左移之DDoS对抗",
"link": "https://security.tencent.com/index.php/blog/msg/198",
"author": "",
"description": "DDoS对抗新思路",
"published": "2021-07-28 18:13:13",
"source": "腾讯安全响应中心"
},
{
"title": "攻防启示Chromium组件风险剖析与收敛",
"link": "https://security.tencent.com/index.php/blog/msg/197",
"author": "",
"description": "Chromium内核的安全问题早已悄无声息地牵动着互联网生活方方面面。基于对实战经历的复盘本文将从Chromium架构及安全机制概况入手剖析Chromium组件在多场景下给企业带来的安全风险并一探收敛方案。",
"published": "2021-07-15 10:30:58",
"source": "腾讯安全响应中心"
},
{
"title": "腾讯 SOAR 的安全运营探索",
"link": "https://security.tencent.com/index.php/blog/msg/196",
"author": "",
"description": "与业界先行者相比,我们数据面板、剧本等平台功能方面仍有一些差距,未来也会持续建设",
"published": "2021-07-09 17:55:48",
"source": "腾讯安全响应中心"
},
{
"title": "警惕!这种新型挖矿可能盯上你主机",
"link": "https://security.tencent.com/index.php/blog/msg/195",
"author": "",
"description": "除了门罗币这种不消耗CPU资源的虚拟货币可能成为黑产的新宠儿提前预知方能不乱阵脚。",
"published": "2021-07-01 20:27:10",
"source": "腾讯安全响应中心"
},
{
"title": "腾讯自研HIDS「洋葱」后台上云架构演进实践",
"link": "https://security.tencent.com/index.php/blog/msg/194",
"author": "",
"description": "云计算时代,洋葱拥抱云原生方案实践,希望能为大家系统上云提供参考。",
"published": "2021-06-17 18:16:08",
"source": "腾讯安全响应中心"
},
{
"title": "荣誉 | 美团SRC2024年终奖励荣耀揭晓",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493717&idx=1&sn=fe94bf647a29fff908cc7ed29b70554c&chksm=ec180986db6f80904efbb237256479db8ebb60e2521763cbbb272c604f641c3549211606bcc5&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "向每一位守护者致敬!",
"published": "2025-01-17 18:01:00",
"source": "微信公众号"
},
{
"title": "美团SRC邀您领取新年礼盒啦",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493717&idx=2&sn=f317d3190e4e199c933d1b29fa2f2d94&chksm=ec180986db6f809093c190d72edcad5b3b289422052597427f2eeb42ea44a93a729aff84a87c&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "获取方式见文中。",
"published": "2025-01-17 18:01:00",
"source": "微信公众号"
},
{
"title": "鸿蒙应用签名实操及机制探究",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493695&idx=1&sn=89a37bdee61841877d1acf28b8a68cbf&chksm=ec1809ecdb6f80faccbf32d3be7076832bfb6b0d443881e05d93cac96cecaad3952bdf8fba50&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "本文对鸿蒙公开资料进行了深入分析和解读,梳理了鸿蒙单框架应用的签名机制,拆解每一步的实操过程和背后的实现原理,并对源码分析整理签名的校验机制。",
"published": "2024-12-31 10:01:00",
"source": "微信公众号"
},
{
"title": "白帽世界大会 | 美团SRC期待与您在澳门相见",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493590&idx=1&sn=0281d8d3faa07d26a91b338102cb7c61&chksm=ec180605db6f8f138853b493e0e34cf24d9ccc265a72fc721fba5cfbd25c0854f757b3cd0e16&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "HackProve World 2025用真正的技术验证数字世界的安全。",
"published": "2024-12-19 17:31:00",
"source": "微信公众号"
},
{
"title": "年末冲刺2024漏洞马拉松『美团站』正式启动",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493372&idx=1&sn=f8ed6cc9dc514805d164f9d47277e8f5&chksm=ec18072fdb6f8e39c609c95ac1b0aba49aa2e9f70246d4c7af7ce82ca6d40ee9caa7fef0e362&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间即日起至2024年12月15日。",
"published": "2024-12-03 18:30:00",
"source": "微信公众号"
},
{
"title": "活动|短视频激励系统专测开启!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493353&idx=1&sn=60d8aea7934fa17d1e2077e2b879d3ae&chksm=ec18073adb6f8e2cdb2c0881302bcad6094724119dd5f6d5e0ecccc18fc1e2323067d6d00593&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间11月25日-11月28日",
"published": "2024-11-25 10:00:00",
"source": "微信公众号"
},
{
"title": "活动美团SRC七周年多重惊喜派送中",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493342&idx=1&sn=5aadfd7e004ccab04ad3286741aeca6f&chksm=ec18070ddb6f8e1b739a0a4e922e09723ce21d5d296c78c97d8c69a515bcf67f4c84e27e7972&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间11月11日10: 00-11月18日0: 00",
"published": "2024-11-11 10:08:00",
"source": "微信公众号"
},
{
"title": "活动正式开启美团SRC邀您加入双11安全保卫战",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493302&idx=1&sn=38e8eb7b46ba68d83932055efcf06386&chksm=ec180765db6f8e73f7e8e9039563065a99de826daeafcb49ee5b0231e48816907e306d43fe1c&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "美团SRC活动时间2024.09.19-09.30",
"published": "2024-09-18 19:36:05",
"source": "微信公众号"
},
{
"title": "你的中秋福利已上线美团SRC预祝各位中秋佳节愉快",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493276&idx=1&sn=02f5b0a74938d0be8764ba9658a0c98e&chksm=ec18074fdb6f8e593725883103e1ae90af22dda6af3e178d008da8c28713a6d0ba252605396e&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "兑换时间9月5日18:00起。",
"published": "2024-09-05 11:42:42",
"source": "微信公众号"
},
{
"title": "美团安全25届秋招启动心动offer等你拿",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493276&idx=2&sn=ca4080f1e1607bb22730e538f02ea6a0&chksm=ec18074fdb6f8e5920d56d573dd6c838afb76315ebd36dc1f113f5a747fdf584302ecd8faf0b&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "网申时间即日起至2024年10月31日。",
"published": "2024-09-05 11:42:42",
"source": "微信公众号"
},
{
"title": "美团安全亮相KCon 2024分享RDI技术新视角",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493266&idx=1&sn=148ab2c53446796b415384e9fd0dbaf2&chksm=ec180741db6f8e572f536ff844ca8d39d378c9d8a24b6cdbaaad31101f21175ab9637b7f578d&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "RDI技术以其高效和隐蔽的特性在恶意代码开发中占据了不可替代的地位尤其是在现代C2架构中发挥着关键作用。",
"published": "2024-09-04 10:27:03",
"source": "微信公众号"
},
{
"title": "美团安全25届秋招启动心动offer等你拿",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493248&idx=1&sn=74436f59fe2d7b203814c0aa0c91800a&chksm=ec180753db6f8e45010393fcad6b673a46c7db73b98e93dbdff667495e798104c8ec3b8345b8&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "网申时间即日起至2024年10月31日。",
"published": "2024-08-28 10:27:44",
"source": "微信公众号"
},
{
"title": "美团安全团队在第五期移动互联网APP产品安全漏洞技术沙龙中分享移动应用自动化安全实践历程",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493233&idx=1&sn=fcbc3a07cee5cf64e3c6b24925e2bd46&chksm=ec1807a2db6f8eb4f9e072ab8c517a39542fe6943b282abfc2271cd3ac558ac504c019e15748&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-08-20 14:21:24",
"source": "微信公众号"
},
{
"title": "新机会,新挑战,新可能,美团信息安全部邀你加入~",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493119&idx=1&sn=ce5d6f489f9d802e5ff5075d90c1ca17&chksm=ec18042cdb6f8d3a4e15bdc3051d92275f75a65008e0b8ce8f0a67746aa967ad5e8cdd1be831&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "欢迎向我们投递简历或推荐身边朋友投递简历!",
"published": "2024-07-29 14:37:08",
"source": "微信公众号"
},
{
"title": "活动 | 开店宝专测已开启,邀你参加!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493104&idx=1&sn=3f5514acce114a1dfeb40fbba5738023&chksm=ec180423db6f8d356d65dc19e7934dca55a1fb1c9ff7b8428f7962b13e552a13af3920ba89b0&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间6月24日—6月30日",
"published": "2024-06-24 10:06:08",
"source": "微信公众号"
},
{
"title": "美团安全团队携议题亮相CSOP大会共探网络安全高效运营之道",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493090&idx=1&sn=8b1c7315ef4ae4b2331c0f75d181825e&chksm=ec180431db6f8d27893e8aa04f4f005c2dfa6ce34ad5d62215a6ce17fe070977e33e213ec309&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "议题聚焦于SOC平台的构建历程从概念的萌芽到实践的落地再到不断的优化升级各阶段进行深入探讨。",
"published": "2024-05-17 18:54:11",
"source": "微信公众号"
},
{
"title": "招聘 | 美团安全实习生招聘正在进行中",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493059&idx=1&sn=362fa696530db9493fa8c165e6f64e6b&chksm=ec180410db6f8d06d8e74196d9ef89d31c92ce0964c8fddc638fe17e2642ff0b9806086b55e5&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "一起成长一起BETTER",
"published": "2024-05-07 17:27:47",
"source": "微信公众号"
},
{
"title": "活动 | 优选专测,提供测试账号,速来!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493041&idx=1&sn=daf61012fec9f3aa6fd227dd1f39b828&chksm=ec180462db6f8d74fdff596bd8b60fab42607b31db7c8a820b9a1007af9036c59da29cc74151&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "4月23日至4月30日000邀你参与优选业务专测",
"published": "2024-04-23 09:56:55",
"source": "微信公众号"
},
{
"title": "特别漏洞奖励,祝你挖洞把把都超神~",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493024&idx=1&sn=c0b762ef29c35ece879f1fdb7560c710&chksm=ec180473db6f8d65ce15c48fdcd8ef0c2525421c8f95a70f6cb7f7d282ccc304faf03ac0c8a8&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-03-26 19:58:18",
"source": "微信公众号"
},
{
"title": "3倍活动戳这里",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493024&idx=2&sn=9ca5dd0591b7ffb8dd9cbd166d94826d&chksm=ec180473db6f8d65e4e4b185143fe292dc4aac665b4ae9e5607d14a79213d690aec68dce3daa&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-03-26 19:58:18",
"source": "微信公众号"
}
]

View File

@ -1,4 +1,454 @@
[ [
{
"title": "从PAGE_GUARD HOOK 到内存扫描规避",
"link": "https://xz.aliyun.com/t/17046",
"published": "2025-01-07T12:31:52+08:00",
"id": "https://xz.aliyun.com/t/17046",
"summary": {
"@type": "html",
"#text": "从PAGE_GUARD HOOK 到内存扫描规避"
}
},
{
"title": "免杀基础-硬断Hook",
"link": "https://xz.aliyun.com/t/17045",
"published": "2025-01-07T12:31:25+08:00",
"id": "https://xz.aliyun.com/t/17045",
"summary": {
"@type": "html",
"#text": "免杀基础-硬断Hook"
}
},
{
"title": "记一次题型VM-软件系统安全赛-pwn-<vm>",
"link": "https://xz.aliyun.com/t/17043",
"published": "2025-01-07T01:21:16+08:00",
"id": "https://xz.aliyun.com/t/17043",
"summary": {
"@type": "html",
"#text": "记一次题型VM-软件系统安全赛-pwn-<vm>"
}
},
{
"title": "aws之创建后门实现持久化利用的方式",
"link": "https://xz.aliyun.com/t/17040",
"published": "2025-01-06T17:14:00+08:00",
"id": "https://xz.aliyun.com/t/17040",
"summary": {
"@type": "html",
"#text": "aws之创建后门实现持久化利用的方式"
}
},
{
"title": "Sharp4Rundll32一款通过.NET反射实现Rundll32功能绕过安全防护的工具",
"link": "https://xz.aliyun.com/t/17038",
"published": "2025-01-06T15:54:34+08:00",
"id": "https://xz.aliyun.com/t/17038",
"summary": {
"@type": "html",
"#text": "Sharp4Rundll32一款通过.NET反射实现Rundll32功能绕过安全防护的工具"
}
},
{
"title": "软件系统安全赛CachedVisitor详解——记一次对Redis+ssrf的详细分析",
"link": "https://xz.aliyun.com/t/17036",
"published": "2025-01-06T12:07:06+08:00",
"id": "https://xz.aliyun.com/t/17036",
"summary": {
"@type": "html",
"#text": "软件系统安全赛CachedVisitor详解——记一次对Redis+ssrf的详细分析"
}
},
{
"title": "Lua项目下SSRF利用Redis文件覆盖lua回显RCE",
"link": "https://xz.aliyun.com/t/17034",
"published": "2025-01-06T10:05:25+08:00",
"id": "https://xz.aliyun.com/t/17034",
"summary": {
"@type": "html",
"#text": "Lua项目下SSRF利用Redis文件覆盖lua回显RCE"
}
},
{
"title": "MaxKB远程命令执行漏洞分析(CVE-2024-56137)",
"link": "https://xz.aliyun.com/t/17031",
"published": "2025-01-05T22:37:00+08:00",
"id": "https://xz.aliyun.com/t/17031",
"summary": {
"@type": "html",
"#text": "MaxKB远程命令执行漏洞分析(CVE-2024-56137)"
}
},
{
"title": "codeql 之 SSRF 漏洞自动化 寻找",
"link": "https://xz.aliyun.com/t/17030",
"published": "2025-01-05T21:18:11+08:00",
"id": "https://xz.aliyun.com/t/17030",
"summary": {
"@type": "html",
"#text": "codeql 之 SSRF 漏洞自动化 寻找"
}
},
{
"title": "使用分支对抗进行webshell bypass",
"link": "https://xz.aliyun.com/t/17029",
"published": "2025-01-05T18:33:40+08:00",
"id": "https://xz.aliyun.com/t/17029",
"summary": {
"@type": "html",
"#text": "使用分支对抗进行webshell bypass"
}
},
{
"title": "Solon内存马构造",
"link": "https://xz.aliyun.com/t/17028",
"published": "2025-01-05T17:36:22+08:00",
"id": "https://xz.aliyun.com/t/17028",
"summary": {
"@type": "html",
"#text": "Solon内存马构造"
}
},
{
"title": "强网杯RS加密签名伪造及PyramidWeb利用栈帧打内存马",
"link": "https://xz.aliyun.com/t/17027",
"published": "2025-01-05T17:12:56+08:00",
"id": "https://xz.aliyun.com/t/17027",
"summary": {
"@type": "html",
"#text": "强网杯RS加密签名伪造及PyramidWeb利用栈帧打内存马"
}
},
{
"title": "XXE 在文件上传当中的应用",
"link": "https://xz.aliyun.com/t/17026",
"published": "2025-01-05T17:10:20+08:00",
"id": "https://xz.aliyun.com/t/17026",
"summary": {
"@type": "html",
"#text": "XXE 在文件上传当中的应用"
}
},
{
"title": "php木马的混淆免杀探究",
"link": "https://xz.aliyun.com/t/17023",
"published": "2025-01-05T13:29:00+08:00",
"id": "https://xz.aliyun.com/t/17023",
"summary": {
"@type": "html",
"#text": "php木马的混淆免杀探究"
}
},
{
"title": "ctf中的字节爆破",
"link": "https://xz.aliyun.com/t/17022",
"published": "2025-01-04T19:37:51+08:00",
"id": "https://xz.aliyun.com/t/17022",
"summary": {
"@type": "html",
"#text": "ctf中的字节爆破"
}
},
{
"title": "Thinkphp6高版本反序列化toString新链调试挖掘",
"link": "https://xz.aliyun.com/t/17019",
"published": "2025-01-04T13:17:14+08:00",
"id": "https://xz.aliyun.com/t/17019",
"summary": {
"@type": "html",
"#text": "Thinkphp6高版本反序列化toString新链调试挖掘"
}
},
{
"title": "探究Pker对opcode字节码的利用",
"link": "https://xz.aliyun.com/t/17018",
"published": "2025-01-04T11:11:08+08:00",
"id": "https://xz.aliyun.com/t/17018",
"summary": {
"@type": "html",
"#text": "探究Pker对opcode字节码的利用"
}
},
{
"title": "Yaml反序列化name标签打响应头回显",
"link": "https://xz.aliyun.com/t/17017",
"published": "2025-01-04T01:27:15+08:00",
"id": "https://xz.aliyun.com/t/17017",
"summary": {
"@type": "html",
"#text": "Yaml反序列化name标签打响应头回显"
}
},
{
"title": "Pickle反序列化中的字节码重写绕过",
"link": "https://xz.aliyun.com/t/17016",
"published": "2025-01-03T23:50:09+08:00",
"id": "https://xz.aliyun.com/t/17016",
"summary": {
"@type": "html",
"#text": "Pickle反序列化中的字节码重写绕过"
}
},
{
"title": "【Reverse-Crypto】深入逆向-密码篇-MD5算法详解以及代码编写",
"link": "https://xz.aliyun.com/t/17014",
"published": "2025-01-03T21:40:27+08:00",
"id": "https://xz.aliyun.com/t/17014",
"summary": {
"@type": "html",
"#text": "【Reverse-Crypto】深入逆向-密码篇-MD5算法详解以及代码编写"
}
},
{
"title": "ORW侧信道时间盲注",
"link": "https://xz.aliyun.com/t/17011",
"published": "2025-01-03T21:22:32+08:00",
"id": "https://xz.aliyun.com/t/17011",
"summary": {
"@type": "html",
"#text": "ORW侧信道时间盲注"
}
},
{
"title": "AWDPWN流程与技巧总结",
"link": "https://xz.aliyun.com/t/17010",
"published": "2025-01-03T21:17:32+08:00",
"id": "https://xz.aliyun.com/t/17010",
"summary": {
"@type": "html",
"#text": "AWDPWN流程与技巧总结"
}
},
{
"title": "信呼 OA 最新 sql 注入分析",
"link": "https://xz.aliyun.com/t/17007",
"published": "2025-01-03T16:54:52+08:00",
"id": "https://xz.aliyun.com/t/17007",
"summary": {
"@type": "html",
"#text": "信呼 OA 最新 sql 注入分析"
}
},
{
"title": "某小说vip破解代码分析",
"link": "https://xz.aliyun.com/t/17006",
"published": "2025-01-03T16:01:37+08:00",
"id": "https://xz.aliyun.com/t/17006",
"summary": {
"@type": "html",
"#text": "某小说vip破解代码分析"
}
},
{
"title": "Hoverfly 任意文件读取漏洞分析",
"link": "https://xz.aliyun.com/t/17004",
"published": "2025-01-03T15:39:34+08:00",
"id": "https://xz.aliyun.com/t/17004",
"summary": {
"@type": "html",
"#text": "Hoverfly 任意文件读取漏洞分析"
}
},
{
"title": "Sekiro+Yakit 热加载无痛绕sign",
"link": "https://xz.aliyun.com/t/17003",
"published": "2025-01-03T15:09:34+08:00",
"id": "https://xz.aliyun.com/t/17003",
"summary": {
"@type": "html",
"#text": "Sekiro+Yakit 热加载无痛绕sign"
}
},
{
"title": "cJSON库函数存在的堆溢出漏洞分析",
"link": "https://xz.aliyun.com/t/16999",
"published": "2025-01-02T20:58:51+08:00",
"id": "https://xz.aliyun.com/t/16999",
"summary": {
"@type": "html",
"#text": "cJSON库函数存在的堆溢出漏洞分析"
}
},
{
"title": "WP-0ops2024-pwn-<IP Management System>",
"link": "https://xz.aliyun.com/t/16998",
"published": "2025-01-02T18:50:18+08:00",
"id": "https://xz.aliyun.com/t/16998",
"summary": {
"@type": "html",
"#text": "WP-0ops2024-pwn-<IP Management System>"
}
},
{
"title": "Linux渗透实战之Hackademic: RTB1靶场提权",
"link": "https://xz.aliyun.com/t/16995",
"published": "2025-01-02T15:22:06+08:00",
"id": "https://xz.aliyun.com/t/16995",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之Hackademic: RTB1靶场提权"
}
},
{
"title": "Sharp4UACPASS一款通过调用CMSTP进程绕过UAC的工具",
"link": "https://xz.aliyun.com/t/16994",
"published": "2025-01-02T15:12:05+08:00",
"id": "https://xz.aliyun.com/t/16994",
"summary": {
"@type": "html",
"#text": "Sharp4UACPASS一款通过调用CMSTP进程绕过UAC的工具"
}
},
{
"title": "传统Office结构下的后门和利用手段解析",
"link": "https://xz.aliyun.com/t/16993",
"published": "2025-01-02T14:54:47+08:00",
"id": "https://xz.aliyun.com/t/16993",
"summary": {
"@type": "html",
"#text": "传统Office结构下的后门和利用手段解析"
}
},
{
"title": "蚁景网安实验室-双层内网渗透虚拟仿真实战",
"link": "https://xz.aliyun.com/t/16992",
"published": "2025-01-02T14:51:14+08:00",
"id": "https://xz.aliyun.com/t/16992",
"summary": {
"@type": "html",
"#text": "蚁景网安实验室-双层内网渗透虚拟仿真实战"
}
},
{
"title": "春秋云镜—专业徽章—Initial",
"link": "https://xz.aliyun.com/t/16991",
"published": "2025-01-02T14:43:00+08:00",
"id": "https://xz.aliyun.com/t/16991",
"summary": {
"@type": "html",
"#text": "春秋云镜—专业徽章—Initial"
}
},
{
"title": "JAVA代码审计-StudentManager",
"link": "https://xz.aliyun.com/t/16990",
"published": "2025-01-02T11:32:05+08:00",
"id": "https://xz.aliyun.com/t/16990",
"summary": {
"@type": "html",
"#text": "JAVA代码审计-StudentManager"
}
},
{
"title": "伪装成Chrome安装程序传播银狐最新变种",
"link": "https://xz.aliyun.com/t/16989",
"published": "2025-01-02T07:46:43+08:00",
"id": "https://xz.aliyun.com/t/16989",
"summary": {
"@type": "html",
"#text": "伪装成Chrome安装程序传播银狐最新变种"
}
},
{
"title": "绕过App某加密企业版加固Frida检测",
"link": "https://xz.aliyun.com/t/16988",
"published": "2025-01-01T23:59:38+08:00",
"id": "https://xz.aliyun.com/t/16988",
"summary": {
"@type": "html",
"#text": "绕过App某加密企业版加固Frida检测"
}
},
{
"title": "无限安全靶场-月挑战靶场1",
"link": "https://xz.aliyun.com/t/16984",
"published": "2025-01-01T22:30:52+08:00",
"id": "https://xz.aliyun.com/t/16984",
"summary": {
"@type": "html",
"#text": "无限安全靶场-月挑战靶场1"
}
},
{
"title": "shiro codeql分析理解附带完整ql代码",
"link": "https://xz.aliyun.com/t/16983",
"published": "2025-01-01T20:07:25+08:00",
"id": "https://xz.aliyun.com/t/16983",
"summary": {
"@type": "html",
"#text": "shiro codeql分析理解附带完整ql代码"
}
},
{
"title": "前端加密对抗常见场景突破",
"link": "https://xz.aliyun.com/t/16981",
"published": "2025-01-01T17:09:23+08:00",
"id": "https://xz.aliyun.com/t/16981",
"summary": {
"@type": "html",
"#text": "前端加密对抗常见场景突破"
}
},
{
"title": "BurpSuite插件OneScan - 递归目录扫描插件",
"link": "https://xz.aliyun.com/t/16980",
"published": "2025-01-01T12:22:35+08:00",
"id": "https://xz.aliyun.com/t/16980",
"summary": {
"@type": "html",
"#text": "BurpSuite插件OneScan - 递归目录扫描插件"
}
},
{
"title": "CVE-2024-13025-Codezips 大学管理系统 faculty.php sql 注入分析及拓展",
"link": "https://xz.aliyun.com/t/16979",
"published": "2025-01-01T07:22:48+08:00",
"id": "https://xz.aliyun.com/t/16979",
"summary": {
"@type": "html",
"#text": "CVE-2024-13025-Codezips 大学管理系统 faculty.php sql 注入分析及拓展"
}
},
{
"title": "第二届CN-fnst::CTF WriteUp(web,misc,crypto,osint,pwn)",
"link": "https://xz.aliyun.com/t/16978",
"published": "2024-12-31T23:28:53+08:00",
"id": "https://xz.aliyun.com/t/16978",
"summary": {
"@type": "html",
"#text": "第二届CN-fnst::CTF WriteUp(web,misc,crypto,osint,pwn)"
}
},
{
"title": "禅道CMS开源版SQL注入漏洞分析",
"link": "https://xz.aliyun.com/t/16976",
"published": "2024-12-31T21:12:31+08:00",
"id": "https://xz.aliyun.com/t/16976",
"summary": {
"@type": "html",
"#text": "禅道CMS开源版SQL注入漏洞分析"
}
},
{
"title": "2024ImaginaryCTF 12月练习赛——部分Crypto题解分享",
"link": "https://xz.aliyun.com/t/16975",
"published": "2024-12-31T18:14:07+08:00",
"id": "https://xz.aliyun.com/t/16975",
"summary": {
"@type": "html",
"#text": "2024ImaginaryCTF 12月练习赛——部分Crypto题解分享"
}
},
{
"title": "JAVA代码审计-某报表平台",
"link": "https://xz.aliyun.com/t/16974",
"published": "2024-12-31T17:15:00+08:00",
"id": "https://xz.aliyun.com/t/16974",
"summary": {
"@type": "html",
"#text": "JAVA代码审计-某报表平台"
}
},
{ {
"title": "记一次渗透测试实战之Sea", "title": "记一次渗透测试实战之Sea",
"link": "https://xz.aliyun.com/t/16972", "link": "https://xz.aliyun.com/t/16972",
@ -548,455 +998,5 @@
"@type": "html", "@type": "html",
"#text": "企业上云的新攻击面分析" "#text": "企业上云的新攻击面分析"
} }
},
{
"title": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集",
"link": "https://xz.aliyun.com/t/16886",
"published": "2024-12-23T17:29:43+08:00",
"id": "https://xz.aliyun.com/t/16886",
"summary": {
"@type": "html",
"#text": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集"
}
},
{
"title": "ECH新时代的域前置",
"link": "https://xz.aliyun.com/t/16884",
"published": "2024-12-23T16:17:20+08:00",
"id": "https://xz.aliyun.com/t/16884",
"summary": {
"@type": "html",
"#text": "ECH新时代的域前置"
}
},
{
"title": "CSS Injection 从入门到精通",
"link": "https://xz.aliyun.com/t/16879",
"published": "2024-12-22T22:06:24+08:00",
"id": "https://xz.aliyun.com/t/16879",
"summary": {
"@type": "html",
"#text": "CSS Injection 从入门到精通"
}
},
{
"title": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解",
"link": "https://xz.aliyun.com/t/16878",
"published": "2024-12-22T20:46:30+08:00",
"id": "https://xz.aliyun.com/t/16878",
"summary": {
"@type": "html",
"#text": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解"
}
},
{
"title": "LitCTF2024--Crypto-wp",
"link": "https://xz.aliyun.com/t/16875",
"published": "2024-12-22T16:19:45+08:00",
"id": "https://xz.aliyun.com/t/16875",
"summary": {
"@type": "html",
"#text": "LitCTF2024--Crypto-wp"
}
},
{
"title": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)",
"link": "https://xz.aliyun.com/t/16874",
"published": "2024-12-22T16:15:09+08:00",
"id": "https://xz.aliyun.com/t/16874",
"summary": {
"@type": "html",
"#text": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)"
}
},
{
"title": "Linux渗透实战之HTB-Heal",
"link": "https://xz.aliyun.com/t/16873",
"published": "2024-12-22T15:13:56+08:00",
"id": "https://xz.aliyun.com/t/16873",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之HTB-Heal"
}
},
{
"title": "春秋云境-多维挑战-CloudNet-WP",
"link": "https://xz.aliyun.com/t/16872",
"published": "2024-12-22T03:40:12+08:00",
"id": "https://xz.aliyun.com/t/16872",
"summary": {
"@type": "html",
"#text": "春秋云境-多维挑战-CloudNet-WP"
}
},
{
"title": "另辟蹊径的bypass方式",
"link": "https://xz.aliyun.com/t/16871",
"published": "2024-12-22T00:16:30+08:00",
"id": "https://xz.aliyun.com/t/16871",
"summary": {
"@type": "html",
"#text": "另辟蹊径的bypass方式"
}
},
{
"title": "国城杯线下web出题思路分享",
"link": "https://xz.aliyun.com/t/16870",
"published": "2024-12-21T23:05:12+08:00",
"id": "https://xz.aliyun.com/t/16870",
"summary": {
"@type": "html",
"#text": "国城杯线下web出题思路分享"
}
},
{
"title": "国城杯线下决赛master_ast题解",
"link": "https://xz.aliyun.com/t/16869",
"published": "2024-12-21T21:44:07+08:00",
"id": "https://xz.aliyun.com/t/16869",
"summary": {
"@type": "html",
"#text": "国城杯线下决赛master_ast题解"
}
},
{
"title": "暴力通关PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解",
"link": "https://xz.aliyun.com/t/16867",
"published": "2024-12-21T20:50:08+08:00",
"id": "https://xz.aliyun.com/t/16867",
"summary": {
"@type": "html",
"#text": "暴力通关PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解"
}
},
{
"title": "DASCTF 2024最后一战寒夜破晓冬至终章(部分wp)",
"link": "https://xz.aliyun.com/t/16866",
"published": "2024-12-21T20:16:12+08:00",
"id": "https://xz.aliyun.com/t/16866",
"summary": {
"@type": "html",
"#text": "DASCTF 2024最后一战寒夜破晓冬至终章(部分wp)"
}
},
{
"title": "2024 DASCTF const_python详解",
"link": "https://xz.aliyun.com/t/16864",
"published": "2024-12-21T19:51:16+08:00",
"id": "https://xz.aliyun.com/t/16864",
"summary": {
"@type": "html",
"#text": "2024 DASCTF const_python详解"
}
},
{
"title": "Zeropz-楚慧杯L组WP",
"link": "https://xz.aliyun.com/t/16863",
"published": "2024-12-21T19:44:53+08:00",
"id": "https://xz.aliyun.com/t/16863",
"summary": {
"@type": "html",
"#text": "Zeropz-楚慧杯L组WP"
}
},
{
"title": "Dirty Pagetable 学习 & 例题",
"link": "https://xz.aliyun.com/t/16862",
"published": "2024-12-21T19:23:38+08:00",
"id": "https://xz.aliyun.com/t/16862",
"summary": {
"@type": "html",
"#text": "Dirty Pagetable 学习 & 例题"
}
},
{
"title": "针对单一系统渗透测试",
"link": "https://xz.aliyun.com/t/16861",
"published": "2024-12-21T19:21:15+08:00",
"id": "https://xz.aliyun.com/t/16861",
"summary": {
"@type": "html",
"#text": "针对单一系统渗透测试"
}
},
{
"title": "Cross cache Attack技术细节分析",
"link": "https://xz.aliyun.com/t/16860",
"published": "2024-12-21T19:19:11+08:00",
"id": "https://xz.aliyun.com/t/16860",
"summary": {
"@type": "html",
"#text": "Cross cache Attack技术细节分析"
}
},
{
"title": "某某语音auth值生成分析",
"link": "https://xz.aliyun.com/t/16859",
"published": "2024-12-21T17:59:50+08:00",
"id": "https://xz.aliyun.com/t/16859",
"summary": {
"@type": "html",
"#text": "某某语音auth值生成分析"
}
},
{
"title": "蓝队—反钓鱼的策略提供",
"link": "https://xz.aliyun.com/t/16858",
"published": "2024-12-21T17:12:06+08:00",
"id": "https://xz.aliyun.com/t/16858",
"summary": {
"@type": "html",
"#text": "蓝队—反钓鱼的策略提供"
}
},
{
"title": "windows内核进程遍历常见方式",
"link": "https://xz.aliyun.com/t/16857",
"published": "2024-12-21T16:38:04+08:00",
"id": "https://xz.aliyun.com/t/16857",
"summary": {
"@type": "html",
"#text": "windows内核进程遍历常见方式"
}
},
{
"title": "ez_zhuawa出题记录",
"link": "https://xz.aliyun.com/t/16856",
"published": "2024-12-21T15:44:09+08:00",
"id": "https://xz.aliyun.com/t/16856",
"summary": {
"@type": "html",
"#text": "ez_zhuawa出题记录"
}
},
{
"title": "Windows内核回调",
"link": "https://xz.aliyun.com/t/16855",
"published": "2024-12-21T15:17:48+08:00",
"id": "https://xz.aliyun.com/t/16855",
"summary": {
"@type": "html",
"#text": "Windows内核回调"
}
},
{
"title": "Linux渗透实战之不一样的XSS",
"link": "https://xz.aliyun.com/t/16853",
"published": "2024-12-21T10:53:08+08:00",
"id": "https://xz.aliyun.com/t/16853",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之不一样的XSS"
}
},
{
"title": "基于优化的大模型越狱技术分析与实战",
"link": "https://xz.aliyun.com/t/16852",
"published": "2024-12-20T21:17:55+08:00",
"id": "https://xz.aliyun.com/t/16852",
"summary": {
"@type": "html",
"#text": "基于优化的大模型越狱技术分析与实战"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE",
"link": "https://xz.aliyun.com/t/16850",
"published": "2024-12-20T18:55:42+08:00",
"id": "https://xz.aliyun.com/t/16850",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解",
"link": "https://xz.aliyun.com/t/16849",
"published": "2024-12-20T17:24:00+08:00",
"id": "https://xz.aliyun.com/t/16849",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解"
}
},
{
"title": "代码审计-某物联网系统RCE",
"link": "https://xz.aliyun.com/t/16848",
"published": "2024-12-20T17:19:40+08:00",
"id": "https://xz.aliyun.com/t/16848",
"summary": {
"@type": "html",
"#text": "代码审计-某物联网系统RCE"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP",
"link": "https://xz.aliyun.com/t/16847",
"published": "2024-12-20T17:10:07+08:00",
"id": "https://xz.aliyun.com/t/16847",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP"
}
},
{
"title": "某系统审计权限绕过-CVE-2024-9554",
"link": "https://xz.aliyun.com/t/16845",
"published": "2024-12-20T16:53:05+08:00",
"id": "https://xz.aliyun.com/t/16845",
"summary": {
"@type": "html",
"#text": "某系统审计权限绕过-CVE-2024-9554"
}
},
{
"title": "某系统代码审计到getshell",
"link": "https://xz.aliyun.com/t/16841",
"published": "2024-12-20T16:08:09+08:00",
"id": "https://xz.aliyun.com/t/16841",
"summary": {
"@type": "html",
"#text": "某系统代码审计到getshell"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto",
"link": "https://xz.aliyun.com/t/16846",
"published": "2024-12-20T14:30:16+08:00",
"id": "https://xz.aliyun.com/t/16846",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto"
}
},
{
"title": "银狐黑产组织最新免杀样本详细分析",
"link": "https://xz.aliyun.com/t/16837",
"published": "2024-12-20T08:17:20+08:00",
"id": "https://xz.aliyun.com/t/16837",
"summary": {
"@type": "html",
"#text": "银狐黑产组织最新免杀样本详细分析"
}
},
{
"title": "初识AFL工具安装与基本用法",
"link": "https://xz.aliyun.com/t/16836",
"published": "2024-12-20T03:07:30+08:00",
"id": "https://xz.aliyun.com/t/16836",
"summary": {
"@type": "html",
"#text": "初识AFL工具安装与基本用法"
}
},
{
"title": "某渗透中代码审计到内网遨游",
"link": "https://xz.aliyun.com/t/16835",
"published": "2024-12-19T21:53:53+08:00",
"id": "https://xz.aliyun.com/t/16835",
"summary": {
"@type": "html",
"#text": "某渗透中代码审计到内网遨游"
}
},
{
"title": "Pointer Overflow CTF - 2024 Web全write up",
"link": "https://xz.aliyun.com/t/16834",
"published": "2024-12-19T20:58:58+08:00",
"id": "https://xz.aliyun.com/t/16834",
"summary": {
"@type": "html",
"#text": "Pointer Overflow CTF - 2024 Web全write up"
}
},
{
"title": "浅析实战攻防中的信息收集",
"link": "https://xz.aliyun.com/t/16832",
"published": "2024-12-19T16:32:00+08:00",
"id": "https://xz.aliyun.com/t/16832",
"summary": {
"@type": "html",
"#text": "浅析实战攻防中的信息收集"
}
},
{
"title": "Spring FatJar写文件到RCE分析",
"link": "https://xz.aliyun.com/t/16831",
"published": "2024-12-19T16:04:00+08:00",
"id": "https://xz.aliyun.com/t/16831",
"summary": {
"@type": "html",
"#text": "Spring FatJar写文件到RCE分析"
}
},
{
"title": "应急响应记录之水坑挂马事件分析与恢复",
"link": "https://xz.aliyun.com/t/16829",
"published": "2024-12-19T14:27:41+08:00",
"id": "https://xz.aliyun.com/t/16829",
"summary": {
"@type": "html",
"#text": "应急响应记录之水坑挂马事件分析与恢复"
}
},
{
"title": "万字长文窥探信息收集真正的艺术",
"link": "https://xz.aliyun.com/t/16828",
"published": "2024-12-19T13:57:53+08:00",
"id": "https://xz.aliyun.com/t/16828",
"summary": {
"@type": "html",
"#text": "万字长文窥探信息收集真正的艺术"
}
},
{
"title": "记一次5000万资产的渗透测试",
"link": "https://xz.aliyun.com/t/16827",
"published": "2024-12-19T12:34:52+08:00",
"id": "https://xz.aliyun.com/t/16827",
"summary": {
"@type": "html",
"#text": "记一次5000万资产的渗透测试"
}
},
{
"title": "一次 house of force 练习HTB pwn - Fancy names",
"link": "https://xz.aliyun.com/t/16825",
"published": "2024-12-19T11:41:53+08:00",
"id": "https://xz.aliyun.com/t/16825",
"summary": {
"@type": "html",
"#text": "一次 house of force 练习HTB pwn - Fancy names"
}
},
{
"title": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞",
"link": "https://xz.aliyun.com/t/16824",
"published": "2024-12-19T11:13:41+08:00",
"id": "https://xz.aliyun.com/t/16824",
"summary": {
"@type": "html",
"#text": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞"
}
},
{
"title": "面向GPTs的提示词注入攻击分析",
"link": "https://xz.aliyun.com/t/16816",
"published": "2024-12-18T23:23:30+08:00",
"id": "https://xz.aliyun.com/t/16816",
"summary": {
"@type": "html",
"#text": "面向GPTs的提示词注入攻击分析"
}
},
{
"title": "PE文件代码注入",
"link": "https://xz.aliyun.com/t/16815",
"published": "2024-12-18T23:11:47+08:00",
"id": "https://xz.aliyun.com/t/16815",
"summary": {
"@type": "html",
"#text": "PE文件代码注入"
}
} }
] ]

Binary file not shown.

Binary file not shown.

View File

View File

@ -1,75 +0,0 @@
2025-01-15 10:24:33 - INFO - __main__:<module>:279 - 程序正在运行当中。
2025-01-15 10:24:43 - INFO - __main__:send_first_message:255 - 飞书发送 程序信息 成功
2025-01-15 10:24:44 - INFO - __main__:send_first_message:257 - 飞书发送 首次运行提醒 成功
2025-01-15 10:24:44 - INFO - __main__:main_job:195 - 发送程序启动当前时间为2025-01-15 10:24:44
2025-01-15 10:24:44 - INFO - __main__:main_job:196 - 正在启动各爬虫并获取资源中...
2025-01-15 10:24:45 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【银行测试】的微信公众号-Sogou搜索内容保存成功。
2025-01-15 10:24:50 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【APP逆向】的微信公众号-Sogou搜索内容保存成功。
2025-01-15 10:24:56 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【渗透测试】的微信公众号-Sogou搜索内容保存成功。
2025-01-15 10:25:01 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【手机银行漏洞】的微信公众号-Sogou搜索内容保存成功。
2025-01-15 10:25:07 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【银行漏洞】的微信公众号-Sogou搜索内容保存成功。
2025-01-15 10:25:12 - INFO - spider.sougou_wx:sougou_wx_main:96 - 关键词【支付漏洞】的微信公众号-Sogou搜索内容保存成功。
2025-01-15 10:25:18 - INFO - __main__:check_avaliable:65 - 飞书发送 微信公众号关键词相关内容 成功
2025-01-15 10:25:33 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【sql注入】获取开始。
2025-01-15 10:25:39 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【cnvd】获取开始。
2025-01-15 10:25:45 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【未授权】获取开始。
2025-01-15 10:25:52 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【漏洞POC】获取开始。
2025-01-15 10:25:59 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【RCE】获取开始。
2025-01-15 10:26:05 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【渗透测试】获取开始。
2025-01-15 10:26:11 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【反序列化】获取开始。
2025-01-15 10:26:17 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【攻防】获取开始。
2025-01-15 10:26:24 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【webshell】获取开始。
2025-01-15 10:26:31 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【红队】获取开始。
2025-01-15 10:26:37 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【redteam】获取开始。
2025-01-15 10:26:44 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【信息收集】获取开始。
2025-01-15 10:26:50 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【绕过】获取开始。
2025-01-15 10:26:56 - INFO - spider.github:github_main_keyword:56 - github_keyword:关键词【bypass av】获取开始。
2025-01-15 10:27:02 - INFO - spider.github:github_main_repo:108 - github_repo:项目【BeichenDream/Godzilla】更新情况获取开始。
2025-01-15 10:27:08 - INFO - spider.github:github_main_repo:108 - github_repo:项目【rebeyond/Behinder】更新情况获取开始。
2025-01-15 10:27:14 - INFO - spider.github:github_main_repo:108 - github_repo:项目【AntSwordProject/antSword】更新情况获取开始。
2025-01-15 10:27:19 - INFO - spider.github:github_main_repo:108 - github_repo:项目【j1anFen/shiro_attack】更新情况获取开始。
2025-01-15 10:27:20 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1
2025-01-15 10:27:25 - INFO - spider.github:github_main_repo:108 - github_repo:项目【yhy0/github-cve-monitor】更新情况获取开始。
2025-01-15 10:27:31 - INFO - spider.github:github_main_repo:108 - github_repo:项目【gentilkiwi/mimikatz】更新情况获取开始。
2025-01-15 10:27:37 - INFO - spider.github:github_main_repo:108 - github_repo:项目【ehang-io/nps】更新情况获取开始。
2025-01-15 10:27:43 - INFO - spider.github:github_main_repo:108 - github_repo:项目【chaitin/xray】更新情况获取开始。
2025-01-15 10:27:48 - INFO - spider.github:github_main_repo:108 - github_repo:项目【FunnyWolf/pystinger】更新情况获取开始。
2025-01-15 10:27:54 - INFO - spider.github:github_main_repo:108 - github_repo:项目【L-codes/Neo-reGeorg】更新情况获取开始。
2025-01-15 10:28:00 - INFO - spider.github:github_main_repo:108 - github_repo:项目【shadow1ng/fscan】更新情况获取开始。
2025-01-15 10:28:05 - INFO - spider.github:github_main_repo:108 - github_repo:项目【SafeGroceryStore/MDUT】更新情况获取开始。
2025-01-15 10:28:11 - INFO - spider.github:github_main_repo:108 - github_repo:项目【EdgeSecurityTeam/Vulnerability】更新情况获取开始。
2025-01-15 10:28:12 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1
2025-01-15 10:28:17 - INFO - spider.github:github_main_repo:108 - github_repo:项目【Vme18000yuan/FreePOC】更新情况获取开始。
2025-01-15 10:28:23 - INFO - spider.github:github_main_repo:108 - github_repo:项目【wy876/POC】更新情况获取开始。
2025-01-15 10:28:28 - INFO - spider.github:github_main_release:153 - github_repo:项目【BeichenDream/Godzilla】发版情况获取开始。
2025-01-15 10:28:34 - INFO - spider.github:github_main_release:153 - github_repo:项目【rebeyond/Behinder】发版情况获取开始。
2025-01-15 10:28:40 - INFO - spider.github:github_main_release:153 - github_repo:项目【AntSwordProject/antSword】发版情况获取开始。
2025-01-15 10:28:46 - INFO - spider.github:github_main_release:153 - github_repo:项目【j1anFen/shiro_attack】发版情况获取开始。
2025-01-15 10:28:46 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1
2025-01-15 10:28:51 - INFO - spider.github:github_main_release:153 - github_repo:项目【yhy0/github-cve-monitor】发版情况获取开始。
2025-01-15 10:28:52 - WARNING - spider.github:github_main_release:160 - github_repo:项目【yhy0/github-cve-monitor】不存在版本发布情况。
2025-01-15 10:28:57 - INFO - spider.github:github_main_release:153 - github_repo:项目【gentilkiwi/mimikatz】发版情况获取开始。
2025-01-15 10:29:03 - INFO - spider.github:github_main_release:153 - github_repo:项目【ehang-io/nps】发版情况获取开始。
2025-01-15 10:29:09 - INFO - spider.github:github_main_release:153 - github_repo:项目【chaitin/xray】发版情况获取开始。
2025-01-15 10:29:14 - INFO - spider.github:github_main_release:153 - github_repo:项目【FunnyWolf/pystinger】发版情况获取开始。
2025-01-15 10:29:20 - INFO - spider.github:github_main_release:153 - github_repo:项目【L-codes/Neo-reGeorg】发版情况获取开始。
2025-01-15 10:29:26 - INFO - spider.github:github_main_release:153 - github_repo:项目【shadow1ng/fscan】发版情况获取开始。
2025-01-15 10:29:32 - INFO - spider.github:github_main_release:153 - github_repo:项目【SafeGroceryStore/MDUT】发版情况获取开始。
2025-01-15 10:29:37 - INFO - spider.github:github_main_release:153 - github_repo:项目【EdgeSecurityTeam/Vulnerability】发版情况获取开始。
2025-01-15 10:29:38 - WARNING - spider.github:fetch_rss:46 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1
2025-01-15 10:29:43 - INFO - spider.github:github_main_release:153 - github_repo:项目【Vme18000yuan/FreePOC】发版情况获取开始。
2025-01-15 10:29:44 - WARNING - spider.github:github_main_release:160 - github_repo:项目【Vme18000yuan/FreePOC】不存在版本发布情况。
2025-01-15 10:29:49 - INFO - spider.github:github_main_release:153 - github_repo:项目【wy876/POC】发版情况获取开始。
2025-01-15 10:29:55 - INFO - spider.github:github_main_user:188 - github_user:作者【su18】更新情况获取开始。
2025-01-15 10:30:00 - INFO - spider.github:github_main_user:188 - github_user:作者【BeichenDream】更新情况获取开始。
2025-01-15 10:30:06 - INFO - spider.github:github_main_user:188 - github_user:作者【phith0n】更新情况获取开始。
2025-01-15 10:30:12 - INFO - spider.github:github_main_user:188 - github_user:作者【zhzyker】更新情况获取开始。
2025-01-15 10:30:18 - INFO - spider.github:github_main_user:188 - github_user:作者【lijiejie】更新情况获取开始。
2025-01-15 10:30:23 - INFO - spider.github:github_main_user:188 - github_user:作者【projectdiscovery】更新情况获取开始。
2025-01-15 10:30:29 - INFO - spider.github:github_main_user:188 - github_user:作者【HavocFramework】更新情况获取开始。
2025-01-15 10:30:36 - INFO - __main__:check_avaliable:65 - 飞书发送 Github项目监控-关键词监控 成功
2025-01-15 10:30:51 - INFO - __main__:check_avaliable:88 - Github项目监控-项目更新情况数据为空,跳过执行。
2025-01-15 10:30:51 - INFO - __main__:check_avaliable:65 - 飞书发送 Github项目监控-大佬工具 成功
2025-01-15 10:31:06 - INFO - __main__:check_avaliable:88 - Github项目监控-项目版本发布监测数据为空,跳过执行。
2025-01-15 10:31:06 - INFO - __main__:main_job:205 - 单次运行结束,等待下一次运行...
2025-01-15 10:31:50 - INFO - __main__:signal_handler:51 - 接收到退出信号,程序即将退出...

Binary file not shown.

View File

@ -57,7 +57,7 @@ def github_main_keyword(key, black_words):
api_node = "https://api.github.com/search/repositories?q={}&sort=updated&per_page=20".format(keyword) api_node = "https://api.github.com/search/repositories?q={}&sort=updated&per_page=20".format(keyword)
result = fetch_rss(api_node) result = fetch_rss(api_node)
if result == None: if result == None:
time.sleep(1) time.sleep(3)
continue continue
n = len(result['items']) n = len(result['items'])
for i in range(0, n): for i in range(0, n):
@ -96,7 +96,7 @@ def github_main_keyword(key, black_words):
} }
# print(project_info) # print(project_info)
all_results.append(project_info) all_results.append(project_info)
time.sleep(1) time.sleep(3)
# 将所有结果写入JSON文件 # 将所有结果写入JSON文件
save_to_json(all_results, './resources/JSON/github_keyword.json') save_to_json(all_results, './resources/JSON/github_keyword.json')
@ -109,7 +109,7 @@ def github_main_repo(key):
api_node = "https://api.github.com/repos/{}/commits?per_page=1".format(keyword) api_node = "https://api.github.com/repos/{}/commits?per_page=1".format(keyword)
result = fetch_rss(api_node) result = fetch_rss(api_node)
if result == None: if result == None:
time.sleep(1) time.sleep(3)
continue continue
commit = result[0] # 获取最新的提交记录 commit = result[0] # 获取最新的提交记录
@ -142,7 +142,7 @@ def github_main_repo(key):
} }
# print(project_info) # print(project_info)
all_results.append(project_info) all_results.append(project_info)
time.sleep(1) time.sleep(3)
# 将所有结果写入JSON文件 # 将所有结果写入JSON文件
save_to_json(all_results, './resources/JSON/github_repo.json') save_to_json(all_results, './resources/JSON/github_repo.json')
@ -154,11 +154,11 @@ def github_main_release(key):
api_node = "https://api.github.com/repos/{}/releases?per_page=1".format(keyword) api_node = "https://api.github.com/repos/{}/releases?per_page=1".format(keyword)
result = fetch_rss(api_node) result = fetch_rss(api_node)
if result == None: if result == None:
time.sleep(1) time.sleep(3)
continue continue
if not result: if not result:
logger.warning(f"github_repo:项目【{keyword}】不存在版本发布情况。") logger.warning(f"github_repo:项目【{keyword}】不存在版本发布情况。")
time.sleep(1) time.sleep(3)
continue continue
# print(result) # print(result)
@ -177,7 +177,7 @@ def github_main_release(key):
} }
# print(project_info) # print(project_info)
all_results.append(project_info) all_results.append(project_info)
time.sleep(1) time.sleep(3)
# 将所有结果写入JSON文件 # 将所有结果写入JSON文件
save_to_json(all_results, './resources/JSON/github_release.json') save_to_json(all_results, './resources/JSON/github_release.json')
@ -189,7 +189,7 @@ def github_main_user(key, black_words):
api_node = "https://api.github.com/users/{}/repos?sort=created&per_page=10".format(keyword) api_node = "https://api.github.com/users/{}/repos?sort=created&per_page=10".format(keyword)
result = fetch_rss(api_node) result = fetch_rss(api_node)
if result == None: if result == None:
time.sleep(1) time.sleep(3)
continue continue
for i in range(0, len(result)): for i in range(0, len(result)):
description = result[i]['description'] description = result[i]['description']
@ -227,7 +227,7 @@ def github_main_user(key, black_words):
} }
# print(project_info) # print(project_info)
all_results.append(project_info) all_results.append(project_info)
time.sleep(1) time.sleep(3)
# 将所有结果写入JSON文件 # 将所有结果写入JSON文件
save_to_json(all_results, './resources/JSON/github_user.json') save_to_json(all_results, './resources/JSON/github_user.json')
@ -242,4 +242,5 @@ def github_main(keyword_list, tool_list, user_list, black_words):
github_main_user(user_list, black_words) github_main_user(user_list, black_words)
if __name__ == "__main__": if __name__ == "__main__":
github_main() keyword_list, tool_list, user_list, black_words = load_github_config()
github_main(keyword_list, tool_list, user_list, black_words)

86
spider/uni.py Normal file
View File

@ -0,0 +1,86 @@
import feedparser
import json
from datetime import datetime, timezone, timedelta
from loguru import logger
import yaml
def fetch_rss_data(feed_urls, wechat_urls):
all_entries = []
# 处理通用 RSS 链接
for rss_url in feed_urls:
source, url = rss_url.split('|')
feed = feedparser.parse(url)
for entry in feed.entries:
entry_data = {
'title': entry.get('title', ''),
'link': entry.get('link', ''),
'author': entry.get('author', ''),
'description': entry.get('summary', ''),
'published': entry.get('published', ''),
'source': source.strip()
}
# 处理 published 字段
if entry_data['published']:
try:
# 尝试解析 published 字段
dt = datetime.strptime(entry_data['published'], '%a, %d %b %Y %H:%M:%S %z')
dt_china = dt.astimezone(timezone(timedelta(hours=8)))
entry_data['published'] = dt_china.strftime('%Y-%m-%d %H:%M:%S')
except ValueError:
# 如果解析失败,直接使用 published 字段
pass
all_entries.append(entry_data)
# 处理微信 RSS 链接
for wx_url in wechat_urls:
author, url = wx_url.split('|')
feed = feedparser.parse(url)
for entry in feed.entries:
entry_data = {
'title': entry.get('title', ''),
'link': entry.get('link', ''),
'author': author.strip(), # 使用 YAML 文件中指定的作者名
'description': entry.get('summary', ''),
'published': entry.get('published', ''),
'source': '微信公众号'
}
# 处理 published 字段
if entry_data['published']:
try:
# 尝试解析 published 字段
dt = datetime.strptime(entry_data['published'], '%a, %d %b %Y %H:%M:%S %z')
dt_china = dt.astimezone(timezone(timedelta(hours=8)))
entry_data['published'] = dt_china.strftime('%Y-%m-%d %H:%M:%S')
except ValueError:
# 如果解析失败,直接使用 published 字段
pass
all_entries.append(entry_data)
return all_entries
def save_to_json(data, filename):
with open(filename, 'w', encoding='utf-8') as f:
json.dump(data, f, ensure_ascii=False, indent=4)
logger.info(f"通用爬虫数据已保存到 {filename}")
def uni_spider():
# 读取 links.yaml 文件
with open('./config/uni_rss.yaml', 'r', encoding='utf-8') as f:
links = yaml.safe_load(f)
feed_urls = links.get('link', [])
wechat_urls = links.get('wechat', [])
# 获取 RSS 数据
rss_data = fetch_rss_data(feed_urls, wechat_urls)
# 保存到 JSON 文件
save_to_json(rss_data, './resources/JSON/uni_rss.json')
if __name__ == "__main__":
uni_spider()

13
test.py Normal file
View File

@ -0,0 +1,13 @@
import feedparser
feed_url = "https://security.tencent.com/index.php/feed/blog/0"
feed = feedparser.parse(feed_url)
for entry in feed.entries:
print(entry.title)
print(entry.link)
print(entry.id)
print(entry.summary)
print(entry.id)
# 打印所有属性,找出正确的日期字段名
# print(entry.keys())

View File

@ -110,8 +110,5 @@ def get_wx_news():
content, status_code = read_md_file(WX_NEWS_PATH) content, status_code = read_md_file(WX_NEWS_PATH)
return jsonify({'content': content}), status_code return jsonify({'content': content}), status_code
def run_server():
app.run(host='0.0.0.0', port=5000)
if __name__ == '__main__': if __name__ == '__main__':
app.run(debug=True) # 在生产环境中应设置为 False app.run(debug=True, port=666) # 在生产环境中应设置为 False