Compare commits

..

No commits in common. "main" and "V1.1" have entirely different histories.
main ... V1.1

79 changed files with 6982 additions and 5614 deletions

220
Core.py
View File

@ -19,8 +19,6 @@ from spider.freebuf import freebuf_main
from spider.xianzhi import xianzhi_main from spider.xianzhi import xianzhi_main
from spider.sougou_wx import sougou_wx_main from spider.sougou_wx import sougou_wx_main
from spider.github import github_main, load_github_config from spider.github import github_main, load_github_config
from spider.baidu import baidu_main
from spider.uni import uni_spider
from GotoSend.M_4hou import Src_4hou from GotoSend.M_4hou import Src_4hou
from GotoSend.anquanke import Src_anquanke from GotoSend.anquanke import Src_anquanke
from GotoSend.doonsec import Src_doonsec from GotoSend.doonsec import Src_doonsec
@ -30,9 +28,7 @@ from GotoSend.qianxin import Src_qianxin
from GotoSend.seebug import Src_seebug from GotoSend.seebug import Src_seebug
from GotoSend.sougou_wx import Src_sougou_wx from GotoSend.sougou_wx import Src_sougou_wx
from GotoSend.github import Src_github from GotoSend.github import Src_github
from GotoSend.baidu import Src_baidu from config.check_config import get_core_config, get_debug_config, get_kewords_config
from GotoSend.uni_rss import Src_uni_rss
from config.check_config import get_core_config, get_debug_config, get_keywords_config
from loguru import logger from loguru import logger
# 清除所有已有的日志记录器配置 # 清除所有已有的日志记录器配置
@ -60,148 +56,95 @@ webhook_url_once, timestamp_once, sign_once = gen_sign()
e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config() e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config()
def check_avaliable(info_long, info_short, title): def check_avaliable(info_long, info_short, title, webhook_url, timestamp, sign):
if info_long: # 发送完整文章相关内容 if info_long: # 发送完整文章相关内容
if fs_activate == "True":
# logger.info(f"{title} 递送中(飞书):") # logger.info(f"{title} 递送中(飞书):")
webhook_url, timestamp, sign = gen_sign()
result = SendToFeishu(info_long, title, webhook_url, timestamp, sign) result = SendToFeishu(info_long, title, webhook_url, timestamp, sign)
logger.info(result) logger.info(result)
time.sleep(15) time.sleep(15)
else:
pass
if info_short: # 发送精简文章相关内容 if info_short: # 发送精简文章相关内容
# 企业微信相关 # 企业微信相关
if wx_activate == "True": if wx_activate == "True":
# logger.info(f"{title} 递送中(企业微信):") # logger.info(f"{title} 递送中(企业微信):")
for info in info_short: result = SendToWX(info_short, title)
result = SendToWX(info, title)
logger.info(result) logger.info(result)
time.sleep(15) time.sleep(15)
else:
pass
# 钉钉相关 # 钉钉相关
if ding_activate == "True": if ding_activate == "True":
# logger.info(f"{title} 递送中(钉钉):") # logger.info(f"{title} 递送中(钉钉):")
# for info in info_short: # 开发中,暂未实现 # result = SendToWX(info_short, title) # 待完善
# result = SendToDD(info, title) logger.info(result)
# logger.info(result)
time.sleep(15) time.sleep(15)
else:
pass
if not info_long and not info_short:
logger.info(f"{title}数据为空,跳过执行。")
def send_job_RSS(time_1): def send_job_RSS(time_1):
Doonsec_switch, Doonsec = get_keywords_config('Doonsec') Sogou_WX, Doonsec_switch, Doonsec = get_kewords_config()
uni_switch, Unity = get_keywords_config('Unity') # print(f"当前配置信息Doonsec_switch{Doonsec_switch}")
# 爬取数据
# Seebug数据获取分发
seebug_main() seebug_main()
seebug_results = Src_seebug(time_1)
if seebug_results != False:
result_seebug_long, result_seebug_short = seebug_results
check_avaliable(result_seebug_long, result_seebug_short, "Seebug社区资讯")
else:
logger.info("Seebug数据为空跳过执行。")
# 安全客数据获取分发
anquanke_main() anquanke_main()
anquanke_results = Src_anquanke(time_1)
if anquanke_results != False:
result_anquanke_long, result_anquanke_short = anquanke_results
check_avaliable(result_anquanke_long, result_anquanke_short, "安全客资讯")
else:
logger.info("安全客数据为空,跳过执行。")
# 华为数据获取分发
huawei_main() huawei_main()
# 奇安信数据获取分发
qianxin_main()
qianxin_results = Src_qianxin(time_1)
if qianxin_results != False:
result_qianxin_long, result_qianxin_short = qianxin_results
check_avaliable(result_qianxin_long, result_qianxin_short, "奇安信攻防社区资讯")
else:
logger.info("奇安信数据为空,跳过执行。")
# FreeBuf数据获取分发
freebuf_main()
freebuf_results = Src_freebuf(time_1)
if freebuf_results != False:
result_freebuf_long, result_freebuf_short = freebuf_results
check_avaliable(result_freebuf_long, result_freebuf_short, "FreeBuf资讯")
else:
logger.info("FreeBuf数据为空跳过执行。")
# 先知数据获取分发
xianzhi_main()
xianzhi_results = Src_xianzhi(time_1)
if xianzhi_results != False:
result_xianzhi_long, result_xianzhi_short = xianzhi_results
check_avaliable(result_xianzhi_long, result_xianzhi_short, "先知社区资讯")
else:
logger.info("先知数据为空,跳过执行。")
# 4hou数据获取分发
M_4hou_main()
M_4hou_results = Src_4hou(time_1)
if M_4hou_results != False:
result_4hou_long, result_4hou_short = M_4hou_results
check_avaliable(result_4hou_long, result_4hou_short, "嘶吼资讯")
else:
logger.info("嘶吼数据为空,跳过执行。")
# 洞见微信安全数据获取分发
doonsec_main() doonsec_main()
doonsec_results = Src_doonsec(Doonsec_switch, Doonsec) qianxin_main()
if doonsec_results != False: freebuf_main()
result_doonsec_long, result_doonsec_short = doonsec_results xianzhi_main()
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯") M_4hou_main()
else:
logger.info("洞见微信安全数据为空,跳过执行。")
# 聚合RSS数据获取分发 # 分析各个数据源的结果(输出长结果)
uni_spider() result_4hou_long = Src_4hou(time_1, False)
rss_results = Src_uni_rss(uni_switch, Unity) result_anquanke_long = Src_anquanke(time_1, False)
if rss_results != False: result_doonsec_long = Src_doonsec(False, Doonsec_switch, Doonsec)
result_rss_long, result_rss_short = rss_results print(result_doonsec_long)
check_avaliable(result_rss_long, result_rss_short, "聚合RSS资讯") result_xianzhi_long = Src_xianzhi(time_1, False)
else: result_freebuf_long = Src_freebuf(time_1, False)
logger.info("聚合RSS数据为空跳过执行。") result_qianxin_long = Src_qianxin(time_1, False)
result_seebug_long = Src_seebug(time_1, False)
# 分析各个数据源的结果(输出短结果)
result_4hou_short = Src_4hou(time_1, True)
result_anquanke_short = Src_anquanke(time_1, True)
result_doonsec_short = Src_doonsec(True, Doonsec_switch, Doonsec)
result_xianzhi_short = Src_xianzhi(time_1, True)
result_freebuf_short = Src_freebuf(time_1, True)
result_qianxin_short = Src_qianxin(time_1, True)
result_seebug_short = Src_seebug(time_1, True)
webhook_url, timestamp, sign = gen_sign()
check_avaliable(result_4hou_long, result_4hou_short, "嘶吼资讯", webhook_url, timestamp, sign)
check_avaliable(result_anquanke_long, result_anquanke_short, "安全客资讯", webhook_url, timestamp, sign)
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯", webhook_url, timestamp, sign)
check_avaliable(result_xianzhi_long, result_xianzhi_short, "先知社区资讯", webhook_url, timestamp, sign)
check_avaliable(result_freebuf_long, result_freebuf_short, "FreeBuf资讯", webhook_url, timestamp, sign)
check_avaliable(result_qianxin_long, result_qianxin_short, "奇安信攻防社区资讯", webhook_url, timestamp, sign)
check_avaliable(result_seebug_long, result_seebug_short, "Seebug社区资讯", webhook_url, timestamp, sign)
def send_job_SX(): def send_job_SX():
Sogou_WX = get_keywords_config('Sogou-WX') Sogou_WX, Doonsec_switch, Doonsec = get_kewords_config()
sougou_wx_main(Sogou_WX) sougou_wx_main(Sogou_WX)
results = Src_sougou_wx() result_sx_long = Src_sougou_wx(False)
if results != False: result_sx_short = Src_sougou_wx(True)
result_sx_long, result_sx_short = results webhook_url, timestamp, sign = gen_sign()
check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容") check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容", webhook_url, timestamp, sign)
else:
logger.info("微信公众号数据为空,跳过执行。")
def send_job_github(time_1): def send_job_github(time_1):
keyword_list, tool_list, user_list, black_words = load_github_config() keyword_list, tool_list, user_list, black_words = load_github_config()
github_main(keyword_list, tool_list, user_list, black_words) github_main(keyword_list, tool_list, user_list, black_words)
results = Src_github(time_1) result_github_1_long, result_github_2_long, result_github_3_long, result_github_4_long = Src_github(time_1, False)
result_github_1_short, result_github_2_short, result_github_3_short, result_github_4_short = Src_github(time_1, True)
# 解构返回的结果 webhook_url, timestamp, sign = gen_sign()
result_github_1_long, result_github_1_short = results[0] check_avaliable(result_github_1_long, result_github_1_short, "Github项目监控-关键词监控", webhook_url, timestamp, sign)
result_github_2_long, result_github_2_short = results[1] check_avaliable(result_github_2_long, result_github_2_short, "Github项目监控-项目更新情况", webhook_url, timestamp, sign)
result_github_3_long, result_github_3_short = results[2] webhook_url, timestamp, sign = gen_sign()
result_github_4_long, result_github_4_short = results[3] check_avaliable(result_github_3_long, result_github_3_short, "Github项目监控-大佬工具", webhook_url, timestamp, sign)
check_avaliable(result_github_4_long, result_github_4_short, "Github项目监控-项目版本发布监测", webhook_url, timestamp, sign)
# 检查并处理结果
check_avaliable(result_github_1_long, result_github_1_short, "Github项目监控-关键词监控")
check_avaliable(result_github_2_long, result_github_2_short, "Github项目监控-项目更新情况")
check_avaliable(result_github_3_long, result_github_3_short, "Github项目监控-大佬工具")
check_avaliable(result_github_4_long, result_github_4_short, "Github项目监控-项目版本发布监测")
def send_job_baidu():
Baidu = get_keywords_config('Baidu')
baidu_main(Baidu)
results = Src_baidu()
if results != False:
result_baidu_long, result_baidu_short = results
check_avaliable(result_baidu_long, result_baidu_short, "百度搜索关键词相关内容")
else:
logger.info("百度搜索数据为空,跳过执行。")
# 探测rss源状态 # 探测rss源状态
def check_rss_status(url): def check_rss_status(url):
@ -247,9 +190,6 @@ def main_job(e_hour):
send_job_SX() send_job_SX()
if 2 in choice: if 2 in choice:
send_job_github(e_hour) send_job_github(e_hour)
if 3 in choice:
send_job_baidu()
logger.info("单次运行结束,等待下一次运行...")
def main_loop(time_choice): def main_loop(time_choice):
if time_choice == 1: if time_choice == 1:
@ -278,6 +218,7 @@ def main_loop(time_choice):
time.sleep(60) # 每分钟检查一次是否有任务需要执行 time.sleep(60) # 每分钟检查一次是否有任务需要执行
def send_first_message(): def send_first_message():
rss_info = test_rss_source()
start_info = "" start_info = ""
start_info += "程序已启动,当前时间为:" + datetime.now().strftime("%Y-%m-%d %H:%M:%S") + "\n" start_info += "程序已启动,当前时间为:" + datetime.now().strftime("%Y-%m-%d %H:%M:%S") + "\n"
start_info += "程序作者MasonLiu \t 开源地址:[GM-gitea](https://git.masonliu.com/MasonLiu/PyBot)" + "\n" start_info += "程序作者MasonLiu \t 开源地址:[GM-gitea](https://git.masonliu.com/MasonLiu/PyBot)" + "\n"
@ -285,52 +226,25 @@ def send_first_message():
start_info += "时间配置:每隔" + str(e_hour) + "小时执行一次推送\n" start_info += "时间配置:每隔" + str(e_hour) + "小时执行一次推送\n"
elif time_choice == 0: elif time_choice == 0:
start_info += "时间配置:每天固定时间点执行推送\n" start_info += "时间配置:每天固定时间点执行推送\n"
start_info += "开启状态:\n"
if 0 in choice: if 0 in choice:
start_info += "RSS源监测\n"
if 1 in choice:
# start_info += "搜狗-微信公众号监测\n"
Sogou_WX = get_keywords_config('Sogou-WX')
start_info += f"微信公众号监测关键词:{Sogou_WX}\n"
if 2 in choice:
# start_info += "Github项目监测\n"
with open('./config/github_config.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file)
tool_list = config['tool_list']
start_info += f"Github监控项目{tool_list}\n"
keyword_list = config['keyword_list']
start_info += f"Github监控关键词{keyword_list}\n"
user_list = config['user_list']
start_info += f"Github监控用户{user_list}\n"
if 3 in choice:
# start_info += "百度搜索关键词内容监测\n"
Baidu = get_keywords_config('Baidu')
start_info += f"百度搜索关键词:{Baidu}\n"
if fs_activate == "True": if fs_activate == "True":
result = SendToFeishu(start_info, "程序信息", webhook_url_once, timestamp_once, sign_once) result = SendToFeishu(start_info, "程序信息", webhook_url_once, timestamp_once, sign_once)
logger.info(result) logger.info(result)
send_result = SendToFeishu(f"[点此访问]({url_web})网站以查看全部文章。", "首次运行提醒", webhook_url_once, timestamp_once, sign_once)
logger.info(send_result)
if wx_activate == "True":
result = SendToWX(start_info, "程序信息")
logger.info(result)
send_result = SendToWX(f"[点此访问]({url_web})网站以查看全部文章,若未开启网站请忽略本条消息。", "首次运行提醒")
logger.info(send_result)
if 0 in choice:
rss_info = test_rss_source()
if fs_activate == "True":
result = SendToFeishu(rss_info, "RSS源状态", webhook_url_once, timestamp_once, sign_once) result = SendToFeishu(rss_info, "RSS源状态", webhook_url_once, timestamp_once, sign_once)
# logger.info(rss_info) # logger.info(rss_info)
logger.info(result) logger.info(result)
send_result = SendToFeishu(f"[点此访问]({url_web})网站以查看全部文章。", "首次运行提醒", webhook_url_once, timestamp_once, sign_once)
logger.info(send_result)
else: else:
pass pass
if wx_activate == "True": if wx_activate == "True":
result = SendToWX(start_info, "程序信息")
logger.info(result)
result = SendToWX(rss_info, "RSS源状态") result = SendToWX(rss_info, "RSS源状态")
# logger.info(rss_info) # logger.info(rss_info)
logger.info(result) logger.info(result)
send_result = SendToWX(f"[点此访问]({url_web})网站以查看全部文章。", "首次运行提醒")
logger.info(send_result)
else: else:
pass pass

View File

@ -1,7 +1,7 @@
# -*- coding: utf-8 -*- # -*- coding: utf-8 -*-
""" """
@Author: MasonLiu @Author: MasonLiu
@Description: 本程序可以爬取各安全资讯源并发送到飞书群组 @Description: 测试用脚本无需关注
""" """
import schedule import schedule
@ -19,7 +19,6 @@ from spider.freebuf import freebuf_main
from spider.xianzhi import xianzhi_main from spider.xianzhi import xianzhi_main
from spider.sougou_wx import sougou_wx_main from spider.sougou_wx import sougou_wx_main
from spider.github import github_main, load_github_config from spider.github import github_main, load_github_config
from spider.baidu import baidu_main
from GotoSend.M_4hou import Src_4hou from GotoSend.M_4hou import Src_4hou
from GotoSend.anquanke import Src_anquanke from GotoSend.anquanke import Src_anquanke
from GotoSend.doonsec import Src_doonsec from GotoSend.doonsec import Src_doonsec
@ -29,122 +28,23 @@ from GotoSend.qianxin import Src_qianxin
from GotoSend.seebug import Src_seebug from GotoSend.seebug import Src_seebug
from GotoSend.sougou_wx import Src_sougou_wx from GotoSend.sougou_wx import Src_sougou_wx
from GotoSend.github import Src_github from GotoSend.github import Src_github
from GotoSend.baidu import Src_baidu from config.check_config import get_core_config, get_debug_config, get_kewords_config
from config.check_config import get_core_config, get_debug_config, get_keywords_config
from loguru import logger from loguru import logger
# 清除所有已有的日志记录器配置
logger.remove()
logger.add("./resources/log/core.log",
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
rotation="100 MB",
compression="zip",
encoding="utf-8")
# shell终端打印日志
debug = get_debug_config()
if debug == "True":
logger.add(lambda msg: print(msg),
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}")
def signal_handler(sig, frame):
logger.info("接收到退出信号,程序即将退出...")
sys.exit(0)
# 全局变量 # 全局变量
signal.signal(signal.SIGINT, signal_handler) # Ctrl+C
signal.signal(signal.SIGTERM, signal_handler) # kill命令
webhook_url_once, timestamp_once, sign_once = gen_sign() webhook_url_once, timestamp_once, sign_once = gen_sign()
e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config() e_hour, time_choice, choice, fs_activate, wx_activate, ding_activate, lx_activate, url_web = get_core_config()
Sogou_WX, Doonsec_switch, Doonsec = get_kewords_config()
# print(f"当前配置信息Doonsec_switch{Doonsec_switch}")
def check_avaliable(info_long, info_short, title):
if info_short: # 发送精简文章相关内容
# 企业微信相关
if wx_activate == "True":
# logger.info(f"{title} 递送中(企业微信):")
print("正在发送精简文章内容...")
for info in info_short:
result = SendToWX(info, title)
print(result)
logger.info(result)
time.sleep(15)
else:
print("精简文章内容为空,跳过执行。")
pass
if info_long: # 发送完整文章相关内容
if fs_activate == "True":
# logger.info(f"{title} 递送中(飞书):")
webhook_url, timestamp, sign = gen_sign()
result = SendToFeishu(info_long, title, webhook_url, timestamp, sign)
logger.info(result)
time.sleep(15)
else:
pass
if not info_long and not info_short:
logger.info(f"{title}数据为空,跳过执行。")
def send_job_RSS(time_1):
Doonsec_switch, Doonsec = get_keywords_config('Doonsec')
results = Src_doonsec(Doonsec_switch, Doonsec)
if results != False:
result_doonsec_long, result_doonsec_short = results
check_avaliable(result_doonsec_long, result_doonsec_short, "洞见微信安全资讯")
def main_job(e_hour):
logger.info(f"发送程序启动,当前时间为:{datetime.now().strftime('%Y-%m-%d %H:%M:%S')}")
logger.info("正在启动各爬虫并获取资源中...")
if 0 in choice:
send_job_RSS(e_hour)
logger.info("单次运行结束,等待下一次运行...")
def main_loop(time_choice):
if time_choice == 1:
while True:
try:
# 执行任务
main_job(e_hour)
time.sleep(e_hour * 60 * 60 - 3 * 60)
except Exception as e:
logger.error(f"发生错误: {e}, 程序已暂停")
# result = SendToFeishu(f"发生错误: {e}, 程序已退出", "报错信息")
exit()
elif time_choice == 0:
# 设置每天的特定时间点执行job函数
schedule.every().day.at("09:00").do(main_job, 12)
schedule.every().day.at("12:00").do(main_job, 3)
schedule.every().day.at("15:00").do(main_job, 3)
schedule.every().day.at("18:00").do(main_job, 3)
schedule.every().day.at("21:00").do(main_job, 3)
while True:
schedule.run_pending()
time.sleep(60) # 每分钟检查一次是否有任务需要执行
if __name__ == "__main__": if __name__ == "__main__":
logger.info("程序正在运行当中。") # result_doonsec_long = Src_doonsec(False, Doonsec_switch, Doonsec)
# print(result_doonsec_long)
results = Src_anquanke(4) while True:
if results != False: Sogou_WX, Doonsec_switch, Doonsec = get_kewords_config()
result_long, short_results = results print(f"当前配置信息Doonsec_switch{Doonsec_switch}")
print(f"当前配置信息Sogou_WX{Sogou_WX}")
# 打印长文本结果 print(f"当前配置信息Doonsec{Doonsec}")
print("长文本结果:") print("\n")
print(result_long) time.sleep(10)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else:
# 如果为空,则跳过执行
print("-" * 40)
print("安全客数据为空,跳过执行。")
# main_loop(time_choice)

View File

@ -46,11 +46,7 @@ def get_4hou_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/4hou.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/4hou.json', 'r', encoding='utf-8') as file:
content = file.read() data = json.load(file)
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -111,45 +107,28 @@ def record_md(result, filename="./resources/history/sec_news.md"):
# 写回文件 # 写回文件
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries): def get_filtered_articles(entries, Is_short):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
# 构建长文本结果 if Is_short == False:
result_long += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[5]}\n" result += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[5]}\n"
result_long += f"上传时间:{entry[4]}\n" result += f"上传时间:{entry[4]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
# 构建短文本结果并进行分块处理 result += f"文章:[{entry[1]}]({entry[2]})\n"
current_entry = ( result += f"链接:{entry[2]}\n上传时间:{entry[4]}\n"
f"文章:[{entry[1]}]({entry[2]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
f"链接:{entry[2]}\n上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[5]}\n" record += f"**作者**{entry[5]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_4hou(e_hour): def Src_4hou(e_hour, Is_short):
if not os.path.exists('./resources/db/4hou.db'): if not os.path.exists('./resources/db/4hou.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -168,27 +147,17 @@ def Src_4hou(e_hour):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles) results = get_filtered_articles(filtered_articles, Is_short)
return result_long, short_results return results
else: else:
return False return ""
if __name__ == "__main__": if __name__ == "__main__":
results = Src_4hou(4) reslts = Src_4hou(4, False)
if results != False: if reslts != "":
result_long, short_results = results print(reslts)
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)
print("嘶吼数据为空,跳过执行。") print("嘶吼数据为空,跳过执行。")

View File

@ -35,17 +35,11 @@ def insert_data(data):
def get_anquanke_json(): def get_anquanke_json():
# 检查文件是否存在 # 检查文件是否存在
if not os.path.exists('./resources/JSON/anquanke.json'): if not os.path.exists('./resources/JSON/anquanke.json'):
data = [] raise FileNotFoundError(f"anquanke.json文件不存在请检查程序是否运行正常")
# logger.error(f"anquanke.json文件不存在请检查爬虫程序是否运行正常")
print(f"anquanke.json文件不存在请检查爬虫程序是否运行正常")
else:
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/anquanke.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/anquanke.json', 'r', encoding='utf-8') as file:
content = file.read() data = json.load(file)
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -108,46 +102,29 @@ def record_md(result, filename="./resources/history/sec_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries): def get_filtered_articles(entries, Is_short):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
# 构建长文本结果 if Is_short == False:
result_long += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[6]}\n来源:{entry[3]}\n" result += f"文章:[{entry[1]}]({entry[2]})\n作者:{entry[6]}\n来源:{entry[3]}\n"
result_long += f"上传时间:{entry[5]}\n" result += f"上传时间:{entry[5]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
elif Is_short == True:
# 构建短文本结果并进行分块处理 result += f"文章:{entry[1]}\n"
current_entry = ( result += f"链接:{entry[2]}\n上传时间:{entry[5]}\n"
f"文章:[{entry[1]}]({entry[2]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[6]}\n" record += f"**作者**{entry[6]}\n"
record += f"**来源**{entry[3]}\n" record += f"**来源**{entry[3]}\n"
record += f"**上传时间**{entry[5]}\n" record += f"**上传时间**{entry[5]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_anquanke(e_hour): def Src_anquanke(e_hour, Is_short):
if not os.path.exists('./resources/db/anquanke.db'): if not os.path.exists('./resources/db/anquanke.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -166,26 +143,15 @@ def Src_anquanke(e_hour):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles) results = get_filtered_articles(filtered_articles, Is_short)
return result_long, short_results return results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
results = Src_anquanke(4) reslts = Src_anquanke(4, False)
if results != False: if reslts != False:
result_long, short_results = results print(reslts)
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

@ -1,229 +0,0 @@
import os
import json
import sqlite3
from datetime import datetime, timedelta
def clear_table():
conn = sqlite3.connect('./resources/db/baidu.db')
cursor = conn.cursor()
cursor.execute('DELETE FROM articles')
conn.commit()
conn.close()
def create_database():
conn = sqlite3.connect('./resources/db/baidu.db')
cursor = conn.cursor()
cursor.execute('''CREATE TABLE IF NOT EXISTS articles (
id INTEGER PRIMARY KEY AUTOINCREMENT,
title TEXT,
link TEXT,
description TEXT,
pubDate DATETIME,
author TEXT,
keyword TEXT,
is_sended BOOLEAN
)''')
conn.commit()
conn.close()
def insert_data(data):
conn = sqlite3.connect('./resources/db/baidu.db')
cursor = conn.cursor()
for entry in data:
# 检查是否存在相同 title 的记录
cursor.execute('''
SELECT 1 FROM articles WHERE title = ? AND author = ?
''', (entry['title'], entry['author']))
if cursor.fetchone() is None:
# 如果没有找到相同记录,则插入新记录
cursor.execute('''
INSERT INTO articles (title, link, description, pubDate, author, keyword)
VALUES (?, ?, ?, ?, ?, ?)
''', (entry['title'], entry['link'], entry['description'], entry['pubDate'], entry['author'], entry['keyword']))
conn.commit()
conn.close()
def get_json():
# 检查文件是否存在
if not os.path.exists('./resources/JSON/baidu.json'):
data = []
# logger.error("baidu.json文件不存在请检查程序是否运行正常")
else:
# 打开并读取JSON文件
with open('./resources/JSON/baidu.json', 'r', encoding='utf-8') as file:
content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个关键词的字典
total_data = []
for keyword, keyword_data in data.items():
# 检查关键词对应的数据是否为列表
if not isinstance(keyword_data, list):
raise ValueError(f"关键词 {keyword} 对应的数据格式错误,请检查爬取程序是否异常!")
# 提取所需字段并编号
for index, item in enumerate(keyword_data, start=1):
entry = {
"id": index,
"title": item.get("title", ""),
"link": item.get("link", ""),
"description": item.get("description", ""),
"pubDate": item.get("pubDate", ""),
"author": item.get("author", ""),
"keyword": keyword
}
total_data.append(entry)
return total_data
def select_articles():
conn = sqlite3.connect('./resources/db/baidu.db')
cursor = conn.cursor()
# 获取当前日期和时间
now = datetime.now()
two_months_ago = now - timedelta(days=60) # 假设两个月大约60天
try:
# 查询最近且未被标记为True的消息且发布时间不超过两个月
cursor.execute('''
SELECT * FROM articles
WHERE is_sended IS NULL AND pubDate BETWEEN ? AND ?
ORDER BY pubDate DESC
''', (two_months_ago.strftime('%Y-%m-%d'), now.strftime('%Y-%m-%d')))
# 查询最近且未被标记为True的消息
# cursor.execute('''
# SELECT * FROM articles
# WHERE is_sended IS NULL
# ORDER BY pubDate DESC
# ''')
results = cursor.fetchall()
# print(results)
if results:
for row in results:
article_id = row[0]
cursor.execute('''
UPDATE articles
SET is_sended = True
WHERE id = ?
''', (article_id,))
conn.commit() # 提交事务
except Exception as e:
conn.rollback() # 回滚事务
print(f"Error: {e}")
finally:
cursor.close()
conn.close()
return results
def record_md(result, filename="./resources/history/baidu_news.md"):
# 读取现有内容
if os.path.exists(filename):
with open(filename, 'r', encoding='utf-8') as file:
existing_content = file.read()
else:
existing_content = ""
# 将新内容插入到现有内容的开头
new_content = result + existing_content
# 写回文件
with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content)
def get_filtered_articles(entries):
result_long = ""
result_short = ""
record = ""
short_results = []
for entry in entries:
# 构建长文本结果
result_long += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
result_long += f"发布时间:{entry[4]}\n"
result_long += f"来源:{entry[5]}\n"
result_long += f"关键词:{entry[6]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 构建短文本结果并进行分块处理
current_entry = (
f"文章:[{entry[1]}]({entry[2]})\n"
f"关键词:{entry[6]}\n"
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
record += f"**上传时间**{entry[4]}\n"
record += f"**来源**{entry[5]}\n"
record += f"**关键词**{entry[6]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record)
return result_long, short_results
def Src_baidu():
if not os.path.exists('./resources/db/baidu.db'):
# 创建数据库和表
create_database()
# 清空表
# clear_table()
# 获取 JSON 数据
baidu_data = get_json()
# 插入数据到数据库
insert_data(baidu_data)
# 查询指定时间段内的数据
filtered_articles = select_articles()
# print(filtered_articles)
if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles)
return result_long, short_results
else:
return False
if __name__ == "__main__":
results = Src_baidu()
if results != False:
result_long, short_results = results
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else:
# 如果为空,则跳过执行
print("-" * 40)
print("百度数据为空,跳过执行。")

View File

@ -53,12 +53,7 @@ def get_doonsec_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/doonsec.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/doonsec.json', 'r', encoding='utf-8') as file:
content = file.read() data = json.load(file)
if not content:
pass
else:
# print(content)
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -152,49 +147,31 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries): def get_filtered_articles(entries, Is_short):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
# 构建长文本结果 if Is_short == False:
result_long += f"文章:[{entry[1]}]({entry[2]})\n" result += f"文章:[{entry[1]}]({entry[2]})\n"
result_long += f"作者:{entry[5]}\n" result += f"作者:{entry[5]}\n"
result_long += f"上传时间:{entry[4]}\n" result += f"上传时间:{entry[4]}\n"
result_long += f"简介:{entry[3]}\n" result += f"简介:{entry[3]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
# 构建短文本结果并进行分块处理 result += f"文章:[{entry[1]}]({entry[2]})\n"
current_entry = ( result += f"上传时间:{entry[4]}\n"
f"文章:[{entry[1]}]({entry[2]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[5]}\n" record += f"**作者**{entry[5]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += f"**简介**{entry[3]}\n" record += f"**简介**{entry[3]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_doonsec(Doonsec_switch, Doonsec): def Src_doonsec(Is_short, Doonsec_switch, Doonsec):
if not os.path.exists('./resources/db/doonsec.db'): if not os.path.exists('./resources/db/doonsec.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -203,36 +180,25 @@ def Src_doonsec(Doonsec_switch, Doonsec):
# clear_table() # clear_table()
# 获取 JSON 数据 # 获取 JSON 数据
doonsec_data = get_doonsec_json() M_doonsec_data = get_doonsec_json()
# 插入数据到数据库 # 插入数据到数据库
insert_data(doonsec_data) insert_data(M_doonsec_data)
# 查询指定时间段内的数据 # 查询指定时间段内的数据
filtered_articles = select_articles(Doonsec_switch, Doonsec) filtered_articles = select_articles(Doonsec_switch, Doonsec)
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles) results = get_filtered_articles(filtered_articles, Is_short)
return result_long, short_results return results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
results = Src_doonsec(False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"]) reslts = Src_doonsec(False, False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"] )
if results != False: if reslts != False:
result_long, short_results = results print(reslts)
# 写入长文本结果
with open("./1.txt", "a", encoding="utf-8") as f:
f.write(result_long)
f.write("\n" + "-" * 40 + "\n")
# 写入分块的短文本结果
for short_result in short_results:
with open("./2.txt", "a", encoding="utf-8") as f:
f.write(short_result)
f.write("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

@ -46,11 +46,7 @@ def get_freebuf_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/freebuf.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/freebuf.json', 'r', encoding='utf-8') as file:
content = file.read() data = json.load(file)
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -112,45 +108,28 @@ def record_md(result, filename="./resources/history/sec_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries): def get_filtered_articles(entries, Is_short):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
# 构建长文本结果 if Is_short == False:
result_long += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[5]}\n" result += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[5]}\n"
result_long += f"上传时间:{entry[4]}\n" result += f"上传时间:{entry[4]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
elif Is_short == True:
# 构建短文本结果并进行分块处理 result += f"文章:[{entry[1]}]({entry[2]})\n"
current_entry = ( result += f"上传时间:{entry[4]}\n"
f"文章:[{entry[1]}]({entry[2]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**类型**{entry[5]}\n" record += f"**类型**{entry[5]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_freebuf(e_hour): def Src_freebuf(e_hour, Is_short):
if not os.path.exists('./resources/db/freebuf.db'): if not os.path.exists('./resources/db/freebuf.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -169,26 +148,15 @@ def Src_freebuf(e_hour):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles) results = get_filtered_articles(filtered_articles, Is_short)
return result_long, short_results return results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
results = Src_freebuf(24) reslts = Src_freebuf(4, False)
if results != False: if reslts != False:
result_long, short_results = results print(reslts)
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

@ -62,44 +62,28 @@ def insert_data():
if not os.path.exists('./resources/JSON/github_keyword.json'): if not os.path.exists('./resources/JSON/github_keyword.json'):
raise FileNotFoundError(f"github_keyword文件不存在请检查程序是否运行正常") raise FileNotFoundError(f"github_keyword文件不存在请检查程序是否运行正常")
with open('./resources/JSON/github_keyword.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/github_keyword.json', 'r', encoding='utf-8') as file:
content = file.read() data_keyword = json.load(file)
if not content:
pass
else:
data_keyword = json.loads(content)
if not isinstance(data_keyword, list): if not isinstance(data_keyword, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
if not os.path.exists('./resources/JSON/github_repo.json'): if not os.path.exists('./resources/JSON/github_repo.json'):
raise FileNotFoundError(f"github_repo文件不存在请检查程序是否运行正常") raise FileNotFoundError(f"github_repo文件不存在请检查程序是否运行正常")
with open('./resources/JSON/github_repo.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/github_repo.json', 'r', encoding='utf-8') as file:
content = file.read() data_repo = json.load(file)
if not content:
pass
else:
data_repo = json.loads(content)
if not isinstance(data_repo, list): if not isinstance(data_repo, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
if not os.path.exists('./resources/JSON/github_release.json'): if not os.path.exists('./resources/JSON/github_release.json'):
raise FileNotFoundError(f"github_release文件不存在请检查程序是否运行正常") raise FileNotFoundError(f"github_release文件不存在请检查程序是否运行正常")
with open('./resources/JSON/github_release.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/github_release.json', 'r', encoding='utf-8') as file:
content = file.read() data_release = json.load(file)
if not content:
pass
else:
data_release = json.loads(content)
if not isinstance(data_release, list): if not isinstance(data_release, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
if not os.path.exists('./resources/JSON/github_user.json'): if not os.path.exists('./resources/JSON/github_user.json'):
raise FileNotFoundError(f"github_user文件不存在请检查程序是否运行正常") raise FileNotFoundError(f"github_user文件不存在请检查程序是否运行正常")
with open('./resources/JSON/github_user.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/github_user.json', 'r', encoding='utf-8') as file:
content = file.read() data_user = json.load(file)
if not content:
pass
else:
data_user = json.loads(content)
if not isinstance(data_user, list): if not isinstance(data_user, list):
raise ValueError("JSON文件格式错误请检查爬取程序是否异常") raise ValueError("JSON文件格式错误请检查爬取程序是否异常")
@ -119,8 +103,9 @@ def insert_data():
"language": item.get("language", "") "language": item.get("language", "")
} }
try: try:
# 解析 pubDate 字符串为 datetime 对象
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ') pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
pub_date += timedelta(hours=8) # 格式化 pubDate 为所需的格式
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S') formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
except ValueError: except ValueError:
# 如果解析失败,使用原始 pubDate 字符串 # 如果解析失败,使用原始 pubDate 字符串
@ -143,7 +128,7 @@ def insert_data():
entry = { entry = {
"id": index, "id": index,
"title": item.get("name", ""), "title": item.get("name", ""),
"link": f"https://github.com/{item.get('keyword', '')}", "link": item.get("link", ""),
"description": item.get("description", ""), "description": item.get("description", ""),
"pubDate": item.get("updated_at", ""), "pubDate": item.get("updated_at", ""),
"author": item.get("author", ""), "author": item.get("author", ""),
@ -151,8 +136,9 @@ def insert_data():
"link2": item.get("link_2", "") "link2": item.get("link_2", "")
} }
try: try:
# 解析 pubDate 字符串为 datetime 对象
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ') pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
pub_date += timedelta(hours=8) # 格式化 pubDate 为所需的格式
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S') formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
except ValueError: except ValueError:
# 如果解析失败,使用原始 pubDate 字符串 # 如果解析失败,使用原始 pubDate 字符串
@ -172,8 +158,9 @@ def insert_data():
"keyword": item.get("keyword", "") "keyword": item.get("keyword", "")
} }
try: try:
# 解析 pubDate 字符串为 datetime 对象
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ') pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
pub_date += timedelta(hours=8) # 格式化 pubDate 为所需的格式
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S') formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
except ValueError: except ValueError:
# 如果解析失败,使用原始 pubDate 字符串 # 如果解析失败,使用原始 pubDate 字符串
@ -198,8 +185,9 @@ def insert_data():
"language": item.get("language", "") "language": item.get("language", "")
} }
try: try:
# 解析 pubDate 字符串为 datetime 对象
pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ') pub_date = datetime.strptime(entry['pubDate'], '%Y-%m-%dT%H:%M:%SZ')
pub_date += timedelta(hours=8) # 格式化 pubDate 为所需的格式
formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S') formatted_pub_date = pub_date.strftime('%Y-%m-%d %H:%M:%S')
except ValueError: except ValueError:
# 如果解析失败,使用原始 pubDate 字符串 # 如果解析失败,使用原始 pubDate 字符串
@ -313,87 +301,65 @@ def record_md(result, filename="./resources/history/github.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries, choice): def get_filtered_articles(entries, Is_short, choice):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
if Is_short == False:
if choice == 1: if choice == 1:
# 构建长文本结果 result += f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
result_long += f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n" result += f"项目描述:{entry[3]}\n"
result_long += f"项目描述:{entry[3]}\n" result += f"上传时间:{entry[4]}\n"
result_long += f"上传时间:{entry[4]}\n" result += f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n"
result_long += f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n" result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
# 构建短文本结果并进行分块处理
current_entry = (
f"关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[4]}\n"
f"开发语言:{entry[7]}\t\t作者:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
elif choice == 2: elif choice == 2:
# 构建长文本结果 result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
result_long += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n" result += f"更新描述:{entry[3]}\n"
result_long += f"更新描述:{entry[3]}\n" result += f"更新时间:{entry[4]}\n"
result_long += f"更新时间:{entry[4]}\n" result += f"提交者:{entry[5]}[点此查看提交详情]({entry[2]})\n"
result_long += f"提交者:{entry[5]}[点此查看提交详情]({entry[7]})\n" result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
# 构建短文本结果并进行分块处理
current_entry = (
f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
f"更新时间:{entry[4]}\n"
f"提交者:{entry[5]}[点此查看提交详情]({entry[7]})\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
elif choice == 3: elif choice == 3:
# 构建长文本结果 result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
result_long += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n" result += f"项目描述:{entry[3]}\n"
result_long += f"项目描述:{entry[3]}\n" result += f"上传时间:{entry[4]}\n"
result_long += f"上传时间:{entry[4]}\n" result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
# 构建短文本结果并进行分块处理
current_entry = (
f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
elif choice == 4: elif choice == 4:
# 构建长文本结果 result += f"{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n"
result_long += f"{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n" result += f"发布时间:{entry[2]}\n"
result_long += f"发布时间:{entry[2]}\n" result += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
result_long += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 elif Is_short == True:
if choice == 1:
# 构建短文本结果并进行分块处理 result += f"关键词【{entry[7]}】发现新项目:[{entry[1]}]({entry[2]})\n"
current_entry = ( result += f"上传时间:{entry[4]}\n"
f"{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n" result += f"开发语言:{entry[6]}\t\t作者:{entry[5]}\n"
f"发布时间:{entry[2]}\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章 elif choice == 2:
) result += f"项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
result += f"更新描述:{entry[3]}\n"
temp_result = result_short + current_entry result += f"更新时间:{entry[4]}\n"
if len(temp_result.encode('utf-8')) > 4096: result += f"提交者:{entry[5]}[点此查看提交详情]({entry[2]})\n"
short_results.append(result_short) result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
result_short = current_entry elif choice == 3:
else: result += f"大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
result_short = temp_result result += f"项目描述:{entry[3]}\n"
result += f"上传时间:{entry[4]}\n"
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
elif choice == 4:
result += f"{entry[3]}】为[{entry[4]}]({entry[1]})发布了新版本,请及时查收!\n"
result += f"发布时间:{entry[2]}\n"
result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
if choice == 1: if choice == 1:
record += f"#### 关键词【{entry[6]}】发现新项目:[{entry[1]}]({entry[2]})\n" record += f"#### 关键词【{entry[7]}】发现新项目:[{entry[1]}]({entry[2]})\n"
record += f"**项目描述**{entry[3]}\n" record += f"**项目描述**{entry[3]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += f"**开发语言**{entry[7]}\n**作者**{entry[5]}\n" record += f"**开发语言**{entry[6]}\t\t**作者**{entry[5]}\n"
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
elif choice == 2: elif choice == 2:
record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n" record += f"#### 项目:[{entry[1]}]({entry[2]})存在更新!!!\n"
record += f"**更新描述**{entry[3]}\n" record += f"**更新描述**{entry[3]}\n"
record += f"**更新时间**{entry[4]}\n" record += f"**更新时间**{entry[4]}\n"
record += f"**提交者**{entry[5]}[点此查看提交详情]({entry[7]})\n" record += f"**提交者**{entry[5]}[点此查看提交详情]({entry[2]})\n"
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
elif choice == 3: elif choice == 3:
record += f"#### 大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n" record += f"#### 大佬 {entry[5]} 上传了一个新工具:[{entry[1]}]({entry[2]})\n"
@ -405,15 +371,11 @@ def get_filtered_articles(entries, choice):
record += f"**发布时间**{entry[2]}\n" record += f"**发布时间**{entry[2]}\n"
record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 10 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_github(e_hour): def Src_github(e_hour, Is_short):
if not os.path.exists('./resources/db/github.db'): if not os.path.exists('./resources/db/github.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -427,48 +389,35 @@ def Src_github(e_hour):
# 查询指定时间段内的数据 # 查询指定时间段内的数据
keyword_data, repo_data, user_data, release_data = select_articles(e_hour) keyword_data, repo_data, user_data, release_data = select_articles(e_hour)
results = []
if keyword_data: if keyword_data:
result_long_1, short_results_1 = get_filtered_articles(keyword_data, 1) result_1 = get_filtered_articles(keyword_data, Is_short, 1)
results.append((result_long_1, short_results_1))
else: else:
results.append(("", [])) result_1 = ""
if repo_data: if repo_data:
result_long_2, short_results_2 = get_filtered_articles(repo_data, 2) result_2 = get_filtered_articles(repo_data, Is_short, 2)
results.append((result_long_2, short_results_2))
else: else:
results.append(("", [])) result_2 = ""
if user_data: if user_data:
result_long_3, short_results_3 = get_filtered_articles(user_data, 3) result_3 = get_filtered_articles(user_data, Is_short, 3)
results.append((result_long_3, short_results_3))
else: else:
results.append(("", [])) result_3 = ""
if release_data: if release_data:
result_long_4, short_results_4 = get_filtered_articles(release_data, 4) result_4 = get_filtered_articles(release_data, Is_short, 4)
results.append((result_long_4, short_results_4))
else: else:
results.append(("", [])) result_4 = ""
return result_1, result_2, result_3, result_4
return results
if __name__ == "__main__": if __name__ == "__main__":
results = Src_github(240) result_1, result_2, result_3, result_4 = Src_github(24000, False)
for i, (result_long, short_results) in enumerate(results, start=1): if result_1 != "":
if result_long != "": print(result_1)
print(f"长文本结果 {i}") if result_2 != "":
print(result_long) print(result_2)
print("\n" + "-" * 10 + "\n") if result_3 != "":
print(result_3)
if short_results: if result_4 != "":
print(f"分块的短文本结果 {i}") print(result_4)
for short_result in short_results: if result_1 == "" and result_2 == "" and result_3 == "" and result_4 == "":
print(short_result)
print("\n" + "-" * 10 + "\n")
if all(result_long == "" and not short_results for result_long, short_results in results):
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 10) print("-" * 10)
print("github数据为空跳过执行。") print("github数据为空跳过执行。")

View File

@ -37,11 +37,7 @@ def get_qianxin_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/qianxin.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/qianxin.json', 'r', encoding='utf-8') as file:
content = file.read() data = json.load(file)
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -103,47 +99,30 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries): def get_filtered_articles(entries, Is_short):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
# 构建长文本结果 if Is_short == False:
result_long += f"文章:[{entry[1]}]({entry[2]})\n来源:{entry[3]}\n" result += f"文章:[{entry[1]}]({entry[2]})\n来源:{entry[3]}\n"
result_long += f"上传时间:{entry[5]}\n" result += f"上传时间:{entry[5]}\n"
result_long += f"描述:{entry[4]}\n" result += f"描述:{entry[4]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
# 构建短文本结果并进行分块处理 result += f"文章:[{entry[1]}]({entry[2]})\n"
current_entry = ( result += f"上传时间:{entry[5]}\n"
f"文章:[{entry[1]}]({entry[2]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**来源**{entry[3]}\n" record += f"**来源**{entry[3]}\n"
record += f"**上传时间**{entry[5]}\n" record += f"**上传时间**{entry[5]}\n"
record += f"**描述**{entry[4]}\n" record += f"**描述**{entry[4]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_qianxin(e_hour): def Src_qianxin(e_hour, Is_short):
if not os.path.exists('./resources/db/qianxin.db'): if not os.path.exists('./resources/db/qianxin.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -162,26 +141,15 @@ def Src_qianxin(e_hour):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles) results = get_filtered_articles(filtered_articles, Is_short)
return result_long, short_results return results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
results = Src_qianxin(4) reslts = Src_qianxin(4, False)
if results != False: if reslts != False:
result_long, short_results = results print(reslts)
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

@ -44,11 +44,7 @@ def get_seebug_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/seebug.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/seebug.json', 'r', encoding='utf-8') as file:
content = file.read() data = json.load(file)
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -110,47 +106,30 @@ def record_md(result, filename="./resources/history/sec_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries): def get_filtered_articles(entries, Is_short):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
# 构建长文本结果 if Is_short == False:
result_long += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[3]}\n" result += f"文章:[{entry[1]}]({entry[2]})\n类型:{entry[3]}\n"
result_long += f"上传时间:{entry[5]}\n" result += f"上传时间:{entry[5]}\n"
result_long += f"{entry[4]}\n" result += f"{entry[4]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
# 构建短文本结果并进行分块处理 result += f"文章:[{entry[1]}]({entry[2]})"
current_entry = ( result += f"上传时间:{entry[5]}\n"
f"文章:[{entry[1]}]({entry[2]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**类型**{entry[3]}\n" record += f"**类型**{entry[3]}\n"
record += f"**上传时间**{entry[5]}\n" record += f"**上传时间**{entry[5]}\n"
record += f"{entry[4]}\n" record += f"{entry[4]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_seebug(e_hour): def Src_seebug(e_hour, Is_short):
if not os.path.exists('./resources/db/seebug.db'): if not os.path.exists('./resources/db/seebug.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -169,26 +148,15 @@ def Src_seebug(e_hour):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles) results = get_filtered_articles(filtered_articles, Is_short)
return result_long, short_results return results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
results = Src_seebug(100) reslts = Src_seebug(100, False)
if results != False: if reslts != False:
result_long, short_results = results print(reslts)
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

@ -52,11 +52,7 @@ def get_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/sougou-wx.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/sougou-wx.json', 'r', encoding='utf-8') as file:
content = file.read() data = json.load(file)
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个关键词的字典 # 假设data是一个包含多个关键词的字典
total_data = [] total_data = []
@ -143,49 +139,30 @@ def record_md(result, filename="./resources/history/wx_news.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries): def get_filtered_articles(entries, Is_short):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
# 构建长文本结果 if Is_short == False:
result_long += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n" result += f"文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
result_long += f"上传时间:{entry[4]}\n" result += f"上传时间:{entry[4]}\n"
result_long += f"作者:{entry[5]}\n" result += f"作者:{entry[5]}\n"
result_long += f"关键词:{entry[6]}\n" result += f"关键词:{entry[6]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == True:
# 构建短文本结果并进行分块处理 result += f"文章:[{entry[1]}]({entry[2]})"
current_entry = ( result += f"上传时间:{entry[4]}\n"
f"文章:[{entry[1]}]({entry[2]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
f"关键词:{entry[6]}\n"
f"上传时间:{entry[4]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n描述:{entry[3]}\n"
record += f"**上传时间**{entry[4]}\n" record += f"**上传时间**{entry[4]}\n"
record += f"**作者**{entry[5]}\n" record += f"**作者**{entry[5]}\n"
record += f"**关键词**{entry[6]}\n" record += f"**关键词**{entry[6]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results def Src_sougou_wx(Is_short):
def Src_sougou_wx():
if not os.path.exists('./resources/db/sougou-wx.db'): if not os.path.exists('./resources/db/sougou-wx.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -204,26 +181,15 @@ def Src_sougou_wx():
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles) results = get_filtered_articles(filtered_articles, Is_short)
return result_long, short_results return results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
results = Src_sougou_wx() reslts = Src_sougou_wx(False)
if results != False: if reslts != False:
result_long, short_results = results print(reslts)
# 写入长文本结果
with open("./1.txt", "a", encoding="utf-8") as f:
f.write(result_long)
f.write("\n" + "-" * 40 + "\n")
# 写入分块的短文本结果
for short_result in short_results:
with open("./2.txt", "a", encoding="utf-8") as f:
f.write(short_result)
f.write("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

@ -1,233 +0,0 @@
# -*- coding: utf-8 -*-
import json
import sqlite3
import os
from datetime import datetime, timedelta
def create_database():
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
cursor.execute('''CREATE TABLE IF NOT EXISTS articles (
id INTEGER PRIMARY KEY AUTOINCREMENT,
title TEXT,
link TEXT,
author TEXT,
description TEXT,
pubDate DATETIME,
source TEXT,
is_sended BOOLEAN
)''')
conn.commit()
conn.close()
def insert_data(data):
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
for entry in data:
cursor.execute('''
SELECT 1 FROM articles WHERE title = ? AND author = ?
''', (entry['title'], entry['author']))
if cursor.fetchone() is None:
cursor.execute('''
INSERT INTO articles (title, link, author, description, pubDate, source)
VALUES (?, ?, ?, ?, ?, ?)
''', (entry['title'], entry['link'], entry['author'], entry['description'], entry['published'], entry['source']))
conn.commit()
conn.close()
def get_uni_rss_json():
# 检查文件是否存在
if not os.path.exists('./resources/JSON/uni_rss.json'):
raise FileNotFoundError(f"uni_rss.json文件不存在请检查程序是否运行正常")
# 打开并读取JSON文件
with open('./resources/JSON/uni_rss.json', 'r', encoding='utf-8') as file:
content = file.read()
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list):
raise ValueError("JSON文件格式错误请检查common.py是否异常")
# 提取所需字段并编号
total_data = []
for index, item in enumerate(data, start=1):
entry = {
"id": index,
"title": item.get("title", ""),
"link": item.get("link", ""),
"author": item.get("author", ""),
"description": item.get("description", ""),
"published": item.get("published", ""),
"source": item.get("source", ""),
}
total_data.append(entry)
return total_data
def select_articles(uni_rss_switch, Unity):
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
# 获取当前日期和时间
now = datetime.now()
two_days_ago = now - timedelta(days=2)
if uni_rss_switch == False:
# 查询指定时间段内的数据
cursor.execute('''
SELECT * FROM articles
WHERE is_sended IS NULL AND pubDate BETWEEN ? AND ?
ORDER BY pubDate DESC
''', (two_days_ago.strftime('%Y-%m-%d %H:%M:%S'), now.strftime('%Y-%m-%d %H:%M:%S')))
elif uni_rss_switch == True:
# 查询指定时间段内且title包含特定关键词的数据
like_conditions = ' OR '.join([f"title LIKE ?"] * len(Unity))
# 完整的查询语句
query = f'''
SELECT * FROM articles
WHERE is_sended IS NULL AND pubDate BETWEEN ? AND ?
AND ({like_conditions})
ORDER BY pubDate DESC
'''
# 构建参数列表
params = [
two_days_ago.strftime('%Y-%m-%d %H:%M:%S'),
now.strftime('%Y-%m-%d %H:%M:%S')
] + [f'%{keyword}%' for keyword in Unity]
# 执行查询
cursor.execute(query, params)
results = cursor.fetchall()
if results:
for row in results:
user_id = row[0]
cursor.execute('''
UPDATE articles
SET is_sended = True
WHERE id = ?
''', (user_id,))
conn.commit() # 提交事务
conn.close()
return results
def clear_table():
conn = sqlite3.connect('./resources/db/uni_rss.db')
cursor = conn.cursor()
cursor.execute('DELETE FROM articles')
conn.commit()
conn.close()
def record_md(result, filename="./resources/history/uni_passage.md"):
# 读取现有内容
if os.path.exists(filename):
with open(filename, 'r', encoding='utf-8') as file:
existing_content = file.read()
else:
existing_content = ""
# 将新内容插入到现有内容的开头
new_content = result + existing_content
# 写回文件
with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content)
def get_filtered_articles(entries):
result_long = ""
result_short = ""
record = ""
short_results = []
for entry in entries:
# 构建长文本结果
result_long += f"文章:[{entry[1]}]({entry[2]})\n"
result_long += f"作者:{entry[3]}\n"
result_long += f"描述:{entry[4]}\n"
result_long += f"上传时间:{entry[5]}\n"
result_long += f"来源:{entry[6]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 构建短文本结果并进行分块处理
current_entry = (
f"文章:[{entry[1]}]({entry[2]})\n"
f"上传时间:{entry[5]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**作者**{entry[3]}\n"
record += f"**描述**{entry[4]}\n"
record += f"**上传时间**{entry[5]}\n"
record += f"**来源**{entry[6]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record)
return result_long, short_results
def Src_uni_rss(uni_rss_switch, Unity):
if not os.path.exists('./resources/db/uni_rss.db'):
# 创建数据库和表
create_database()
# 清空表
# clear_table()
# 获取 JSON 数据
uni_rss_data = get_uni_rss_json()
# 插入数据到数据库
insert_data(uni_rss_data)
# 查询指定时间段内的数据
filtered_articles = select_articles(uni_rss_switch, Unity)
# print(filtered_articles)
if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles)
return result_long, short_results
else:
return False
if __name__ == "__main__":
results = Src_uni_rss(False, ["webshell", "2000", "POC", "SQL", "XSS", "CSRF", "漏洞"])
if results:
result_long, short_results = results
# 写入长文本结果
with open("./1.txt", "a", encoding="utf-8") as f:
f.write(result_long)
f.write("\n" + "-" * 40 + "\n")
# 写入分块的短文本结果
for short_result in short_results:
with open("./2.txt", "a", encoding="utf-8") as f:
f.write(short_result)
f.write("\n" + "-" * 40 + "\n")
else:
# 如果为空,则跳过执行
print("-" * 40)
print("聚合RSS数据为空跳过执行。")

View File

@ -45,11 +45,7 @@ def get_xianzhi_json():
# 打开并读取JSON文件 # 打开并读取JSON文件
with open('./resources/JSON/xianzhi.json', 'r', encoding='utf-8') as file: with open('./resources/JSON/xianzhi.json', 'r', encoding='utf-8') as file:
content = file.read() data = json.load(file)
if not content:
pass
else:
data = json.loads(content)
# 假设data是一个包含多个JSON对象的列表 # 假设data是一个包含多个JSON对象的列表
if not isinstance(data, list): if not isinstance(data, list):
@ -109,44 +105,27 @@ def record_md(result, filename="./resources/history/tech_passage.md"):
with open(filename, 'w', encoding='utf-8') as file: with open(filename, 'w', encoding='utf-8') as file:
file.write(new_content) file.write(new_content)
def get_filtered_articles(entries): def get_filtered_articles(entries, Is_short):
result_long = "" result = ""
result_short = ""
record = "" record = ""
short_results = []
for entry in entries: for entry in entries:
# 构建长文本结果 if Is_short == False:
result_long += f"文章:[{entry[1]}]({entry[2]})\n" result += f"文章:[{entry[1]}]({entry[2]})\n"
result_long += f"上传时间:{entry[3]}\n" result += f"上传时间:{entry[3]}\n"
result_long += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 result += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
if Is_short == False:
# 构建短文本结果并进行分块处理 result += f"文章:[{entry[1]}]({entry[2]})\n"
current_entry = ( result += f"上传时间:{entry[3]}\n"
f"文章:[{entry[1]}]({entry[2]})\n" result += "\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
f"上传时间:{entry[3]}\n"
"\n" + "-" * 3 + "\n" # 添加分隔线以便区分不同文章
)
temp_result = result_short + current_entry
if len(temp_result.encode('utf-8')) > 4096:
short_results.append(result_short)
result_short = current_entry
else:
result_short = temp_result
record += f"#### 文章:[{entry[1]}]({entry[2]})\n" record += f"#### 文章:[{entry[1]}]({entry[2]})\n"
record += f"**上传时间**{entry[3]}\n" record += f"**上传时间**{entry[3]}\n"
record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章 record += "\n" + "-" * 40 + "\n" # 添加分隔线以便区分不同文章
# 处理最后一个结果
if result_short:
short_results.append(result_short)
record_md(record) record_md(record)
return result
return result_long, short_results
def Src_xianzhi(e_hour): def Src_xianzhi(e_hour, Is_short):
if not os.path.exists('./resources/db/xianzhi.db'): if not os.path.exists('./resources/db/xianzhi.db'):
# 创建数据库和表 # 创建数据库和表
create_database() create_database()
@ -165,26 +144,15 @@ def Src_xianzhi(e_hour):
# print(filtered_articles) # print(filtered_articles)
if filtered_articles: if filtered_articles:
result_long, short_results = get_filtered_articles(filtered_articles) results = get_filtered_articles(filtered_articles, Is_short)
return result_long, short_results return results
else: else:
return False return False
if __name__ == "__main__": if __name__ == "__main__":
results = Src_xianzhi(124) reslts = Src_xianzhi(4, False)
if results != False: if reslts != False:
result_long, short_results = results print(reslts)
# 打印长文本结果
print("长文本结果:")
print(result_long)
print("\n" + "-" * 40 + "\n")
# 打印分块的短文本结果
print("分块的短文本结果:")
for short_result in short_results:
print(short_result)
print("\n" + "-" * 40 + "\n")
else: else:
# 如果为空,则跳过执行 # 如果为空,则跳过执行
print("-" * 40) print("-" * 40)

View File

View File

@ -1,53 +1,40 @@
### 问题反馈 ### 问题反馈 <br>
- 准点发送的文章在定点推送模式下可能会被遗漏推送 - 准点发送的文章在定点推送模式下可能会被遗漏推送 <br>
`已通过增加时间范围功能改善此问题,彻底解决需要重构代码` `已通过增加时间范围功能改善此问题,彻底解决需要重构代码`
- 钉钉/企业微信/蓝信webhook存在字节长度限制需要优化程序推送逻辑 - 钉钉/企业微信/蓝信webhook存在字节长度限制需要优化程序推送逻辑 <br>
`重构了短文本推送机制已解决此bug` `尽力改善中,彻底解决需重构代码`
- 首次运行时若抓取RSS源失败筛选模块无法获取json文件时会导致中断 - 首次运行时若抓取RSS源失败筛选模块无法获取json文件时会导致中断 <br>
`为项目添加一个初始json文件` `为项目添加一个初始json文件`
- 程序运行会产生越来越巨大的DB文件与Markdown文件同时web网页显示的内容也会非常长不利于节省服务器流量与加载速度
`为系统添加性能限制模块`
### 下一步计划(待完成) ### 下一步计划(待完成) <br>
- 添加更多推送方式,如邮件、微信等 - 添加更多RSS订阅源持续进行中 <br>
- 添加谷歌搜索等更多相关检测源,后续将支持谷歌语法 - 添加更多推送方式,如邮件、微信等 <br>
- 添加百度搜索、谷歌搜索等更多相关检测源,后续将支持谷歌语法 <br>
### 下一步计划(已完成) <br>
### 下一步计划(已完成)
- 将所有打印信息转为logging info并存档已完成<br> - 将所有打印信息转为logging info并存档已完成<br>
- 将logging info转为异步的loguru已完成 - 将logging info转为异步的loguru已完成 <br>
- 探查异常中断原因已解决获取rss源时的请求未做超时检测 - 探查异常中断原因已解决获取rss源时的请求未做超时检测 <br>
- 添加超时机制,防止程序异常卡死(已完成) - 添加超时机制,防止程序异常卡死(已完成) <br>
- 存档所有推送文章方便以后查看(已完成) - 存档所有推送文章方便以后查看(已完成) <br>
- 创建Web网页以展示最新推送info.masonliu.com已完成 - 创建Web网页以展示最新推送info.masonliu.com已完成 <br>
- 更换筛选模块,由时段筛选改为历史记录筛选以确保不会有资讯漏报(筛选条件增加了时间筛选和是否已发送筛选) - 更换筛选模块,由时段筛选改为历史记录筛选以确保不会有资讯漏报(筛选条件增加了时间筛选和是否已发送筛选) <br>
- 添加GitHub等监测源重构参考项目逻辑并上线 - 添加GitHub等监测源重构参考项目逻辑并上线 <br>
- 添加百度监测源
- 添加性能限制模块(限制每次读取数量)
- 将搜狗-微信和GitHub同步上网站推送
### 下一步计划(已作废) ### 下一步计划(已作废) <br>
- 添加Mysql作为数据库存储现有sqlite已满足使用 - 添加Mysql作为数据库存储现有sqlite已满足使用 <br>
### 更新日志 ### 更新日志
#### 从2024年12月15日开始记录 #### 从2024年12月15日开始记录
- 2024年12月15日早优化了文件结构修复了日志记录时的小BUG添加web展示日志功能 - 2024年12月15日早优化了文件结构修复了日志记录时的小BUG添加web展示日志功能 <br>
- 2024年12月15日晚修复了单次运行结束时的校验错误问题 - 2024年12月15日晚修复了单次运行结束时的校验错误问题 <br>
- 2024年12月18日早添加了短文本推送机制一定程度上解决了长字节推送问题解决办法正在思考中 - 2024年12月18日早添加了短文本推送机制一定程度上解决了长字节推送问题解决办法正在思考中 <br>
- 2024年12月24日晚上传了测试0.1版本,修复了报错问题 - 2024年12月24日晚上传了测试0.1版本,修复了报错问题 <br>
- 2024年12月25日早优化了代码逻辑和表现 - 2024年12月25日早优化了代码逻辑和表现 <br>
- 2024年12月25日晚优化了推送报文格式 - 2024年12月25日晚优化了推送报文格式 <br>
- 2024年12月30日添加并完善了基于搜狗搜索的微信公众号文章监测 - 2024年12月30日添加并完善了基于搜狗搜索的微信公众号文章监测 <br>
- 2024年12月30日晚为洞见微信资讯推送添加了关键词筛选 - 2024年12月30日晚为洞见微信资讯推送添加了关键词筛选 <br>
- 2025年01月02日更新并上线了Github项目监测功能readme后续更新中 - 2025年01月02日更新并上线了Github项目监测功能readme后续更新中 <br>
- 2025年01月02日晚再次优化了文件结构提高可读性 - 2025年01月02日晚再次优化了文件结构提高可读性 <br>
- 2025年01月05日晚修复了doonsec相关配置的bug程序现已可正常运行 - 2025年01月05日晚修复了doonsec相关配置的bug程序现已可正常运行 <br>
- 2025年01月06日更新了配置信息自动获取的逻辑添加关键词等现可在运行时添加重要配置信息config.yaml仍需暂停重新运行 - 2025年01月06日更新了配置信息自动获取的逻辑添加关键词等现可在运行时添加重要配置信息config.yaml仍需暂停重新运行 <br>
- 2025年01月10日上午修复了github推送的问题时区消息配置错误等
- 2025年01月10日下午上线了百度搜索内容监测
- 2025年01月14日晚添加了网站读取文件逻辑仅读取限制数量的文件避免文件过大导致程序崩溃或是阅读困难
- 2025年01月15日早优化并精简了web程序的代码
- 2025年01月22日完善短文本推送机制现已可完美支持推送至企业微信、钉钉、蓝信、微信等等待后续开发
- 2025年01月24日早修复了json文件为空时程序中断的问题并优化了报错逻辑
- 2025年03月10日早为程序添加了通用rss接口可支持更多rss源
- 2025年03月14日晚为程序添加了通用rss发送程序同时修复了一个神奇的bug现可支持更多rss源

View File

@ -4,7 +4,7 @@ from loguru import logger
# 清除所有已有的日志记录器配置 # 清除所有已有的日志记录器配置
logger.remove() logger.remove()
logger.add("./resources/log/core.log", logger.add("./log/core.log",
format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}", format="{time:YYYY-MM-DD HH:mm:ss} - {level} - {name}:{function}:{line} - {message}",
rotation="100 MB", rotation="100 MB",
compression="zip", compression="zip",
@ -17,8 +17,8 @@ def get_core_config():
# 加载参数 # 加载参数
with open('./config/config.yaml', 'r', encoding="utf-8") as file: with open('./config/config.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file) config = yaml.safe_load(file)
debug = config.get('debug', 'False') # 使用 get 方法提供默认值 debug = f"{config['debug']}"
if str(debug).lower() == "true": # 统一转换为小写进行比较 if debug == "True":
logger.debug("Debug mode is on") logger.debug("Debug mode is on")
logger.debug(f"Loaded config: {config}") # 输出加载的配置 logger.debug(f"Loaded config: {config}") # 输出加载的配置
@ -66,23 +66,15 @@ def get_debug_config():
return debug return debug
def get_keywords_config(item): def get_kewords_config():
with open('./config/keywords.yaml', 'r', encoding="utf-8") as file: with open('./config/keywords.yaml', 'r', encoding="utf-8") as file:
config = yaml.safe_load(file) config = yaml.safe_load(file)
if item == 'Doonsec': Sogou_WX = config['Sogou-WX']
Doonsec_switch = config.get('Doonsec-switch', False) Doonsec_switch = config.get('Doonsec-switch', False)
Doonsec = config['Doonsec'] Doonsec = config['Doonsec']
return Doonsec_switch, Doonsec
elif item == 'Sogou-WX':
Sogou_WX = config['Sogou-WX']
return Sogou_WX
elif item == 'Baidu':
Baidu = config['Baidu']
return Baidu
elif item == 'Unity':
uni_switch = config.get('uni-switch', False)
Unity = config['Unity']
return uni_switch, Unity
else:
logger.error("参数错误,请检查./config/keywords.yaml")
# print (Sogou_WX, Doonsec_switch, Doonsec)
return Sogou_WX, Doonsec_switch, Doonsec
if __name__ == "__main__":
get_kewords_config()

View File

@ -1,12 +1,14 @@
# 飞书相关配置信息 # 飞书相关配置信息
# fs_activate: True # fs_activate: True
# fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74 # 此处填写token记得冒号后空一格如aa04a02f-d7bf-4279-bd48-44c4f28c8f74
# fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥记得冒号后空一格如4tq65T4jm1MO2IlxvHxBWe
fs_activate: True fs_activate: True
fs_key: aa04a02f-d7bf-4279-bd48-44c4f28c8f74 # 此处填写token记得冒号后空一格如aa04a02f-d7bf-4279-bd48-44c4f28c8f74 fs_key: 202d7e51-9a46-422e-a035-863bc42bc459 # 此处填写token记得冒号后空一格如aa04a02f-d7bf-4279-bd48-44c4f28c8f74
fs_secret: 4tq65T4jm1MO2IlxvHxBWe # 此处填写签名密钥记得冒号后空一格如4tq65T4jm1MO2IlxvHxBWe fs_secret: eZaSCl5DSqtJyZ8QpJBDFh # 此处填写签名密钥记得冒号后空一格如4tq65T4jm1MO2IlxvHxBWe
# 企业微信相关配置信息 # 企业微信相关配置信息
wx_activate: False wx_activate: False
wx_key: 9a3dd6ff-75d6-4208-bc4b-77724a5805d6 # 此处填写token记得冒号后空一格如9a3dd6ff-75d6-4208-bc4b-77724a5805d6 wx_key: # 此处填写token记得冒号后空一格如9a3dd6ff-75d6-4208-bc4b-77724a5805d6
# 钉钉相关配置信息 # 钉钉相关配置信息
ding_activate: False ding_activate: False
@ -27,14 +29,13 @@ e_hour: 4 # 程序运行时间间隔
time_mode: 1 time_mode: 1
# 0定时运行模式仅在指定时间运行参照Core.py中设置 # 0定时运行模式仅在指定时间运行参照Core.py中设置
# 1启用循环一定间隔时间后运行 # 1启用循环一定间隔时间后运行
mode: [1, 2, 3] # 运行模式,可多选 mode: [0] # 运行模式,可多选
# 0启用RSS抓取模式 # 0启用RSS抓取模式
# 1启用搜狗-微信公众号文章监测 # 1启用搜狗-微信公众号文章监测
# 2启用github项目监测 # 2启用github项目监测
# 3启用百度搜索内容监测
# 网址配置 # 网址配置
url: https://info.masonliu.com/ # 请设置为您自己反代的域名,或者改为 http://127.0.0.1:5000 或者对应IP域名 url: https://info.masonliu.com/ # 请设置为您自己反代的域名,或者改为 http://127.0.0.1:5000 或者对应IP域名
# 调试模式 # 调试模式
debug: True debug: False

View File

@ -5,14 +5,45 @@ translate: False # 是否开启翻译
# 监控列表 # 监控列表
tool_list: # 监控已创建的仓库是否更新 tool_list: # 监控已创建的仓库是否更新
- BeichenDream/Godzilla - BeichenDream/Godzilla
- rebeyond/Behinder
- AntSwordProject/antSword
- j1anFen/shiro_attack
- yhy0/github-cve-monitor
- gentilkiwi/mimikatz
- ehang-io/nps
- chaitin/xray
- FunnyWolf/pystinger
- L-codes/Neo-reGeorg
- shadow1ng/fscan
- SafeGroceryStore/MDUT
- EdgeSecurityTeam/Vulnerability
- Vme18000yuan/FreePOC
- wy876/POC - wy876/POC
keyword_list: # 监控关键词 keyword_list: # 监控关键词
- sql注入 - sql注入
- cnvd - cnvd
- 未授权
- 漏洞POC
- RCE
- 渗透测试
- 反序列化
- 攻防
- webshell
- 红队
- redteam
- 信息收集
- 绕过
- bypass av
user_list: # 监控用户 user_list: # 监控用户
- su18
- BeichenDream
- phith0n
- zhzyker
- lijiejie
- projectdiscovery
- HavocFramework
black_words: # 监控违禁词 black_words: # 监控违禁词
- 反共 - 反共

View File

@ -1,6 +1,3 @@
Sogou-WX: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于搜狗引擎搜索特定关键词的微信公众号文章
Doonsec-switch: False Doonsec-switch: False
Doonsec: ["逆向", "解包", "POC"] # 洞见微信安全资讯关键词 Doonsec: ["逆向", "解包", "POC"] # 洞见微信安全资讯关键词
uni-switch: False
Unity: ["逆向", "解包", "POC", "漏洞"] # 聚合RSS资讯关键词
Sogou-WX: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于搜狗引擎搜索特定关键词的微信公众号文章
Baidu: ["银行测试", "APP逆向", "渗透测试", "手机银行漏洞", "银行漏洞", "支付漏洞"] # 基于百度搜索特定关键词的文章

View File

@ -1,8 +0,0 @@
link:
- 美团技术团队|https://tech.meituan.com/feed
- 360 Netlab Blog|https://blog.netlab.360.com/rss
- 知道创宇404实验室|https://paper.seebug.org/rss
- 腾讯安全响应中心|https://security.tencent.com/index.php/feed/blog
wechat:
- 美团技术团队|https://wechat2rss.xlab.app/feed/294bc034c9941529cd86a8a4b8999d100186c04d.xml

4
log/core.log Normal file
View File

@ -0,0 +1,4 @@
2025-01-06 00:28:38 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:29:41 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:33:10 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:33:15 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}

View File

@ -6,5 +6,3 @@ requests
python-dateutil python-dateutil
loguru loguru
beautifulsoup4 beautifulsoup4
feedparser

File diff suppressed because one or more lines are too long

View File

@ -1,162 +1,162 @@
[ [
{ {
"guid": "https://www.anquanke.com/post/id/305052", "guid": "https://www.anquanke.com/post/id/303249",
"title": "腾达 AC7 路由器漏洞:攻击者可借助恶意有效载荷获取 Root Shell 权限", "title": "2025年数字安全十大趋势预测挑战、机遇、变革与战略布局",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "cybersecuritynews", "source": "微信",
"pubDate": "2025-03-14 11:32:33" "pubDate": "2025-01-03 11:28:51"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305049", "guid": "https://www.anquanke.com/post/id/303246",
"title": "GitLab警告多个高危漏洞或致使攻击者可冒充有效用户登录", "title": "已打补丁但仍有漏洞 Windows BitLocker 加密再次被绕过",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "cybersecuritynews", "source": "securityonline",
"pubDate": "2025-03-14 11:24:45" "pubDate": "2025-01-03 11:21:09"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305045", "guid": "https://www.anquanke.com/post/id/303243",
"title": "Siemens SINAMICS S200 陷安全危机,引导加载程序漏洞引攻击者觊觎", "title": "CVE-2024-21182 针对严重 WebLogic 漏洞发布 PoC 漏洞利用代码",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "cybersecuritynews", "source": "securityonline",
"pubDate": "2025-03-14 11:18:08" "pubDate": "2025-01-03 11:15:29"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305043", "guid": "https://www.anquanke.com/post/id/303240",
"title": "微软警示ClickFix 通过虚假 Booking. com 邮件,对酒店业展开网络钓鱼行动", "title": "日本最大移动运营商称网络攻击中断了部分服务",
"author": " 安全客",
"description": null,
"source": "therecord",
"pubDate": "2025-01-03 11:02:09"
},
{
"guid": "https://www.anquanke.com/post/id/303236",
"title": "新的 DoubleClickjacking 攻击利用双击来劫持帐户",
"author": " 安全客",
"description": null,
"source": "bleepingcomputer",
"pubDate": "2025-01-03 10:53:02"
},
{
"guid": "https://www.anquanke.com/post/id/303233",
"title": "揭开虚假人气的面纱: 研究揭露 GitHub 上的 450 万颗假星",
"author": " 安全客",
"description": null,
"source": "securityonline",
"pubDate": "2025-01-03 10:41:42"
},
{
"guid": "https://www.anquanke.com/post/id/303230",
"title": "苹果公司将支付 9500 万美元解决 Siri 隐私诉讼",
"author": " 安全客",
"description": null,
"source": "therecord",
"pubDate": "2025-01-03 10:29:54"
},
{
"guid": "https://www.anquanke.com/post/id/303227",
"title": "跨域攻击: 现代安全面临的日益严重的威胁以及如何应对这些威胁",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "TheHackersNews", "source": "TheHackersNews",
"pubDate": "2025-03-14 11:05:39" "pubDate": "2025-01-03 10:21:30"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305041", "guid": "https://www.anquanke.com/post/id/303224",
"title": "黑客滥用Microsoft Copilot进行复杂的网络钓鱼攻击", "title": "假冒 7-Zip 漏洞代码源于人工智能生成的误解",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-14 10:54:30"
},
{
"guid": "https://www.anquanke.com/post/id/305038",
"title": "勒索软件攻击达到历史新高2025年2月攻击数量激增126%",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "hackread", "source": "hackread",
"pubDate": "2025-03-14 10:36:04" "pubDate": "2025-01-03 10:12:25"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305035", "guid": "https://www.anquanke.com/post/id/303221",
"title": "Medusa 勒索软件威胁:企业面临的持续挑战", "title": "官员警告:黑客泄露了罗德岛州勒索软件攻击的数据",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "securitybrief", "source": "cybersecuritydive",
"pubDate": "2025-03-14 10:23:46" "pubDate": "2025-01-03 10:04:05"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305026", "guid": "https://www.anquanke.com/post/id/303208",
"title": "360预警银狐木马又双叒变异PDF文件成传播“帮凶”", "title": "2024年度盘点之漏洞威胁AI技术降低漏洞利用门槛网络边缘设备成重灾区",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "360数字安全", "source": "微信",
"pubDate": "2025-03-14 10:08:25" "pubDate": "2025-01-02 16:51:55"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305023", "guid": "https://www.anquanke.com/post/id/303205",
"title": "ExHub 的 IDOR 漏洞可致攻击者篡改网站托管配置", "title": "66,000 台 DrayTek 网关存在远程命令注入漏洞 (CVE-2024-12987),已发布 PoC",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "cybersecuritynews", "source": "securityonline",
"pubDate": "2025-03-13 14:50:25" "pubDate": "2025-01-02 16:41:12"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305020", "guid": "https://www.anquanke.com/post/id/303202",
"title": "施乐打印机漏洞可致攻击者从PDA和SMB捕获身份验证数据", "title": "D-Link 就易受僵尸网络攻击的报废路由器发出警告",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "cybersecuritynews", "source": "securityonline",
"pubDate": "2025-03-13 14:39:42" "pubDate": "2025-01-02 16:35:11"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305015", "guid": "https://www.anquanke.com/post/id/303199",
"title": "瞻博网络成功修复 Session Smart Router 关键漏洞", "title": "CVE-2024-12108 (CVSS 9.6) 及更高版本: Progress 为 WhatsUp Gold 网络监控软件发布关键补丁程序",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "securityaffairs 2", "source": "securityonline",
"pubDate": "2025-03-13 11:38:18" "pubDate": "2025-01-02 16:27:46"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305013", "guid": "https://www.anquanke.com/post/id/303196",
"title": "Blind Eagle APT-C-36快速利用补丁漏洞借知名平台发动网络攻击", "title": "针对 Windows 零点击漏洞 CVE-2024-49112 发布 PoC 漏洞利用程序",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "cybersecuritynews", "source": "securityonline",
"pubDate": "2025-03-13 11:24:58" "pubDate": "2025-01-02 16:20:29"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305010", "guid": "https://www.anquanke.com/post/id/303193",
"title": "通过 YouTube 传播的 DCRat 恶意软件正攻击用户以窃取登录凭证", "title": "拟议更新HIPAA安全规则授权以在72小时内恢复某些相关电子信息系统和数据的丢失",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "cybersecuritynews", "source": "securityaffairs",
"pubDate": "2025-03-13 11:03:28" "pubDate": "2025-01-02 15:15:33"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305007", "guid": "https://www.anquanke.com/post/id/303187",
"title": "不断演变的分布式拒绝服务DDoS攻击策略网络专家剖析社交媒体平台X的遭袭事件", "title": "新的 “双重点击劫持 ”漏洞绕过了主要网站的点击劫持保护措施",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "securitybrief", "source": "TheHackersNews",
"pubDate": "2025-03-13 10:49:42" "pubDate": "2025-01-02 14:53:40"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305005", "guid": "https://www.anquanke.com/post/id/303182",
"title": "新型Anubis恶意软件可完全躲避检测让黑客得以执行远程命令", "title": "新的 IOCONTROL 恶意软件用于关键基础设施攻击",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "cybersecuritynews", "source": "嘶吼",
"pubDate": "2025-03-13 10:41:12" "pubDate": "2025-01-02 14:44:44"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/305002", "guid": "https://www.anquanke.com/post/id/303179",
"title": "Opentext推出人工智能网络安全解决方案抵御威胁", "title": "2025 年医疗保健网络监管和立法前景如何?",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "securitybrief", "source": "govinfosecurity",
"pubDate": "2025-03-13 10:23:40" "pubDate": "2025-01-02 14:27:41"
}, },
{ {
"guid": "https://www.anquanke.com/post/id/304997", "guid": "https://www.anquanke.com/post/id/303176",
"title": "Nasuni 与 CrowdStrike 合作,大幅提升威胁检测效能", "title": "FortiGuard Labs 将新的 EC2 Grouper 黑客与 AWS 凭证漏洞联系起来",
"author": " 安全客", "author": " 安全客",
"description": null, "description": null,
"source": "securitybrief", "source": "hackread",
"pubDate": "2025-03-13 10:13:45" "pubDate": "2025-01-02 14:19:55"
},
{
"guid": "https://www.anquanke.com/post/id/304995",
"title": "360携手首都在线 拟推动DeepSeek一体机安全与服务落地合作",
"author": " 安全客",
"description": null,
"source": "360数字安全",
"pubDate": "2025-03-13 10:01:25"
},
{
"guid": "https://www.anquanke.com/post/id/304990",
"title": "紧急CISA 警告苹果 iOS 漏洞正被恶意利用",
"author": " 安全客",
"description": null,
"source": "cybersecuritynews",
"pubDate": "2025-03-12 17:53:54"
},
{
"guid": "https://www.anquanke.com/post/id/304988",
"title": "360携手清微智能DeepSeek一体机 拟推动“国产算力+大模型安全+AI应用”协同发展",
"author": " 安全客",
"description": null,
"source": "360数字安全",
"pubDate": "2025-03-12 17:40:24"
} }
] ]

View File

@ -1,144 +0,0 @@
{
"齐鲁银行": [
{
"title": "齐鲁银行在您身旁",
"link": "https://www.qlbchina.com/",
"description": "关于规范个人贷款资金使用及警惕冒用银行名义营销的风险提示 — 2024年11月26日 关于银行卡系统维护的公告 — 2024年11月25日 齐鲁银行 关于金融IC借记卡有效期到期服务的客户公告 — 2024年11月22日 关于发售2025年第1期齐鲁银行济南市外机构个人大额存单(3年期 )的公告 ...",
"author": "百度快照",
"pubDate": "2024-10-22"
},
{
"title": "齐鲁银行在您身旁总行",
"link": "https://www.qlbchina.com/qlbchina/jrql/xwgg/cggg/zx/index.html",
"description": "齐鲁银行 银企大集系统优化升级项目(二次)竞争性磋商公告 [2025-01-06] 齐鲁银行信用卡多渠道进件及信用卡审批系统人力外包项目(二次)竞争性磋商公告 [2025-01-06] 齐鲁银行村镇智能柜台系统改造项目竞争性磋商公告 [2025-01-03] 齐鲁银行商用密码安全评估服务项目 ...",
"author": "百度快照",
"pubDate": "2025-01-06"
},
{
"title": "齐鲁银行(601665)_股票行情,行情首页_中财网",
"link": "https://gg.cfi.cn/quote.aspx?stockid=92680&contenttype=outline&client=pc",
"description": "中财网提供 齐鲁银行 (601665)实时行情动态分析,全面报道齐鲁银行(601665)基本资料及重大新闻、行业资讯,浏览齐鲁银行(601665)财务数据、行情数据,公司公告,重大事件。",
"author": "百度快照",
"pubDate": "2024-12-31"
},
{
"title": "齐鲁银行股份有限公司德州分行 - 天眼查",
"link": "https://www.tianyancha.com/company/2354701752",
"description": "简介: 齐鲁银行 股份有限公司德州分行,成立于2014年,位于山东省德州市,是一家以从事货币金融服务为主的企业。通过天眼查大数据分析,齐鲁银行股份有限公司德州分行参与招投标项目9次;此外企业还拥有行政许可8个。风险方面共发现企业有 展开 财产线索 线索47预估价值1亿元 ...",
"author": "百度快照",
"pubDate": "2024-12-09"
},
{
"title": "齐鲁银行聊城分行 - 百度百科",
"link": "https://baike.baidu.com/item/%E9%BD%90%E9%B2%81%E9%93%B6%E8%A1%8C%E8%81%8A%E5%9F%8E%E5%88%86%E8%A1%8C/6555695",
"description": "作为 齐鲁银行 第一家异地分行聊城分行自2008年3月19日成立以来在聊城市委、市政府的领导下在各级各部门的大力支持和帮助下始终坚持“服务地方经济服务中小企业服务市民百姓”的市场定位以创建“中小企业首选银行”为目标将营销和服务的重点放在了中小企业和居民个人业务上优质高效地开展金融服务有力...",
"author": "百度快照",
"pubDate": "2024-07-22"
},
{
"title": "齐鲁银行信用卡申请进度入口查询 - 首页",
"link": "https://ebank.qlbchina.com/pbank/",
"description": "正在加载请稍候……",
"author": "百度快照",
"pubDate": "2025-01-08"
},
{
"title": "14项违规!齐鲁银行收1495万罚单,副行长陶文喆连带被罚 - 知乎",
"link": "https://zhuanlan.zhihu.com/p/677564348",
"description": "最近,国家金融监管总局山东监管局披露相关罚单,显示 齐鲁银行 因存在14项主要违法违规事实,被没收违法所得并罚款合计1495.126802万元。其中,分支机构罚没120万,总行罚没1375.126802万元,罚单开出时间为2023年12月28日。 具体而言,齐鲁银行此次罚单涉及的违法违规事实包括小微企业划型不到位;违规向小微企业收取费用;个贷、房地...",
"author": "百度快照",
"pubDate": "2024-01-12"
},
{
"title": "齐鲁银行是国企还是私企?",
"link": "http://baijiahao.baidu.com/s?id=1716751640979713811&wfr=spider&for=pc",
"description": "齐鲁银行 的性质属于私企它在1996年6月份正式成立齐鲁银行有众多股东这其中包括国有公司中资法人的公司个人企业以及外资公司等共同组建是一家股份制的商业银行。它也是全国首批设立的城市商业银行总部就位于山东的省会济南该公司最大的股东就是澳洲联邦银行。齐鲁银行作为一家地方性银行其涵盖领域众多...",
"author": "百度快照",
"pubDate": "2021-11-18"
},
{
"title": "齐鲁银行违反《反洗钱法》规定 被罚款30万元 - 每日经济新闻",
"link": "http://baijiahao.baidu.com/s?id=1651509754800941149&wfr=spider&for=pc",
"description": "齐鲁银行 的性质属于私企它在1996年6月份正式成立齐鲁银行有众多股东这其中包括国有公司中资法人的公司个人企业以及外资公司等共同组建是一家股份制的商业银行。它也是全国首批设立的城市商业银行总部就位于山东的省会济南该公司最大的股东就是澳洲联邦银行。齐鲁银行作为一家地方性银行其涵盖领域众多...",
"author": "百度快照",
"pubDate": "No timestamp found"
},
{
"title": "齐鲁银行5.40(-1.46%)_股票行情_新浪财经_新浪网",
"link": "http://finance.sina.com.cn/realstock/company/sh601665/nc.shtml",
"description": "新浪财经为您提供 齐鲁银行 (601665)股票实时行情走势,实时资金流向,实时新闻资讯,研究报告,股吧互动,交易信息,个股点评,公告,财务指标分析等与齐鲁银行(601665)股票相关的信息与服务.",
"author": "百度快照",
"pubDate": "2025-01-08"
},
{
"title": "齐鲁银行",
"link": "http://gjxy.sdau.edu.cn/2017/1226/c3557a119546/page.htm",
"description": "2008年11月30日,该行天津分行开业,由此成为山东省首家在省外异地设立分行的城市商业银行。 2010年8月27日,青岛分行成立。 截至2009年12月31日, 齐鲁银行 辖有72家分、支行(部),在岗员工1800余人。全行总资产617.35亿元,是成立之初的19倍;各项存款余额546.55亿元,是成立时的20倍;各项贷款余额353.1亿元,是成立时的20...",
"author": "百度快照",
"pubDate": "2017-12-26"
},
{
"title": "齐鲁银行(601665)股本结构_新浪财经_新浪网",
"link": "http://vip.stock.finance.sina.com.cn/corp/go.php/vCI_StockStructure/stockid/601665.phtml",
"description": "齐鲁银行 5.59 -0.06-1.06% 2024-12-31 15:00:01 昨收盘:5.65今开盘:5.65最高价:5.70最低价:5.59 市值:270.28亿元 流通:270.28成交:347797手 换手:0.72% 公司资料意见反馈 公司资料: 公司简介 股本结构 主要股东 流通股股东 基金持股 公司高管 公司章程 ...",
"author": "百度快照",
"pubDate": "2024-12-31"
},
{
"title": "齐鲁银行(QILU BANK)",
"link": "https://bank.cngold.org/index_51.html",
"description": "简要名称: 齐鲁银行 法人代表:邱云章成立日期:1996-06-06 银行性质:城市商业银行银行行长:郭涛注册资金: 客服热线:40060-96588公司总部:济南市顺河街176号 银行简介:济南市商业银行是山东省成立的首家地方性股份制商业银行。1996年6月6日,在济南市16家城市信用社和1家城信社联社的基础上组建了济南城市合作银行;1998年...",
"author": "百度快照",
"pubDate": "2022-11-09"
},
{
"title": "齐鲁银行- 搜狗百科",
"link": "https://baike.sogou.com/v7655626.htm",
"description": "齐鲁银行 (Qilu Bank)是一家由国有股份、中资法人股份、外资股份和众多个人股份等共同组成独立法人资格的股份制商业银行,实行一级法人体制,成立于1996年6月,总部位于山东省济南市。其原名济南城市合作银行,于1998年6月6日更名为济南市商业银行,于2009年6月更名为齐鲁",
"author": "百度快照",
"pubDate": "2024-07-10"
},
{
"title": "齐鲁银行(601665)_股票价格_行情_走势图—东方财富网",
"link": "http://quote.eastmoney.com/unify/r/1.601665?from=classic&eventcode=Web_quote_entrance1",
"description": "提供 齐鲁银行 (601665)股票的行情走势、五档盘口、逐笔交易等实时行情数据,及齐鲁银行(601665)的新闻资讯、公司公告、研究报告、行业研报、F10资料、行业资讯、资金流分析、阶段涨幅、所属板块、财务指标、机构观点、行业排名、估值水平、股吧互动等与齐鲁银行(601665)有关",
"author": "百度快照",
"pubDate": "2025-01-03"
},
{
"title": "齐鲁银行",
"link": "https://yqhome.qlbchina.com/",
"description": "服务热线:40060-96588 账号登录 UKey登录 立即登录 立即注册忘记密码保函查验",
"author": "百度快照",
"pubDate": "2025-01-08"
},
{
"title": "齐鲁银行(601665.SH)公司高管-PC_HSF10资料",
"link": "http://f10.eastmoney.com/f10_v2/CompanyManagement.aspx?code=sh601665",
"description": "信贷处办事员、办公室科长,中国农业银行泰安市分行党委委员、副行长,中国农业银行山东省分行办公室副主任、主任,中国农业银行山东省分行党委委员、行长助理,中国农业银行山东省分行党委委员、行长助理兼东营市分行党委书记、行长,中国农业银行山东省分行党委委员、副行长,中国农业银行天津市分行党委书记、行长, 齐鲁银行 党委...",
"author": "百度快照",
"pubDate": "2024-12-06"
},
{
"title": "齐鲁银行山东省网点地址电话查询_齐鲁银行网点-金投网(手机金投网...",
"link": "http://bank.cngold.org/yhwd/list_city_51_16.html",
"description": "齐鲁银行 客服热线:40060-96588 简要名称:齐鲁银行 法定名称:齐鲁银行 银行性质: 城市商业银行 公司总部:济南市顺河街176号山东省-齐鲁银行网点查询 济南(共有105个齐鲁银行网点) 青岛(共有2个齐鲁银行网点) 聊城(共有7个齐鲁银行网点) 热门城市-齐鲁银行网点查询 北京 杭州 天津 重庆 苏州 南京 广州 厦门...",
"author": "百度快照",
"pubDate": "2025-01-07"
},
{
"title": "齐鲁银行天津分行 - 百度百科",
"link": "https://baike.baidu.com/item/%E9%BD%90%E9%B2%81%E9%93%B6%E8%A1%8C%E5%A4%A9%E6%B4%A5%E5%88%86%E8%A1%8C/9614852",
"description": "天津分行是 齐鲁银行 成立的首家省外异地分行是总行新三年发展规划战略实施的重要一步。在地方党委、政府的关怀下在监管部门的监管指导下在社会各界的关心支持下分行于2008年11月30日正式对外营业。分行领导 总行副行长,天津分行党委书记:柴传早,天津分行行长:张宝银,天津分行副行长:张磊、胡立军,天津分行...",
"author": "百度快照",
"pubDate": "2024-07-01"
},
{
"title": "齐鲁银行在您身旁齐鲁银行信用卡多渠道进件及信用卡审批系统人力...",
"link": "https://www.qlbchina.com/qlbchina/2025-01/06/article_2025010613411012428.html",
"description": "齐鲁银行 信用卡多渠道进件及信用卡审批系统人力外包项目(二次)竞争性磋商公告 齐鲁银行信用卡多渠道进件及信用卡审批系统人力外包项目(二次)竞争性磋商公告.docx",
"author": "百度快照",
"pubDate": "2024-12-27"
}
]
}

File diff suppressed because it is too large Load Diff

View File

@ -1,162 +1,161 @@
[ [
{ {
"title": "人工智能聊天机器人DeepSeek R1可被操纵用于创建恶意软件", "title": "【全球首发】【6w$赏金】微软身份漏洞-未授权强制解绑任意微软账户邮箱",
"link": "https://www.freebuf.com/articles/network/424572.html", "link": "https://www.freebuf.com/vuls/419097.html",
"description": "DeepSeek R1可被操纵生成恶意软件降低网络犯罪门槛尽管仍需手动修正但加速了恶意软件开发。", "description": "网络安全并不是我的最终梦想职业,只是梦想职业的其中一个技能点。",
"body": "<p>网络安全公司Tenable Research的最新分析揭示开源人工智能聊天机器人<strong>DeepSeek R1</strong>能够被操纵用于生成恶意软件包括键盘记录器和勒索软件。Tenable的研究团队评估了DeepSeek生成有害代码的能力重点测试了两种常见的恶意软件类型键盘记录器和勒索软件。</p><p>尽管DeepSeek无法直接“开箱即用”生成完全可用的恶意软件并", "body": "<h2 id=\"h2-1\">致谢</h2><p>我是Feng Jiaming公开别名 Sugobet/M1n9K1n9来自中国广东工贸职业技术学院的在校学生。</p><p>I'm Feng Jiaming, my public alias Sugobet/M1n9K1n9, a student from Guangdong Polytechnic of Industry and Commerc",
"category": "网络安全",
"pubDate": "Fri, 14 Mar 2025 00:51:27 +0800"
},
{
"title": "朝鲜威胁组织ScarCruft利用KoSpy恶意软件监控安卓用户",
"link": "https://www.freebuf.com/articles/es/424540.html",
"description": "朝鲜黑客组织ScarCruft通过伪装应用投放KoSpy恶意软件监控安卓用户攻击针对韩语和英语用户。",
"body": "<p><img src=\"https://image.3001.net/images/20250313/1741878280398181_a226a43ddb394530a82c72add0dcff49.png!small\" alt=\"image\" /></p><p>据报道与朝鲜有关的威胁组织ScarCruft开发了一种名为 <strong>KoSpy</strong>的安卓监控工具,专门针对韩",
"category": "企业安全",
"pubDate": "Thu, 13 Mar 2025 19:53:00 +0800"
},
{
"title": "大模型越狱(通常)比你想象的容易——一种基于伪造对话历史的攻击算法",
"link": "https://www.freebuf.com/vuls/424360.html",
"description": "一种基于伪造会话历史的大模型对抗算法",
"body": "<h1>1.摘要</h1><p>微软的研究团队提出了一种名为“上下文一致性攻击”Context Compliance Attack以下简称CCA算法的大模型越狱攻击算法这种攻击算法相对轻巧既不需要复杂的提示词工程也不要消耗大量算力来迭代优化恶意提示词。</p><p>CCA算法利用了目前大模型架构中一个漏洞——会话历史的无状态性。即用户可以伪造会话历史输入给大模型而大模型在无法分辨该对",
"category": "漏洞", "category": "漏洞",
"pubDate": "Thu, 13 Mar 2025 16:37:29 +0800" "pubDate": "Sun, 05 Jan 2025 13:35:19 +0800"
}, },
{ {
"title": "CISA警告苹果WebKit越界写入漏洞已被野外利用", "title": "都在给网安泼冷水,我来给网安泼盆开水",
"link": "https://www.freebuf.com/vuls/424562.html", "link": "https://www.freebuf.com/articles/neopoints/419094.html",
"description": "苹果WebKit越界写入漏洞CVE-2025-24201已被野外利用攻击者可执行未经授权的代码。", "description": "契机今天看到一篇文章契机今天看到一篇文章让我有了估算大黑阔赚钱能力的灵感。给网安行业泼盆开水!",
"body": "<p><img src=\"https://image.3001.net/images/20250314/1741889032347357_5c64ed0a88814dc4bc5fd233083566e8.webp!small\" alt=\"image\" /></p><p>美国网络安全和基础设施安全局CISA近日警告称苹果WebKit浏览器引擎中存在一个被野外利用的零日漏洞编号为CVE-202", "body": "<h2 id=\"h2-1\"><strong>契机</strong></h2><p style=\"text-align:center;\">今天看到一篇文章让我有了估算大黑阔赚钱能力的灵感。给网安行业泼盆开水!<br /><img src=\"https://image.3001.net/images/20250105/1736053407_677a129f75ed5e9a02268.png!small",
"category": "漏洞",
"pubDate": "Thu, 13 Mar 2025 16:21:31 +0800"
},
{
"title": "微信小程序测试技巧总结",
"link": "https://www.freebuf.com/articles/web/424498.html",
"description": "测试微信小程序跟web网站基本相同抓包测试接口逆向看小程序源码。",
"body": "<h2 id=\"h2-1\">前言</h2><p>目前越来越多的企业都开始开发微信小程序如果在web测试过程中没有结果不如换个思路去看看微信小程序是否有问题。</p><p>测试微信小程序跟web网站基本相同抓包测试接口逆向看小程序源码。本篇文章就来看看如何进行微信小程序抓包以及逆向。</p><p><br /></p><h2 id=\"h2-2\">微信小程序抓包</h2><p>要测试微信小程序",
"category": "Web安全",
"pubDate": "Thu, 13 Mar 2025 16:16:54 +0800"
},
{
"title": "全美29州逾8.6万名医护人员信息因AWS S3存储桶配置错误遭泄露",
"link": "https://www.freebuf.com/articles/database/424561.html",
"description": "全美29州逾8.6万名医护人员信息因AWS S3存储桶配置错误遭泄露包含敏感PII和医疗文件。",
"body": "<p><img src=\"https://image.3001.net/images/20250314/1741889027627786_9dbc9c95718140af8ac0145800762e1c.webp!small\" alt=\"image\" /></p><p>近日一起涉及医护人员敏感信息的大规模数据泄露事件被发现总部位于新泽西州的健康科技公司ESHYFT的超过8.6万条记录被暴露。<",
"category": "数据安全",
"pubDate": "Thu, 13 Mar 2025 16:09:35 +0800"
},
{
"title": "黑客滥用微软Copilot发动高仿钓鱼攻击",
"link": "https://www.freebuf.com/news/424552.html",
"description": "黑客利用微软Copilot发起高仿钓鱼攻击通过伪造发票邮件和虚假登录页面窃取用户凭据威胁企业安全。",
"body": "<p><img src=\"https://image.3001.net/images/20250314/1741885485840984_47bf608e967345259deb66fcf48bec25.webp!small\" alt=\"image\" /></p><p>随着越来越多企业将微软Copilot集成到其日常工作中网络犯罪分子瞄准了这一AI助手的用户发起了高度复杂的钓鱼攻击。微软Cop",
"category": "资讯",
"pubDate": "Thu, 13 Mar 2025 16:07:50 +0800"
},
{
"title": "FreeBuf早报 | 特朗普提名Sean Plankey掌权CISA勒索病毒袭美逾300关键机构",
"link": "https://www.freebuf.com/news/424478.html",
"description": "特朗普提名Sean Plankey掌权CISA勒索病毒袭美逾300关键机构",
"body": "<h2 id=\"h2-1\">全球网安事件速递</h2><h3 id=\"h3-1\">1. Win10 / Win11 装机镜像不再“裸奔”,微软发布 Defender 更新填补安全漏洞</h3><p>微软针对 Windows 10、Windows 11 和 Windows Server 安装镜像,发布了新版 Defender 更新,解决安装镜像中可能存在的旧版反恶意软件问题,提升系统安全性和性能。 ",
"category": "资讯",
"pubDate": "Thu, 13 Mar 2025 14:10:05 +0800"
},
{
"title": "新手友好spring内存马学习篇二",
"link": "https://www.freebuf.com/articles/web/424441.html",
"description": "这是spring内存马第二篇主要学习实战中如何打内存马",
"body": "<h2 id=\"h2-1\">反序列化注入内存马</h2><h3 id=\"h3-1\">Fastjson靶场搭建</h3><p>我们在前面的springboot项目上引入fastjson模拟一下漏洞环境</p><p><img src=\"https://image.3001.net/images/20250306/1741255427_67c97303619323cef3b85.png!small\" ",
"category": "Web安全",
"pubDate": "Thu, 13 Mar 2025 09:17:22 +0800"
},
{
"title": "D-link: 轻量级正反向文件同步后渗透持久化控制",
"link": "https://www.freebuf.com/sectool/424419.html",
"description": "#后渗透 #文件同步 #轻量 #持久化 #正/反向隧道 #C++ #D-Link",
"body": "<h1>D-link</h1><p>D-link 是一款用 C++ 编写的轻量级 Linux 文件同步工具。</p><ol><li><p>支持反向文件同步操作。</p></li><li><p>目录监控,实时更新。</p></li><li><p>访问控制:客户端只能自动上传和删除文件,无法从服务器下载敏感文件。就算同步的文件在服务器端被删掉,客户端还是会自动恢复。</p></li><li><p>客户",
"category": "工具",
"pubDate": "Thu, 13 Mar 2025 00:45:10 +0800"
},
{
"title": "多视角解码大模型安全:以 AI 制衡 AI突破安全困局",
"link": "https://www.freebuf.com/fevents/424379.html",
"description": "“模型有界、安全无疆”主题技术研讨会在西安圆满落幕。",
"body": "<p>在人工智能快速发展的今天,大模型已经成为了推动各行业变革的核心技术之一,从医疗诊断到智能交通,从金融风险控制到教育个性化推荐,各行各业中都出现了大模型的身影。</p><p>根据Gartner的预测2026年将有超过80%的企业部署启用生成式人工智能GenAI的应用而2023年这一比例尚不足5%,可以说大模型正以前所未有的速度重塑着我们的世界。</p><p>技术突飞猛进的同时,也伴生着",
"category": "活动",
"pubDate": "Wed, 12 Mar 2025 17:31:35 +0800"
},
{
"title": "超400个IP地址协同攻击利用多个SSRF漏洞发起网络攻势",
"link": "https://www.freebuf.com/vuls/424412.html",
"description": "至少400个IP地址被发现同时利用多个SSRF漏洞攻击尝试之间表现出显著的重叠。",
"body": "\n<p><img src=\"https://image.3001.net/images/20250312/1741788137072942_62d5d71c105a40c7a1be5eeb33fbab11.png!small\" alt=\"image\"></p>\n<p>威胁情报公司GreyNoise发出警告称近期针对多个平台的服务器端请求伪造SSRF漏洞利用活动出现了“协同激增”现象。</p>",
"category": "漏洞",
"pubDate": "Wed, 12 Mar 2025 17:26:00 +0800"
},
{
"title": "AI会取代渗透测试工程师吗",
"link": "https://www.freebuf.com/articles/neopoints/424414.html",
"description": "关于哪些职业会受到AI冲击的讨论从未停止而渗透测试Pentesting最近也被推到了风口浪尖。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741788229145520_ea88f496d23c41d9b5a2c92b14a8910e.png!small\" alt=\"image\" /></p><p>多年来我们一直在听到同样的说法AI将会取代你的工作。事实上2017年麦肯锡发布了一份报告《消失与新增的岗位自动化时代下的劳动",
"category": "观点", "category": "观点",
"pubDate": "Wed, 12 Mar 2025 15:55:00 +0800" "pubDate": "Sun, 05 Jan 2025 13:14:47 +0800"
}, },
{ {
"title": "FreeBuf早报 | 微软与VMware零日漏洞紧急修复指南TP-Link漏洞感染超6000台设备", "title": "盘点万亿市值的Palantir在2024年拿下的至少87亿的美军合同都是啥",
"link": "https://www.freebuf.com/news/424346.html", "link": "https://www.freebuf.com/articles/neopoints/419073.html",
"description": "微软与VMware零日漏洞紧急修复指南TP-Link漏洞感染超6000台设备", "description": "仅2024年一年该公司与美国军方的合同额就高达12亿美元约合人民币87.8亿元)。",
"body": "<h2 id=\"h2-1\">全球网安事件速递</h2><h3 id=\"h3-1\">1. Manus代码遭越狱季逸超本人回应“团队一直有开源传统”</h3><p>北京时间3月10日清晨推特用户jianxliao发布推文称成功“越狱”了Manus AI的代码据其透露他只是简单地要求Manus提供\"/opt/.manus/\"目录下的文件系统便直接提供了沙盒运行时代码并揭示了Manus使用C", "body": "<p style=\"text-align:center;\">近日美国科技公司Palantir宣布美国陆军已授予Palantir一份价值4.007亿美元约合人民币29亿元的合同。近年来Palantir持续获得美国军方的青睐公开信息显示仅2024年一年该公司与美国军方的合同额就高达12亿美元约合人民币87.8亿元。目前Palantir的大部分收入都来自于美国政府和军事部门。<br",
"category": "观点",
"pubDate": "Sat, 04 Jan 2025 14:01:04 +0800"
},
{
"title": "一周网安优质PDF资源推荐丨FreeBuf知识大陆",
"link": "https://www.freebuf.com/articles/419042.html",
"description": "我们精选了本周知识大陆公开发布的10条优质资源让我们一起看看吧。",
"body": "<p>各位读者周末好以下是本周「FreeBuf知识大陆一周优质资源推荐」我们精选了本周知识大陆公开发布的10条优质资源让我们一起看看吧。</p><p><img src=\"https://image.3001.net/images/20250103/1735891639_67779ab73e8d0be0fdbae.png!small\" alt=\"\" /></p><h2 id=\"h2-1\">笔记",
"pubDate": "Fri, 03 Jan 2025 16:22:28 +0800"
},
{
"title": "FreeBuf周报 | 超过300万台未加密的邮件服务器暴露WPA3协议存在安全漏洞",
"link": "https://www.freebuf.com/news/419036.html",
"description": "总结推荐本周的热点资讯、安全事件、一周好文和省心工具,保证大家不错过本周的每一个重点!",
"body": "<p>各位 Buffer 周末好以下是本周「FreeBuf周报」我们总结推荐了本周的热点资讯、安全事件、一周好文和省心工具保证大家不错过本周的每一个重点<img style=\"border-width:0px;line-height:inherit;max-width:635px;height:auto;\" src=\"https://image.3001.net/images/202209",
"category": "资讯", "category": "资讯",
"pubDate": "Wed, 12 Mar 2025 14:30:42 +0800" "pubDate": "Fri, 03 Jan 2025 15:56:46 +0800"
}, },
{ {
"title": "API攻击威胁加剧2025年如何确保API安全", "title": "Agneyastra一款Firebase 错误配置检测工具包",
"link": "https://www.freebuf.com/articles/web/424399.html", "link": "https://www.freebuf.com/sectool/419006.html",
"description": "API攻击威胁加剧59%的组织开放API“写入”权限黑客可未经授权访问导致数据窃取、账户接管等重大风险。", "description": "Agneyastra是一款功能强大的错误配置检测工具可以帮助广大研究人员更好地保障Firebase平台的安全。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741780939666956_d18f4fcfe4ab4b048c66f1169504989e.png!small\" alt=\"image\" /></p><p>API攻击正持续增加<strong>一项令人担忧的研究</strong>显示59%的组织为至少一半的API开放了“写入”权限这", "body": "<h2 id=\"h2-1\">关于Agneyastra</h2><p>Agneyastra是一款功能强大的错误配置检测工具该工具主要针对的是Firebase平台可以帮助广大研究人员更好地保障Firebase平台的安全。</p><p><img src=\"https://image.3001.net/images/20250103/1735881390_677772aecfdd43a52c23b.p",
"category": "Web安全", "category": "工具",
"pubDate": "Wed, 12 Mar 2025 11:29:24 +0800" "pubDate": "Fri, 03 Jan 2025 13:21:19 +0800"
}, },
{ {
"title": "攻击者开始利用MFA漏洞在内的高级手段绕过多因素身份验证", "title": "Exposor一款基于互联网搜索引擎实现的统一语法网络侦查工具",
"link": "https://www.freebuf.com/articles/web/424386.html", "link": "https://www.freebuf.com/sectool/419004.html",
"description": "这些高级技术利用了身份验证工作流程中的漏洞,而非身份验证因素本身。", "description": "Exposor是一款功能强大的网络侦查工具支持广大研究人员使用统一语法来检测网络中的安全威胁。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741773779537870_8402efd7d8fa46fa8d2f0067903712ee.webp!small\" alt=\"image\" /></p><p>研究人员最近发现了一种令人不安的攻击趋势这些攻击专门设计来绕过多因素身份验证MFA的保护机制。这些高级技术利用了身份验证工作", "body": "<h2 id=\"h2-1\">关于Exposor</h2><p>Exposor是一款功能强大的网络侦查工具该工具基于互联网搜索引擎实现其功能支持广大研究人员使用统一语法来检测网络中的安全威胁。</p><p><img src=\"https://image.3001.net/images/20250103/1735880146_67776dd204e38df0c1826.png!small\" wid",
"category": "Web安全", "category": "工具",
"pubDate": "Wed, 12 Mar 2025 09:53:49 +0800" "pubDate": "Fri, 03 Jan 2025 12:58:29 +0800"
}, },
{ {
"title": "Hessian反序列化原理到武器化利用", "title": "日本最大的移动运营商因DDoS攻击导致服务中断",
"link": "https://www.freebuf.com/articles/web/424308.html", "link": "https://www.freebuf.com/news/418992.html",
"description": "今天和大家共同探讨Java安全领域中一种常见的安全威胁也就是Hessian反序列化漏洞。", "description": "NTT Docomo当地时间1月2日表示一次DDoS网络攻击导致运营中断网站和一些服务在宕机大半天后才逐渐恢复。",
"body": "<p>今天和大家共同探讨Java安全领域中一种常见的安全威胁也就是Hessian反序列化漏洞。作为贯穿Java生态的RPC通信基石Hessian协议如同微服务架构的\"神经网络\"其安全风险直接影响多个Java核心组件的命脉如近几年披露的一些Hessian协议相关的安全组件漏洞Seata Hessian 反序列化漏洞、Nacos 集群 Hessian 反序列化漏洞、xxl-job Hessi", "body": "<p>日本最大的移动运营商 NTT Docomo Inc. 当地时间1月2日表示一次分布式拒绝服务 DDoS 网络攻击导致运营中断,网站和一些服务在宕机大半天后才逐渐恢复。</p><p><img src=\"https://image.3001.net/images/20250103/1735874913_677759613048fcfd644c0.png!small\" width=\"690\"",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 09:42:19 +0800"
},
{
"title": "新型XCSSET恶意软件利用增强混淆技术攻击macOS用户",
"link": "https://www.freebuf.com/articles/web/424375.html",
"description": "新型XCSSET恶意软件利用增强混淆技术攻击macOS用户感染Xcode项目窃取敏感信息采用复杂持久化机制威胁开发者安全。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741770276931049_1ffd07215f97425f8ba4f5216c276ae5.webp!small\" alt=\"image\" /></p><p>微软威胁情报团队发现了一种新型的XCSSET变种这是一种复杂的模块化macOS恶意软件能够感染Xcode项目并在开发者构建这",
"category": "Web安全",
"pubDate": "Wed, 12 Mar 2025 07:44:44 +0800"
},
{
"title": "AI 辅助的虚假 GitHub 仓库窃取敏感数据,包括登录凭证",
"link": "https://www.freebuf.com/articles/database/424374.html",
"description": "AI 辅助的虚假 GitHub 仓库窃取敏感数据,伪装合法项目分发 Lumma Stealer 恶意软件。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741770262754508_969bbeb5d15b4a8795a84388a5078ab3.webp!small\" alt=\"image\" /></p><p>近期发现了一种复杂的恶意软件活动,该活动利用人工智能创建具有欺骗性的 GitHub 仓库,并分发 SmartLoader 负载,最",
"category": "数据安全",
"pubDate": "Wed, 12 Mar 2025 07:40:26 +0800"
},
{
"title": "谷歌紧急警告Chromecast用户切勿进行出厂重置",
"link": "https://www.freebuf.com/news/424361.html",
"description": "谷歌紧急警告别对Chromecast进行出厂重置。过期证书导致2000万台设备无法正常运行用户陷入“变砖”困境。",
"body": "<p><img src=\"https://image.3001.net/images/20250312/1741766697560974_acdc23f708a34b058255dc1d9a0b0fcd.webp!small\" alt=\"image\" /></p><p>谷歌已向第二代Chromecast2015年和Chromecast Audio设备的所有者发出紧急通知警告不要进行出厂重置",
"category": "资讯", "category": "资讯",
"pubDate": "Wed, 12 Mar 2025 07:10:20 +0800" "pubDate": "Fri, 03 Jan 2025 11:26:47 +0800"
},
{
"title": "用户集体起诉Siri“偷听”",
"link": "https://www.freebuf.com/news/418989.html",
"description": "苹果公司同意支付9500万美元现金以和解一项拟议的集体诉讼该诉讼声称其Siri语音助手侵犯了用户的隐私。",
"body": "<p>1月3日消息科技巨头苹果公司同意支付9500万美元现金以和解一项拟议的集体诉讼该诉讼声称其Siri语音助手侵犯了用户的隐私。这份和解协议涵盖了2014年9月17日至2024年12月31日期间使用Siri的美国用户涉及数千万人。</p><p>每位参与诉讼的用户最多可为5台Siri设备申请赔偿每台设备最高可获得20美元。此外苹果公司需在六个月内永久删除2019年10月前收集的Siri",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 11:17:16 +0800"
},
{
"title": "黑客滥用AWS泄露的信息进行云狩猎",
"link": "https://www.freebuf.com/news/418985.html",
"description": "名为“EC2 Grouper”的黑客组织近年来一直在利用AWS工具以及泄露的凭证对云环境展开狩猎型攻击。",
"body": "<p>名为“EC2 Grouper”的黑客组织近年来一直在利用AWS工具以及泄露的凭证对云环境展开狩猎型攻击。在过去的数年里这个相当活跃的威胁行为主体在数十个客户环境中被发现这使其成为网络安全专家追踪的最活跃的组织之一。</p><p><img src=\"https://image.3001.net/images/20250103/1735874034_677755f204ca51a03dc1",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 11:10:50 +0800"
},
{
"title": "超过300万台未加密的邮件服务器暴露",
"link": "https://www.freebuf.com/news/418975.html",
"description": "超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上容易受到网络嗅探攻击。",
"body": "<p>目前超过300万台未启用TLS加密的POP3和IMAP邮件服务器暴露在互联网上容易受到网络嗅探攻击。</p><p>IMAP和POP3是访问邮件服务器上邮件的两种方式。IMAP适用于从多个设备如手机和笔记本电脑查看邮件因为它会将邮件保留在服务器上并在设备间同步。而POP3则会将邮件从服务器下载使其仅能从下载的设备访问。</p><p><img src=\"https://image.3",
"category": "资讯",
"pubDate": "Fri, 03 Jan 2025 10:22:53 +0800"
},
{
"title": "CertiK Hack3D Web3.0 年度安全报告2024",
"link": "https://www.freebuf.com/articles/paper/418966.html",
"description": "2024年Web3.0领域因安全事件导致的总损失超过23.63亿美元同比增幅达31.61%。全年共发生760起安全事件其中网络钓鱼和私钥泄露是两大主要攻击手段。",
"body": "<p><img src=\"https://image.3001.net/images/20250102/1735830965_6776adb5bccea4626f7a7.jpg!small\" alt=\"2024Web3.0 安全年度报告 (1).jpg\" /></p><h1><strong>摘要</strong></h1><ul><li><p>2024年Web3.0行业共发生760起链上安全事件",
"category": "安全报告",
"pubDate": "Thu, 02 Jan 2025 23:16:05 +0800"
},
{
"title": "shiro-core 框架分析",
"link": "https://www.freebuf.com/articles/web/413356.html",
"description": "shiro-core 框架分析",
"body": "<h1>shiro-core</h1><p>本篇文章只阐述最核心内容从整体描述shiro-core目的是能在研究shiro的漏洞时有一个全局观因此不可能涉及全部细节。</p><ul><li><p><a href=\"https://shiro.apache.org/introduction.html\">Introduction to Apache Shiro | Apache Shiro</a",
"category": "Web安全",
"pubDate": "Thu, 02 Jan 2025 20:40:16 +0800"
},
{
"title": "FreeBuf早报 | 作者辟谣7-Zip存零日漏洞法国多地网站遭遇黑客攻击",
"link": "https://www.freebuf.com/news/418936.html",
"description": "12月31日法国多个城镇和省份的网站无法访问。此前一个黑客团体声称发动网络攻击以报复法国支持乌克兰。",
"body": "<h2 id=\"h2-1\">全球动态</h2><h3 id=\"h3-1\">1. 美财政部称遭到“中国政府支持的黑客”攻击,中方回应</h3><p>中方一贯反对各种形式的黑客攻击,更反对出于政治目的散布针对中国的虚假信息。 【<a href=\"http://usa.people.com.cn/n1/2025/0102/c241376-40394097.html\"><u>阅读原文</u></a>】</",
"category": "资讯",
"pubDate": "Thu, 02 Jan 2025 15:45:09 +0800"
},
{
"title": "分享OAuth2.0原理及漏洞挖掘技巧案例分析",
"link": "https://www.freebuf.com/vuls/418923.html",
"description": "这篇文章主要是从一个简单的案例来开头然后后面讲OAuth2.0原理以及相关的一些相关知识。",
"body": "<h2 id=\"h2-1\">0x1 前言</h2><h3 id=\"h3-1\">一、浅谈</h3><p>不知道师傅们平常有没有碰到就是在登录比如说百度时,登录页面有需要使用一段第三方社交媒体的账户(QQ、微博、微信)登录的情况而这种大多数都是使用OAuth 2.0框架构建的。</p><p>然而再挖掘SRC的过程中在听别的师傅讲课听到关于这方面的只是这次特地来学习OAuth2.0原理及漏洞挖掘技",
"category": "漏洞",
"pubDate": "Thu, 02 Jan 2025 13:40:21 +0800"
},
{
"title": "新的“DoubleClickjacking”漏洞可绕过网站的劫持保护",
"link": "https://www.freebuf.com/news/418913.html",
"description": "该漏洞通过利用双击操作来推动点击劫持攻击及账户接管,几乎波及所有大型网站。",
"body": "<p>安全专家揭示了一种新型的“普遍存在的基于时间的漏洞”该漏洞通过利用双击操作来推动点击劫持攻击及账户接管几乎波及所有大型网站。这一技术已被安全研究员Paulos Yibelo命名为“DoubleClickjacking”。</p><p><img src=\"https://image.3001.net/images/20250102/1735789931_67760d6b5512ab30e8",
"category": "资讯",
"pubDate": "Thu, 02 Jan 2025 11:46:14 +0800"
},
{
"title": "至少35个Chrome扩展被劫持新细节揭示了黑客的攻击手法",
"link": "https://www.freebuf.com/news/418912.html",
"description": "近期黑客针对多个Chrome扩展程序进行了攻击数十万用户受到影响。随着调查的深入一些攻击活动细节也得到了披露。",
"body": "<p>据BleepingComputer消息近期黑客针对多个Chrome扩展程序进行了攻击数十万用户受到影响。随着调查的深入一些攻击活动细节也得到了披露。</p><p>根据最新调查,攻击导致至少 35 个扩展程序被植入数据窃取代码,较之前的初步怀疑数量直接翻倍,其中包括来自网络安全公司 Cyberhaven 的扩展。尽管最初的报道集中在 Cyberhaven 的安全扩展上,但随后的调查显示",
"category": "资讯",
"pubDate": "Thu, 02 Jan 2025 11:41:04 +0800"
},
{
"title": "Windows 曝9.8分漏洞已有PoC及利用情况",
"link": "https://www.freebuf.com/news/418909.html",
"description": "CVE - 2024 - 49112属于远程代码执行RCE漏洞会对包括域控制器DC在内的Windows服务器产生影响。",
"body": "<p>SafeBreach Labs的研究人员发布了关于Windows轻量级目录访问协议LDAP的一个关键漏洞的概念验证PoC和漏洞利用方法该漏洞编号为CVE - 2024 - 49112。微软在2024年12月10日的补丁星期二更新中披露了此漏洞其CVSS严重性评分高达9.8。</p><p>CVE - 2024 - 49112属于远程代码执行RCE漏洞会对包括域控制器DC在",
"category": "资讯",
"pubDate": "Thu, 02 Jan 2025 11:29:58 +0800"
},
{
"title": "记一次CNVD证书的挖掘方式",
"link": "https://www.freebuf.com/articles/web/418887.html",
"description": "越权漏洞,用户能够修改或访问其他用户(包括管理员)的数据或权限。",
"body": "<h2 id=\"h2-1\">漏洞挖掘背景</h2><p>在Fofa上随便逛逛 突然看到了某某系统 好奇就点了进去</p><h2 id=\"h2-2\">漏洞发现与利用步骤</h2><p><img src=\"https://image.3001.net/images/20250101/1735726269_677514bde6b4ee044cf72.png!small?1735726271056\" al",
"category": "Web安全",
"pubDate": "Wed, 01 Jan 2025 18:33:17 +0800"
},
{
"title": "漏洞分析 | Apache Struts文件上传漏洞CVE-2024-53677",
"link": "https://www.freebuf.com/vuls/418881.html",
"description": "目前该漏洞POC状态已在互联网公开",
"body": "<h2 id=\"h2-1\">漏洞概述</h2><p>Apache Struts是美国阿帕奇Apache基金会的一个开源项目是一套用于创建企业级Java Web应用的开源MVC框架。</p><p>近期网宿安全演武实验室监测到Apache Struts在特定条件下存在文件上传漏洞网宿评分高危、CVSS 3.0 评分8.1</p><p>攻击者可以操纵文件上传参数来实现路径遍历,在某些",
"category": "漏洞",
"pubDate": "Tue, 31 Dec 2024 19:47:46 +0800"
} }
] ]

File diff suppressed because it is too large Load Diff

View File

@ -4,5 +4,65 @@
"published_at": "2021-11-01T08:54:13Z", "published_at": "2021-11-01T08:54:13Z",
"author": "BeichenDream", "author": "BeichenDream",
"keyword": "BeichenDream/Godzilla" "keyword": "BeichenDream/Godzilla"
},
{
"link": "https://github.com/rebeyond/Behinder/releases/tag/Behinder_v4.1%E3%80%90t00ls%E4%B8%93%E7%89%88%E3%80%91",
"published_at": "2023-08-24T11:31:46Z",
"author": "rebeyond",
"keyword": "rebeyond/Behinder"
},
{
"link": "https://github.com/AntSwordProject/antSword/releases/tag/2.1.15",
"published_at": "2022-07-17T05:52:54Z",
"author": "Medicean",
"keyword": "AntSwordProject/antSword"
},
{
"link": "https://github.com/gentilkiwi/mimikatz/releases/tag/2.2.0-20220919",
"published_at": "2022-09-19T15:55:03Z",
"author": "gentilkiwi",
"keyword": "gentilkiwi/mimikatz"
},
{
"link": "https://github.com/ehang-io/nps/releases/tag/v0.26.10",
"published_at": "2021-04-08T06:32:17Z",
"author": "ffdfgdfg",
"keyword": "ehang-io/nps"
},
{
"link": "https://github.com/chaitin/xray/releases/tag/xpoc-0.1.0",
"published_at": "2024-07-19T11:12:29Z",
"author": "Jarcis-cy",
"keyword": "chaitin/xray"
},
{
"link": "https://github.com/FunnyWolf/pystinger/releases/tag/v1.6",
"published_at": "2021-03-30T13:47:07Z",
"author": "FunnyWolf",
"keyword": "FunnyWolf/pystinger"
},
{
"link": "https://github.com/L-codes/Neo-reGeorg/releases/tag/v5.2.0",
"published_at": "2024-01-16T06:39:11Z",
"author": "L-codes",
"keyword": "L-codes/Neo-reGeorg"
},
{
"link": "https://github.com/shadow1ng/fscan/releases/tag/2.0.0-build1",
"published_at": "2024-12-19T15:11:24Z",
"author": "shadow1ng",
"keyword": "shadow1ng/fscan"
},
{
"link": "https://github.com/SafeGroceryStore/MDUT/releases/tag/v2.1.1",
"published_at": "2022-06-22T13:11:44Z",
"author": "Ch1ngg",
"keyword": "SafeGroceryStore/MDUT"
},
{
"link": "https://github.com/wy876/POC/releases/tag/POC20241228",
"published_at": "2024-12-29T09:00:56Z",
"author": "wy876",
"keyword": "wy876/POC"
} }
] ]

View File

@ -7,5 +7,113 @@
"author": "beichen", "author": "beichen",
"link_2": "https://github.com/BeichenDream/Godzilla/commit/a5558e6c37139ebb0b7b4491dc3ea7ce8d8f9e49", "link_2": "https://github.com/BeichenDream/Godzilla/commit/a5558e6c37139ebb0b7b4491dc3ea7ce8d8f9e49",
"keyword": "BeichenDream/Godzilla" "keyword": "BeichenDream/Godzilla"
},
{
"link": "https://api.github.com/rebeyond/Behinder",
"name": "rebeyond/Behinder",
"updated_at": "2023-08-15T14:28:52Z",
"description": "Create SECURITY.md",
"author": "rebeyond",
"link_2": "https://github.com/rebeyond/Behinder/commit/2e2817ae70462a02281c8d96d4cd44c19e5c55b0",
"keyword": "rebeyond/Behinder"
},
{
"link": "https://api.github.com/AntSwordProject/antSword",
"name": "AntSwordProject/antSword",
"updated_at": "2023-07-15T02:53:39Z",
"description": "(Fix: Modules/Database) 修正 PHP4 类型数据管理模块打不开的问题",
"author": "Medicean",
"link_2": "https://github.com/AntSwordProject/antSword/commit/6112ab2c3f6dceda68421cf02ca2dc43a940a01f",
"keyword": "AntSwordProject/antSword"
},
{
"link": "https://api.github.com/yhy0/github-cve-monitor",
"name": "yhy0/github-cve-monitor",
"updated_at": "2023-02-14T07:02:19Z",
"description": "修复黑名单,之前搞成没三分钟清零了,抱歉",
"author": "yhy",
"link_2": "https://github.com/yhy0/github-cve-monitor/commit/570b0645f8f51706d984ff9ba97e0a79d733bf66",
"keyword": "yhy0/github-cve-monitor"
},
{
"link": "https://api.github.com/gentilkiwi/mimikatz",
"name": "gentilkiwi/mimikatz",
"updated_at": "2024-01-05T09:06:47Z",
"description": "Merge pull request #439 from chunhualiu/master\n\n[change] Convert pointer to DWORD_PTR first to eliminate compile warning",
"author": "Benjamin DELPY",
"link_2": "https://github.com/gentilkiwi/mimikatz/commit/0c611b1445b22327fcc7defab2c09b63b4f59804",
"keyword": "gentilkiwi/mimikatz"
},
{
"link": "https://api.github.com/ehang-io/nps",
"name": "ehang-io/nps",
"updated_at": "2021-10-09T07:18:41Z",
"description": "Merge pull request #866 from freeoa/master\n\nadd build to apple silicon(M1)",
"author": "he liu",
"link_2": "https://github.com/ehang-io/nps/commit/ab648d6f0c618c690a7a79948a7ebd686e1cdafc",
"keyword": "ehang-io/nps"
},
{
"link": "https://api.github.com/chaitin/xray",
"name": "chaitin/xray",
"updated_at": "2024-08-16T07:18:55Z",
"description": "[add] 更新客服信息",
"author": "Jarcis-cy",
"link_2": "https://github.com/chaitin/xray/commit/aee9f9cecc3d49a1842a33c38b96af35a7d90168",
"keyword": "chaitin/xray"
},
{
"link": "https://api.github.com/FunnyWolf/pystinger",
"name": "FunnyWolf/pystinger",
"updated_at": "2021-09-29T13:13:36Z",
"description": "Optimize code execution process",
"author": "FunnyWolf",
"link_2": "https://github.com/FunnyWolf/pystinger/commit/8502983a6ae24f99c1ec8a8310f61eda4ed31684",
"keyword": "FunnyWolf/pystinger"
},
{
"link": "https://api.github.com/L-codes/Neo-reGeorg",
"name": "L-codes/Neo-reGeorg",
"updated_at": "2024-09-23T09:12:45Z",
"description": "fix #100",
"author": "L",
"link_2": "https://github.com/L-codes/Neo-reGeorg/commit/9945dce310de26ac7c0c90054584aeef89c58d07",
"keyword": "L-codes/Neo-reGeorg"
},
{
"link": "https://api.github.com/shadow1ng/fscan",
"name": "shadow1ng/fscan",
"updated_at": "2024-12-19T15:09:06Z",
"description": "Update release.yml",
"author": "影舞者",
"link_2": "https://github.com/shadow1ng/fscan/commit/9ee51a96d8a22342feeef6ae2211e500a65c3917",
"keyword": "shadow1ng/fscan"
},
{
"link": "https://api.github.com/SafeGroceryStore/MDUT",
"name": "SafeGroceryStore/MDUT",
"updated_at": "2023-09-22T04:28:28Z",
"description": "Update ShellUtil.java",
"author": "金枪银矛小霸王",
"link_2": "https://github.com/SafeGroceryStore/MDUT/commit/d9af1b1c645cc309787a45ad833d645123855f91",
"keyword": "SafeGroceryStore/MDUT"
},
{
"link": "https://api.github.com/Vme18000yuan/FreePOC",
"name": "Vme18000yuan/FreePOC",
"updated_at": "2024-07-02T13:28:19Z",
"description": "Add files via upload",
"author": "Vme18000yuan",
"link_2": "https://github.com/Vme18000yuan/FreePOC/commit/7511d7967781b5ae770c62b52a4c3c2930d19a79",
"keyword": "Vme18000yuan/FreePOC"
},
{
"link": "https://api.github.com/wy876/POC",
"name": "wy876/POC",
"updated_at": "2025-01-04T06:15:34Z",
"description": "README.md",
"author": "wy876",
"link_2": "https://github.com/wy876/POC/commit/d6a2a1e8cfb5db7059511fe5b02745327bd25efe",
"keyword": "wy876/POC"
} }
] ]

View File

@ -1,11 +1,605 @@
[ [
{ {
"link": "https://github.com/su18/POC", "link": "https://github.com/su18/woodpecker-plugin-template",
"name": "POC", "name": "woodpecker-plugin-template",
"created_at": "2023-01-08T01:56:47Z", "created_at": "2024-12-13T08:47:27Z",
"description": "收集整理漏洞EXP/POC,大部分漏洞来源网络目前收集整理了1400多个poc/exp长期更新。", "description": "woodpecker-plugin-template",
"author": "su18", "author": "su18",
"language": null, "language": null,
"keyword": "su18" "keyword": "su18"
},
{
"link": "https://github.com/su18/closure-compiler",
"name": "closure-compiler",
"created_at": "2024-12-08T05:13:17Z",
"description": "A JavaScript checker and optimizer.",
"author": "su18",
"language": "Java",
"keyword": "su18"
},
{
"link": "https://github.com/su18/CVE-2022-25845-In-Spring",
"name": "CVE-2022-25845-In-Spring",
"created_at": "2024-11-08T08:24:12Z",
"description": "CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/CTF-NetA",
"name": "CTF-NetA",
"created_at": "2024-10-09T07:46:31Z",
"description": "CTF-NetA是一款专门针对CTF比赛的网络流量分析工具可以对常见的网络流量进行分析快速自动获取flag。",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/jattach",
"name": "jattach",
"created_at": "2024-06-20T08:32:52Z",
"description": "JVM Dynamic Attach utility",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/java-memshell-generator",
"name": "java-memshell-generator",
"created_at": "2024-06-03T03:05:00Z",
"description": "一款支持高度自定义的 Java 内存马生成工具",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/ISC2022Code",
"name": "ISC2022Code",
"created_at": "2024-05-16T11:02:28Z",
"description": null,
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/playframework",
"name": "playframework",
"created_at": "2024-04-10T09:35:50Z",
"description": "The Community Maintained High Velocity Web Framework For Java and Scala.",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/ChatGPT-Next-Web",
"name": "ChatGPT-Next-Web",
"created_at": "2024-04-10T03:18:11Z",
"description": "A cross-platform ChatGPT/Gemini UI (Web / PWA / Linux / Win / MacOS). 一键拥有你自己的跨平台 ChatGPT/Gemini 应用。",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/su18/agentcrack",
"name": "agentcrack",
"created_at": "2023-11-28T04:39:41Z",
"description": "不那么一样的 Java Agent 内存马",
"author": "su18",
"language": null,
"keyword": "su18"
},
{
"link": "https://github.com/BeichenDream/EfsPotato",
"name": "EfsPotato",
"created_at": "2023-03-07T06:59:27Z",
"description": "Exploit for EfsPotato(MS-EFSR EfsRpcOpenFileRaw with SeImpersonatePrivilege local privalege escalation vulnerability).",
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/GodzillaPayload",
"name": "GodzillaPayload",
"created_at": "2023-02-14T09:38:20Z",
"description": null,
"author": "BeichenDream",
"language": null,
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/SharpTinyArgParser",
"name": "SharpTinyArgParser",
"created_at": "2022-12-27T08:05:38Z",
"description": null,
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/GodPotato",
"name": "GodPotato",
"created_at": "2022-12-23T14:37:00Z",
"description": null,
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/JDR",
"name": "JDR",
"created_at": "2022-12-05T10:55:58Z",
"description": null,
"author": "BeichenDream",
"language": "Java",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/PrintNotifyPotato",
"name": "PrintNotifyPotato",
"created_at": "2022-12-02T06:21:02Z",
"description": "PrintNotifyPotato",
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/HackBrowserData",
"name": "HackBrowserData",
"created_at": "2022-11-28T15:15:33Z",
"description": "Decrypt passwords/cookies/history/bookmarks from the browser. 一款可全平台运行的浏览器数据导出解密工具。",
"author": "BeichenDream",
"language": "Go",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/GodzillaMemoryShellProject.NET",
"name": "GodzillaMemoryShellProject.NET",
"created_at": "2022-11-26T14:41:38Z",
"description": null,
"author": "BeichenDream",
"language": "C#",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/ISC2022Code",
"name": "ISC2022Code",
"created_at": "2022-08-02T06:06:34Z",
"description": null,
"author": "BeichenDream",
"language": "Java",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/BeichenDream/GodzillaMemoryShellProject",
"name": "GodzillaMemoryShellProject",
"created_at": "2022-07-14T17:34:48Z",
"description": null,
"author": "BeichenDream",
"language": "Java",
"keyword": "BeichenDream"
},
{
"link": "https://github.com/phith0n/conote-docs",
"name": "conote-docs",
"created_at": "2024-10-01T02:03:22Z",
"description": "redirect to https://conote.vulhub.org",
"author": "phith0n",
"language": "HTML",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/tls_proxy",
"name": "tls_proxy",
"created_at": "2024-08-16T13:34:29Z",
"description": "A lightweight reverse proxy server that converts TLS traffic to TCP, allowing secure communication between clients and upstream servers.",
"author": "phith0n",
"language": "Go",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/conote",
"name": "conote",
"created_at": "2024-08-11T18:30:09Z",
"description": "All in one cybersecurity utility platform.",
"author": "phith0n",
"language": "JavaScript",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/go_sampler",
"name": "go_sampler",
"created_at": "2023-11-24T10:06:01Z",
"description": "A sample for Go project",
"author": "phith0n",
"language": "Go",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/lo",
"name": "lo",
"created_at": "2023-11-22T11:34:35Z",
"description": "💥 A Lodash-style Go library based on Go 1.18+ Generics (map, filter, contains, find...)",
"author": "phith0n",
"language": null,
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/vueinfo",
"name": "vueinfo",
"created_at": "2023-08-28T10:55:48Z",
"description": "Extract website information from Vue",
"author": "phith0n",
"language": "JavaScript",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/goattribute",
"name": "goattribute",
"created_at": "2023-05-03T18:42:11Z",
"description": "goattribute is a lightweight Go library that allows you to set (and get) attributes of a struct dynamically, using dot notation (e.g., `a.b.c`).",
"author": "phith0n",
"language": "Go",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/vue3-cookiecutter",
"name": "vue3-cookiecutter",
"created_at": "2023-03-23T16:35:05Z",
"description": "template for vue3 + vite",
"author": "phith0n",
"language": "SCSS",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/race-condition-playground",
"name": "race-condition-playground",
"created_at": "2023-03-18T11:38:13Z",
"description": "Playground for Race Condition attack",
"author": "phith0n",
"language": "Python",
"keyword": "phith0n"
},
{
"link": "https://github.com/phith0n/gin",
"name": "gin",
"created_at": "2022-12-24T19:46:06Z",
"description": "Gin is a HTTP web framework written in Go (Golang). It features a Martini-like API with much better performance -- up to 40 times faster. If you need smashing performance, get yourself some Gin.",
"author": "phith0n",
"language": null,
"keyword": "phith0n"
},
{
"link": "https://github.com/zhzyker/microwaveo",
"name": "microwaveo",
"created_at": "2023-11-02T01:47:22Z",
"description": "将dll exe 等转成shellcode 最后输出exe 可定制加载器模板 支持白文件的捆绑 shellcode 加密",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/Dict",
"name": "Dict",
"created_at": "2023-09-12T05:16:27Z",
"description": "一些弱口令、fuzz字典",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/Research",
"name": "Research",
"created_at": "2023-07-28T10:14:20Z",
"description": "Research analysis",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/GobyVuls",
"name": "GobyVuls",
"created_at": "2023-04-07T02:49:25Z",
"description": "Vulnerabilities of Goby supported with exploitation.",
"author": "zhzyker",
"language": "Go",
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/titan",
"name": "titan",
"created_at": "2023-01-09T02:30:51Z",
"description": "Titan: A generic user defined reflective DLL for Cobalt Strike",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/debian-media-box",
"name": "debian-media-box",
"created_at": "2022-12-14T02:40:45Z",
"description": "“Debian 小药盒”,一个用来包装 Debian 安装介质的盒子设计和介绍用的说明书。",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/linux-exploit-suggester",
"name": "linux-exploit-suggester",
"created_at": "2022-09-29T03:10:04Z",
"description": "Linux privilege escalation auditing tool",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/Log4j2Passive",
"name": "Log4j2Passive",
"created_at": "2022-07-12T09:29:07Z",
"description": "Log4j2 RCE Passive Scanner plugin for BurpSuite",
"author": "zhzyker",
"language": "Java",
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/loading",
"name": "loading",
"created_at": "2022-07-01T00:56:40Z",
"description": "A collection of highly customisable loading bars for Go CLI apps.",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/zhzyker/JNDIExploit",
"name": "JNDIExploit",
"created_at": "2022-04-19T07:50:20Z",
"description": "对原版https://github.com/feihong-cs/JNDIExploit 进行了实用化修改",
"author": "zhzyker",
"language": null,
"keyword": "zhzyker"
},
{
"link": "https://github.com/lijiejie/MisConfig_HTTP_Proxy_Scanner",
"name": "MisConfig_HTTP_Proxy_Scanner",
"created_at": "2023-04-17T11:50:13Z",
"description": "The scanner helps to scan misconfigured reverse proxy servers and misconfigured forward proxy servers",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/EasyPen",
"name": "EasyPen",
"created_at": "2022-08-22T12:54:41Z",
"description": "EasyPen is a GUI program which helps pentesters do target discovery, vulnerability scan and exploitation",
"author": "lijiejie",
"language": "JavaScript",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/lijiejie",
"name": "lijiejie",
"created_at": "2022-04-04T15:58:41Z",
"description": null,
"author": "lijiejie",
"language": null,
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/eyes.sh",
"name": "eyes.sh",
"created_at": "2022-03-31T14:41:00Z",
"description": "Optimized DNS/HTTP Log Tool for pentesters, faster and easy to use.",
"author": "lijiejie",
"language": "HTML",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/log4j2_vul_local_scanner",
"name": "log4j2_vul_local_scanner",
"created_at": "2021-12-20T12:07:41Z",
"description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/swagger-exp",
"name": "swagger-exp",
"created_at": "2021-03-23T06:46:21Z",
"description": "A Swagger API Exploit",
"author": "lijiejie",
"language": "JavaScript",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/idea_exploit",
"name": "idea_exploit",
"created_at": "2019-05-29T12:21:46Z",
"description": "Gather sensitive information from (.idea) folder for pentesters",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/struts2_045_scan",
"name": "struts2_045_scan",
"created_at": "2017-04-06T06:19:33Z",
"description": "Struts2-045 Scanner",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/ds_store_exp",
"name": "ds_store_exp",
"created_at": "2017-01-24T11:48:50Z",
"description": "A .DS_Store file disclosure exploit. It parses .DS_Store file and downloads files recursively.",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/lijiejie/BBScan",
"name": "BBScan",
"created_at": "2015-11-13T07:41:10Z",
"description": "A fast vulnerability scanner helps pentesters pinpoint possibly vulnerable targets from a large number of web servers",
"author": "lijiejie",
"language": "Python",
"keyword": "lijiejie"
},
{
"link": "https://github.com/projectdiscovery/nuclei-templates-ai",
"name": "nuclei-templates-ai",
"created_at": "2024-12-04T01:46:51Z",
"description": "Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage 👾",
"author": "projectdiscovery",
"language": null,
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/nuclei-templates-test",
"name": "nuclei-templates-test",
"created_at": "2024-11-18T10:30:37Z",
"description": "Nuclei Templates test",
"author": "projectdiscovery",
"language": null,
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/defcon32",
"name": "defcon32",
"created_at": "2024-08-10T20:20:33Z",
"description": "Defcon 32 Workshop setup and info",
"author": "projectdiscovery",
"language": null,
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/actions",
"name": "actions",
"created_at": "2024-08-01T17:26:30Z",
"description": "ProjectDiscovery's Composite Actions",
"author": "projectdiscovery",
"language": "Shell",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/goleak",
"name": "goleak",
"created_at": "2024-07-29T21:42:01Z",
"description": "Goroutine leak detector",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/tunnelx",
"name": "tunnelx",
"created_at": "2024-07-12T15:19:31Z",
"description": "TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/urlfinder",
"name": "urlfinder",
"created_at": "2024-04-30T13:41:12Z",
"description": "A high-speed tool for passively gathering URLs, optimized for efficient and comprehensive web asset discovery without active scanning.",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/machineid",
"name": "machineid",
"created_at": "2024-02-26T14:39:38Z",
"description": "Get the unique machine id of any host (without admin privileges)",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/tldfinder",
"name": "tldfinder",
"created_at": "2024-01-30T16:27:23Z",
"description": "A streamlined tool for discovering private TLDs for security research.",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/projectdiscovery/go-smb2",
"name": "go-smb2",
"created_at": "2024-01-29T17:49:59Z",
"description": "SMB2/3 client library written in Go.",
"author": "projectdiscovery",
"language": "Go",
"keyword": "projectdiscovery"
},
{
"link": "https://github.com/HavocFramework/community-plugins",
"name": "community-plugins",
"created_at": "2024-08-03T17:42:20Z",
"description": "Repository for community provided Havoc plugins",
"author": "HavocFramework",
"language": null,
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/Website",
"name": "Website",
"created_at": "2022-11-17T18:45:29Z",
"description": "source for https://havocframework.com",
"author": "HavocFramework",
"language": "HTML",
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/.github",
"name": ".github",
"created_at": "2022-09-30T16:01:23Z",
"description": null,
"author": "HavocFramework",
"language": null,
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/havoc-py",
"name": "havoc-py",
"created_at": "2022-09-11T20:07:26Z",
"description": "Havoc python api",
"author": "HavocFramework",
"language": "Python",
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/Havoc",
"name": "Havoc",
"created_at": "2022-09-11T13:21:16Z",
"description": "The Havoc Framework",
"author": "HavocFramework",
"language": "Go",
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/Talon",
"name": "Talon",
"created_at": "2022-09-11T02:23:22Z",
"description": "(Demo) 3rd party agent for Havoc ",
"author": "HavocFramework",
"language": "C",
"keyword": "HavocFramework"
},
{
"link": "https://github.com/HavocFramework/Modules",
"name": "Modules",
"created_at": "2022-09-08T14:45:08Z",
"description": "Modules used by the Havoc Framework",
"author": "HavocFramework",
"language": "C",
"keyword": "HavocFramework"
} }
] ]

View File

@ -1,72 +1,72 @@
[ [
{ {
"guid": "https://forum.butian.net/share/4191", "guid": "https://forum.butian.net/share/3992",
"title": "从域认证协议以及密码凭据机制的角度来看内网渗透", "title": "一次窃取程序的恶意样本分析",
"description": "本文记录了内网渗透中主机之间的认证以及横向,域渗透相关的协议以及思路的多种方式,", "description": "一次窃取程序的恶意样本分析",
"source": "subject", "source": "subject",
"pubDate": "2025-03-14 09:00:00" "pubDate": "2025-01-03 10:00:00"
}, },
{ {
"guid": "https://forum.butian.net/share/4181", "guid": "https://forum.butian.net/share/3993",
"title": "XSS防御-揭秘Unicode溢出与CSP Bypass", "title": "Sodinokibi详细分析",
"description": "Unicode溢出与CSP Bypass", "description": "一、基本信息\r\nREvil也被称为Sodinokibi或简称Sodin它在2019年4月被首次发现。这种恶意软件会在感染了用户的电脑后加密文件并删除任何留下的赎金提示信息。这些消息会告知受害者必须支付一...",
"source": "subject", "source": "subject",
"pubDate": "2025-03-13 09:00:01" "pubDate": "2025-01-03 09:00:00"
}, },
{ {
"guid": "https://forum.butian.net/share/4170", "guid": "https://forum.butian.net/share/4006",
"title": "一次渗透过程中的CVE-2022-45460撞洞RCE", "title": "代码审计 - MCMS v5.4.1 0day挖掘",
"description": "在一次渗透中我们遇到了雄迈XiongMai的uc-httpd这是一款被全球无数网络摄像机使用的轻量级Web服务器。根据Shodan的数据大约有7万个该软件的实例在互联网上公开暴露。尽管这款软件存在严...", "description": "记一次 MCMS v5.4.1 代码审计,编号为 CVE-2024-42990&CVE-2024-42991。本文由笔者首发于先知社区的技术文章板块https://xz.aliyun.com/t/16630",
"source": "subject", "source": "subject",
"pubDate": "2025-03-12 09:00:02" "pubDate": "2025-01-02 10:00:00"
}, },
{ {
"guid": "https://forum.butian.net/share/4190", "guid": "https://forum.butian.net/share/3991",
"title": "记一次某大厂csrf漏洞通过蠕虫从低危到高危", "title": "lighttpd溢出漏洞构造ROP链",
"description": "本文记载了笔者src漏洞挖掘的经历如何将一个简单的csrf提高至高危的程度", "description": "前几天打了下强网杯决赛,想着分享一下思路",
"source": "subject", "source": "subject",
"pubDate": "2025-03-11 09:00:00" "pubDate": "2025-01-02 09:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/4168", "guid": "https://forum.butian.net/share/4017",
"title": "掌握Django隐秘漏洞构建内存马实现命令执行", "title": "文件读取漏洞实战利用",
"description": "内存马作为一种常见的攻击与权限维持手段往往多见于Java Web应用中Django在日常开发中使用频率较高的框架今天来探寻在Python Web场景下的内存马", "description": "实战场景下的两个任意文件读取漏洞利用。",
"source": "subject", "source": "subject",
"pubDate": "2025-03-10 17:38:25" "pubDate": "2024-12-31 10:00:02"
}, },
{ {
"guid": "https://forum.butian.net/share/4134", "guid": "https://forum.butian.net/share/3970",
"title": "使用分支对抗进行webshell bypass", "title": "挖矿病毒处置总结",
"description": "使用分支对抗进行webshell bypass", "description": "处理过的挖矿病毒隐藏自身的方式总结及处置方法总结",
"source": "subject", "source": "subject",
"pubDate": "2025-03-10 11:17:55" "pubDate": "2024-12-31 09:00:00"
}, },
{ {
"guid": "https://forum.butian.net/share/4162", "guid": "https://forum.butian.net/share/3968",
"title": "论如何从发现者视角看 apache solr 的 js 代码执行漏洞", "title": "一些vmpwn的详细总结",
"description": "平时分析和复现了很多 cve但是一遇到逻辑稍微复杂的漏洞通告给的位置不是很详细的代码 diff 很冗杂的,分析起来就会很困难,然后这时候其实就是需要耐心和思维逻辑了,这次花了接近一周的时间来了解这个漏洞,其实这个漏洞倒是不重要,就是逼着自己去锻炼思维和看官方文档的能力,让自己尽量接近发现者的视角,虽然这个漏洞很老,但是我还是感觉发现它的人真的很厉害,前后的分析过程也是花费了整整一周", "description": "总结一些常见vmpwn题的打法数据越界泄露libc通过偏移数据处理来得到危险函数地址等常见漏洞会结合两道例题来进行讲解",
"source": "subject", "source": "subject",
"pubDate": "2025-03-10 10:00:01" "pubDate": "2024-12-30 10:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/4171", "guid": "https://forum.butian.net/share/3955",
"title": "vaadin反序列化链挖掘tabby静态分析实践", "title": "样本分析formbook 恶意软件浅析",
"description": "在学习前面几条链子的基础上结合静态分析工具在前面的基础上的一些小发现包括vaadin的新利用方式以及对tabby的检测缺陷的总结", "description": "样本\r\nIOC\r\nMD5749dfc8bf52422ce77ed59a60c2f395e\r\nSHA1d0593187a473a19564a67819050023c9144b30c2\r\nSHA256 5c205cffc83f7be274773fb1c3aa356b29d97e4d62a83e79c5fd52eadc3ed695\r\n概述\r\n语言C...",
"source": "subject", "source": "subject",
"pubDate": "2025-03-07 09:00:01" "pubDate": "2024-12-30 09:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/4178", "guid": "https://forum.butian.net/share/4013",
"title": "Tomcat内存马之Upgrade构建调试分析", "title": "Vulnserver.exe漏洞分析及利用",
"description": "在现今攻防演练日趋常态化和网络安全检测设备检测技术越来越成熟的大环境下,传统的以文件形式驻留的后门文件极其容易检测查杀到,随之\"内存马\"技术开始登上历史的舞台。在JAVA安全知识体系中JAVA内存马也是必须要学习的一个关键板块本篇文章主要介绍Tomcat-Upgrade型内存马", "description": "本章为笔者在学习二进制安全过程中的学习记录vulnserver为公开的二进制漏洞的练习程序本章节的内容为vulnserver.exe的漏洞分析及复现主要通过windbg和ida结合进行分析。因为vulnserver存在多种调试漏洞本文主要使用trun参数进行漏洞分析及利用。",
"source": "subject", "source": "subject",
"pubDate": "2025-03-06 09:00:02" "pubDate": "2024-12-27 10:00:01"
}, },
{ {
"guid": "https://forum.butian.net/share/4173", "guid": "https://forum.butian.net/share/3954",
"title": ".Net Core下的内存马", "title": "ios下某浏览器小说去广告分析与Hook",
"description": "在审计了一套.net core的CMS后的扩展延伸", "description": "支持正版,从我做起,仅供学习!!",
"source": "subject", "source": "subject",
"pubDate": "2025-03-05 09:00:00" "pubDate": "2024-12-27 09:00:02"
} }
] ]

View File

@ -1,122 +0,0 @@
[
{
"title": "机器学习的逻辑回归模型\n",
"link": "https://paper.seebug.org/3303/",
"description": "\n\n\n .katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日\n1. 前言\n在「机器学习的线性回归模型」文章中我们学习了监督学习中如何使用线性回归模型拟合连...\n",
"pubDate": "Thu, 13 Mar 2025 07:37:00 +0000",
"guid": "https://paper.seebug.org/3303/",
"category": "AI安全"
},
{
"title": "「深蓝洞察」2024年度最憋屈的漏洞披露\n",
"link": "https://paper.seebug.org/3304/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/Y8-wT88VnLeMUiD-HssPyw\n在网络安全领域漏洞披露一直被视为保护用户的重要环节但在现实中这一过程却充满了争议和矛盾。究竟什么才算得上“负责任的披露”当厂商在信息公开和补丁发布上占据主导地位而安全研究者则需要耗费大量精力进行沟通与博弈这一模式是否还能真正实现保护用户安全的初衷...\n",
"pubDate": "Wed, 12 Mar 2025 08:28:00 +0000",
"guid": "https://paper.seebug.org/3304/",
"category": "经验心得"
},
{
"title": "「深蓝洞察」2024年度最“安全”的防线\n",
"link": "https://paper.seebug.org/3302/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/LaM5iz_EKbAK_lkaAcBshw\n在攻防对抗日益激烈的2024年安全软件一直被视为企业安全防线的重要基石。然而这些安全软件本身也可能存在漏洞甚至被攻击者利用作为入侵的跳板来对用户造成危害。多年来因为安全软件而导致的事故不禁让人产生一个疑问——安全软件真的可信吗\n安全软件被滥用为攻击工...\n",
"pubDate": "Tue, 11 Mar 2025 08:39:00 +0000",
"guid": "https://paper.seebug.org/3302/",
"category": "经验心得"
},
{
"title": "「深蓝洞察」2024年度最难以阻挡的攻防趋势\n",
"link": "https://paper.seebug.org/3301/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/lUA03YjBiCAatcJh-bUHEQ\n近年来漏洞攻防不断演进。从多年前仅需一个栈溢出就能攻破系统到如今需要运用各种精妙的手法来突破系统的层层防御。“盾”与“矛”始终处于动态对抗每当新的防御措施出现新的攻击手段随之而来。防御机制的升级促使攻击者寻找新的突破口而攻击方法的创新又推动着防御技术...\n",
"pubDate": "Mon, 10 Mar 2025 08:19:00 +0000",
"guid": "https://paper.seebug.org/3301/",
"category": "经验心得"
},
{
"title": "机器学习的线性回归模型\n",
"link": "https://paper.seebug.org/3300/",
"description": "\n\n\n .katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\n跟随着 ChatGPT 等大语言模型掀起的人工智能的浪潮,在这个时间点学习 A...\n",
"pubDate": "Fri, 07 Mar 2025 07:22:00 +0000",
"guid": "https://paper.seebug.org/3300/",
"category": "AI安全"
},
{
"title": "Llama 的悖论:深入探索 Llama.cpp 的堆迷宫,从堆溢出到远程代码执行\n",
"link": "https://paper.seebug.org/3299/",
"description": "作者Patrick Peng \n译者知道创宇404实验室翻译组\n原文链接https://retr0.blog/blog/llama-rpc-rce\n我一直对 Llama.cpp 情有独钟,它堪称我在人工智能与机器学习研究领域孜孜以求的“终极目标”。不仅如此,能在如此复杂且成熟的人工智能项目中挖掘出堆栈/堆溢出导致的远程代码执行漏洞,听起来就格外酷炫。当然,我内心深处渴望在人工智能项目中...\n",
"pubDate": "Thu, 06 Mar 2025 06:27:00 +0000",
"guid": "https://paper.seebug.org/3299/",
"category": "漏洞分析"
},
{
"title": "Emoji攻击增强针对Judge LLMs检测的越狱攻击\n",
"link": "https://paper.seebug.org/3297/",
"description": "作者Zhipeng Wei, Yuqi Liu, N. Benjamin Erichson\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2411.01077v2\n摘要\n越狱Jailbreaking技术可以欺骗大型语言模型LLMs使其生成受限制的输出从而构成严重威胁。其中一种防御方法是使用另一个 LLM 作为 Judge裁判来评估...\n",
"pubDate": "Tue, 04 Mar 2025 09:37:00 +0000",
"guid": "https://paper.seebug.org/3297/",
"category": "AI安全"
},
{
"title": "模型序列化攻击\n",
"link": "https://paper.seebug.org/3298/",
"description": "译者知道创宇404实验室翻译组\n原文链接https://github.com/protectai/modelscan/blob/main/docs/model_serialization_attacks.md\n机器学习ML模型是基于机器学习的应用程序的核心资产。安全地存储和检索模型对成功至关重要。根据使用的机器学习库模型可以以多种常见格式保存。流行的选择包括Pickle、HDF5...\n",
"pubDate": "Tue, 04 Mar 2025 07:09:00 +0000",
"guid": "https://paper.seebug.org/3298/",
"category": "AI安全"
},
{
"title": "关于 Chat Template 注入方式的学习\n",
"link": "https://paper.seebug.org/3296/",
"description": "作者: dawu@知道创宇404实验室\n日期: 2025年2月28日 \n1. 前言\n伴随着年后 DeepSeek R1 模型的火热,号称能运行 DeepSeek R1 “满血版” 的 Ktransformers 框架也受到了大量关注。在使用该框架和阅读相关源码时,我发现框架在借助聊天模版(chat template) 将用户输入转化为输入模型的 token 列表的过程中,可能会存在类似于拼...\n",
"pubDate": "Mon, 03 Mar 2025 06:35:00 +0000",
"guid": "https://paper.seebug.org/3296/",
"category": "AI安全"
},
{
"title": "从零开始搭建:基于本地 DeepSeek 的 Web 蜜罐自动化识别\n",
"link": "https://paper.seebug.org/3295/",
"description": "作者wh0am1i@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\npocsuite3 框架可以通过 --dork 或 --dork-zoomeye 参数获取 ZoomEye 网络空间测绘平台的搜索引擎数据。但随着近几年网络空间领域的攻防对抗升级导致网络空间中存在大量的蜜罐。为了过滤掉这些蜜罐ZoomEye 中加入了自动标注蜜罐的识别算法, 同时 pocsuite3 ...\n",
"pubDate": "Fri, 28 Feb 2025 06:18:00 +0000",
"guid": "https://paper.seebug.org/3295/",
"category": "AI安全"
},
{
"title": "DeepSeek 启示:深度揭秘基于 PTX 的 GPU 底层优化技术\n",
"link": "https://paper.seebug.org/3294/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/FVVes7UIK_OORUk3fXy9mQ\n一、概述\n近日DeepSeek连续不断地开源了多个项目一时间引发了关于GPU底层优化的热潮这在如今国内算力被广泛打压的背景下给我国在现代高性能计算HPC和人工智能AI领域带来了希望其中尤其引人瞩目的是关于底层PTX优化技术引入这在一定程度...\n",
"pubDate": "Thu, 27 Feb 2025 07:24:00 +0000",
"guid": "https://paper.seebug.org/3294/",
"category": "AI安全"
},
{
"title": "银狐突袭DeepSeek本地化部署暗藏“致命陷阱”\n",
"link": "https://paper.seebug.org/3293/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/VUzwaR7eti2YoNebGFz80A\n一、前言\n近期国产大模型DeepSeek凭借其高效的推理能力、创新性的优化技术、低门槛本地化部署能力、灵活的开源商业授权等迅速成为开源生态中的“现象级选手”。然而技术普及的加速期往往伴随着网络安全攻防对抗的升级。当前大量政府、企业和个人开发者在基于D...\n",
"pubDate": "Thu, 27 Feb 2025 02:47:00 +0000",
"guid": "https://paper.seebug.org/3293/",
"category": "AI安全"
},
{
"title": "使用 DeepSeek-R1 在固件漏洞挖掘领域的新实践\n",
"link": "https://paper.seebug.org/3292/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/rZ4iGXs2O_xYD1yEOyu3CQ\n1. 前言\n在数字化时代固件是硬件设备的核心软件组件直接控制着硬件的运行状态和功能其安全性至关重要。一旦固件存在安全漏洞黑客即可利用来攻击设备的运行或者控制设备发起其它网络攻击典型有Mirai病毒利用设备固件漏洞发起大规模的分布式拒绝服务。因此挖...\n",
"pubDate": "Wed, 26 Feb 2025 07:20:00 +0000",
"guid": "https://paper.seebug.org/3292/",
"category": "AI安全"
},
{
"title": "Fuzz 工作流解析与 AI 引入方案分享\n",
"link": "https://paper.seebug.org/3291/",
"description": "作者ghost461@知道创宇404实验室\n时间2025年2月26日\n本文为知道创宇404实验室内部分享沙龙“404 Open Day”的议题内容作为目前团队AI安全研究系列的一部分分享出来与大家一同交流学习。\n1. 概述\n本文受 Google 安全博客的《Leveling Up Fuzzing: Finding more vulnerabilities with AI》启发结合自...\n",
"pubDate": "Wed, 26 Feb 2025 06:10:00 +0000",
"guid": "https://paper.seebug.org/3291/",
"category": "AI安全"
},
{
"title": "「深蓝洞察」2024年度最悲剧的后门\n",
"link": "https://paper.seebug.org/3290/",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/BZtSTpTQbNiAY_KDhnqc8Q\n“看到了软件的源码就意味着没有后门吗”\n1983年的图灵奖颁奖仪式上Ken Thompson抛出了这个问题。作为历史上唯三在40岁以下获得图灵奖的传奇之一他在获奖演讲中向听众展示了如何通过在编译器中植入后门来骇入由无害源码编译得到的Unix系统。Ken...\n",
"pubDate": "Tue, 25 Feb 2025 09:17:00 +0000",
"guid": "https://paper.seebug.org/3290/",
"category": "经验心得"
}
]

View File

@ -1,413 +1,434 @@
{ {
"银行测试": [ "银行测试": [
{
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9eGY9uACgt2whpM3uArsKJhtPcW3yngI2os4opoqkJ3CVlyQRDaV_HvuZGgEiqH5qWVyu8f-CdizGGuzUBaUw7bsimoDXdO0tkjwoWmP-IR9FiZxR7Rc1qNIqBowcxeVnIZeM8ubsGmWg6T-TWZRp5hMz8sMk5-v1orwBepw7bhs5eBgmN3LoYQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...",
"author": "新华网思客",
"pubDate": "2023-03-16 10:44:22"
},
{ {
"title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元", "title": "工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行被处罚 累计罚款130万元",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9_kxI_VvZmKgIBPWuqWqxGjP3L13Sx5Z8ue1Bt6fMWTNbF8uHcSw7yotWKb45hPYOaO6s4gjlb4BSJWEIov6vVWlkKRxOU5zRnkoYXaXVF4CL4XDiNBnzLCkPG3h6guywoth2eDg90PDqC7YyxYWm08OGcMk1MyMvIg8f5XKwm5pFH6In5Ei3zg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd96gjASBlwUFSqWrJq9alN4-cD8UKdfyYRmq92d8CN3CH0g3HWxZYWpx91CwKZQf3SmD133jeXS9hC2mzDL34Zuo8bNtdNkcws4MRmO4xmHoeLVGZTzAewMfnjvxIWNdB9yWSvDNh2HojXkNjQdMv7Kq6x9bZVTQhwdEyfatc_3ZajotuuiAmOIg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...", "description": "近日,福建省银保监局对工商银行福建自贸试验区平潭片区分行、福州分行、福州鼓楼支行开出罚单,罚款合计130万元,4名当事人被...",
"author": "观八闽", "author": "观八闽",
"pubDate": "2022-02-22 15:30:56" "pubDate": "2022-02-22 15:30:56"
}, },
{
"title": "央行出手!支付宝们正式被“收编”了!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX4mNlNXRqlmWhnN00FW01mQJ6Cq1_wcjAYgOP1R5cvAKAT1IsxuN43PU0aaIM5G9I4iMeicHsZmaWvJTr0FR9KydodjkDBa9gC1HBpiJyORkZiyUIOrzjX2q3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "根据央行要求,目前,已有20余家支付机构和银行完成了接入网联平台的工作.央行副行长范一飞此前曾强调,网联平台的目的即提高...",
"author": "人民网",
"pubDate": "2017-10-17 11:43:30"
},
{
"title": "美联储最新消息!要求银行多备“家底”,特别是→",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1anPy5RoRMOOlXXEFpWD2-z4uzbjvbThRtFLBq6sqoGAJvvqQJrhGRvkyoIUFinrOSHMqyTBAhaAFtP89LGcHXY_lnpd9I5uHN1NMiWi3-nXU3s-y5L509bm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "扩大美联储年度银行压力测试范围等. 美国银行业游说团体:更高的资本要求将推升借贷成本今年3月以来,美国硅谷银行、签名银行...",
"author": "央视财经",
"pubDate": "2023-07-12 16:15:05"
},
{
"title": "平安银行、宁波银行等试水支付宝信用卡取现功能,缘何引发舆论争议?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9RzvTwRtWYY46SVdzi5AK7vdYtVIWxOxZDKCkSE_i9yyqMMZ20cZ1tet8xLzKyroEO77zXjakm4E3k7tbo1snKjWXKtdWcFdt26OsIF4Ogndp24w1YN_8XQJSaYhp-sotUP3nDUA-XmPK_uM8XOFLwFtxtKAK1D2MJV1GTpNItLf1AfaFW2DefQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "话题#微信支付宝测试信用卡取现#与#有银行试水信用卡取现:年利率超18%#分别登上微博、头条热搜榜.(来源:人民众云)(来源...",
"author": "人民网舆情数据中心",
"pubDate": "2022-08-31 19:55:10"
},
{
"title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX1kv60Nl9NUocyG5omBgAzqyhSXI3oGv5MBVM7XsbV8--xNXP0IDjc51i4F8EWCyrCbsgIKyI2dqFslqoXQHyBbuzxSAZWAGtDRe_KXOlvVhQtlGooQ6xYr6zvkPgoArRQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
"author": "人民网",
"pubDate": "2017-05-29 08:02:43"
},
{
"title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ItfcIcKoWlLm8Rr_34Fda7N0QENXqvUdpC8uDCUMyP3o8kt-vjbwvo2jDC738B-2xWbdEKfY1O6EZpU8fDyyy7-FVN_6GvWw2wVnWCV_xKj180rrEYdldMUAvPcTu1jIlcL4-eY0sAdHck81TMJpkYwOOxFnW03FOTV2DXA7Hpte0WC6Sbi7DA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...",
"author": "新华网思客",
"pubDate": "2023-05-05 13:51:35"
},
{ {
"title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?", "title": "银行月榜:大行拼命玩“七夕”,微博为何失宠了?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9IchiyQiq6LeEKaAPMU9juA1bCFHqCk42rdC7dGu5J0TJV_TSWviegeqZ9YXMeCE_1wsqouY29bLxCPTCe8uqEk8CV1BaKlRyHJGOUCh3xLg9XozB208ctDIH93tc2FnHL_p4NJMsWg5LVTThT-sYBgI8wmJ55I-ygjm-qJq0CU9flztgI7RZ1g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9RzvTwRtWYY46SVdzi5AK7vdYtVIWxOxZDKCkSE_i9yyqMMZ20cZ1ten6BVrWcbLSaeG0DGxoah32zYL2R28r8t_uFYTgU5UCXDV-fA0eAtaVLxBnrPQwq9dyFJC5MTAQPUh92kuYx0dz_OkgxIVMN4NNG14Jxnxyi0p0l5-cLjSE8RsmObDbtQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...", "description": "新媒体管家中国银行业新媒体8月排行榜,进入总榜TOP10的银行分别是:中国工商银行、中国银行、中国建设银行、上海浦东发展银...",
"author": "人民网舆情数据中心", "author": "人民网舆情数据中心",
"pubDate": "2017-09-14 08:16:46" "pubDate": "2017-09-14 08:16:46"
}, },
{ {
"title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10", "title": "【月榜】12月银行新媒体:工行成功问鼎 上海银行挤进前10",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAvgZg6-4mCHKVgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3fwC5XTKkq9kDNJdxFew8RNmF5J1xVuqKMCAHGR_7TST1Ck-cB6ZhGHapdNWZDDb-iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsVOz8NzTUl--VgrFeYQugDlpmUNjkvxgvOqXyesYm_zYIpLvlCDM0AmAb0chvsD2fNyhCa8My6Bb-qjlExxIFttyhUQaZsCVtv3xb71Sa6r9ZTma9nR-jBnBcq7_vYLV53c1tpARGY_wMmV95nnREF-XH7MSZGz6MxI276v7hj8etuA22uSlmmQLGdQeR7pI3SJgbbWFN17kjfqrSL_2PJVIhAsjXs3f_DlIopi7j_Sok8JIrH16vSVXuSIe89MhwiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...", "description": "本榜单共对部分国内银行12月份的新媒体综合能力进行考核,涵盖包括政策性银行、邮政储蓄银行、国有商业银行、股份制商业银行、...",
"author": "人民网舆情数据中心", "author": "人民网舆情数据中心",
"pubDate": "2017-01-12 17:06:08" "pubDate": "2017-01-12 17:06:08"
}, },
{ {
"title": "美国又一银行倒闭!美联储怎么办?中国受影响大吗?", "title": "警惕 犯罪分子用美容卡到ATM机就能提走你银行卡里的钱 还有这事?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9eGY9uACgt2whpM3uArsKJhtPcW3yngI2os4opoqkJ3CVlyQRDaV_Hro8hmfPwsD9irSLU7ZTXQZPusXiTVPor0eS9LIJKhnse38AsvaT-nG6hJL6b8Kzeyje4PArh_xRW1V5Suf8pEzooHBWUQT7cxZpbLyIjptUldFTpL_yObZ6VKrzu_4XKA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsVOz8NzTUl--VgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0c8vtA-WXRH5TNIk2koF_4gcbjtzha5D27Z5Ex1_ZWZybngqsDxgDgrhQ7fIpmsTTEAmms046vdata00huqHG2Z4m7y8WmQnSlissa5-yfF6Tcjc8o-otmMnQlnLeioc3teHPGFtZgtcE_sh7rSSEZnor6LNsNpWEvD3_mwMlEdhex-WGqPYDE1iZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "规定资产超过500亿美元的银行必须参加美联储年度压力测试,旨在通过更严格监管避免2008年国际金融危机重演.特朗普上台后,将...", "description": "近日,广西玉林警方破获了一起银行卡系列诈骗案,打掉了一个专门伪造银行卡的犯罪团伙.直到案件破获时,很多受害者还不知道自...",
"author": "新华网思客",
"pubDate": "2023-05-05 13:51:35"
},
{
"title": "支付宝微信拉响警报!40多家银行联合起来,要“抢”你手机",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB0MErXwD6mYx_6V1D09fTT_5d3JnQMhdgHrYwSoI_oc0AiMVx1lwOJ1rVNI_Jhpps3az_iRjW0e4QuAW_QYdi8_rH0mz8XQ2U0luG9iCLg784j_DiAYpueDYl_Q5RRZQjg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "招商银行等全国性商业银行,另有近60家商业银行正在加紧测试并即将开通,年内其他主要银行也将基本实现全部开通.受理方面,全...",
"author": "人民网",
"pubDate": "2017-05-29 08:02:43"
},
{
"title": "一家银行最多8个APP!功能交叉重叠,是时候该瘦身了……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd994RykCd99wpOEkXvzxCBzIVUS1LA4FKRqdNCxaFpwnfejFPgpux26ggsJHZMa7xJ7gsX7ZN6JdPWaYdBoLjRwY9SIttIWfKJ4tvsU0VTsoST1rCBrLSNNpFWMnV6TSSUZZaKVHYlDmU51kteFU4c75kSP8zcYxYIrJ-Xg-ls-jvzAjcIGepUqA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "“你想买理财产品的话,请先下载注册我们银行的APP.”每当走进银行,这样的场景极为常见.近年来,为了增加获客,手机APP成...",
"author": "中国网财经",
"pubDate": "2019-06-14 17:18:12"
},
{
"title": "今年银行保险业监管工作14大要点:坚决落实“房住不炒”要求 深入推进网络借贷专项整治……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-31xeF5tPKwMYK6EhXVOSA6VqXa8Fplpd994RykCd99wpOEkXvzxCBzIVUS1LA4FKRqdNCxaFpwnfejFPgpux26sA3XGUDtx3axmAHlXnZgn7rN8UZh4aW0K-vLb1GPNhF2FXQ3glcrc5YLGgLbZ69GCWpbNclo9q8uWawWGL3Do-Kq9tdkvf-V7gbltH5y0CEk6ESiMI9-6w89kyxDwoXvg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "稳妥处置高风险机构,压实各方责任,全力做好协调、配合和政策指导.继续拆解影子银行,特别要大力压降高风险影子银行业务,防止死灰复燃.坚决落实“房住不炒”要求,严格执行授信集中度等监管规则,严防信贷资金违规流入房地产领域.",
"author": "中国网财经",
"pubDate": "2020-01-12 13:33:01"
},
{
"title": "惊人 | 手机这样充电严重泄露隐私 1秒操控你的银行账户",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAvgZg6-4mCHKVgrFeYQugDhBEf4EF8oKrfbCgxSgKqyUQcR05EK0k2hs0mar4IMdiYNuh71rRq0eFifmgfhkzbK3MsPyC4ya4w3uOr8wpkTZe-rcwPrNFQINVjsV5vJ1wOlHEOuNWsLsxmGHQK1jyCZ6MwAG9p7EODSTxKXCJbgrpZDj-zG_ndQ3GsP0o8f2FtAn0-35eJ8OzP63VZ-EaTF4-aXtL55m17xploZKyLyaRGHxSWNMLU7g3Ftgn3b4uiZqwg0yoRFw.&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=4B41706ADC842F9947407703731705C747D32AAD67D3A540",
"description": "但你要小心了,如果不谨慎,一秒就可能控制你的银行账户!测试:手机用充电桩可被操控央视记者做了一个测试,曝光了不法分子通...",
"author": "央视新闻", "author": "央视新闻",
"pubDate": "2017-04-16 13:37:16" "pubDate": "2017-01-14 16:40:10"
},
{
"title": "一周内连续三家美国银行“爆雷”!会否演变成金融危机?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzfegY6xsXbjVVHQhd8dqH4VqXa8Fplpd9ItfcIcKoWlLm8Rr_34Fda7N0QENXqvUdpC8uDCUMyP3o8kt-vjbwvoTmS2wQM2YPMe_Od8CN0h0ZTRrI1bsRi36o3NVnPdCQTe1qvLMqw08cOLg_T2JYwTORyotNYWVo_hvRaFd77uhDl-6mCphnALHU6q1SG-UuWYSWBra5Nsg6Ebq8fk9diw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%B5%8B%E8%AF%95&token=16291AF9651EED2AA6A18D514F2F3056A72B87A3677AA0E4",
"description": "“压力测试本是帮助银行评估资产风险的有效手段,这(监管“松绑”)为硅谷银行的关闭埋下了伏笔.”新加坡国立大学客座教授白...",
"author": "新华网思客",
"pubDate": "2023-03-16 10:44:22"
} }
], ],
"APP逆向": [ "APP逆向": [
{ {
"title": "AndroidApp常见逆向工具和使用技巧", "title": "路飞爬虫开发App逆向第八期share",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAnkQk5xkE8zWVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AR0NI7jhJYTMVcz7PJUxIxodsB_IuTowGyZv6b-_QmuEJE4oYD-Hd2y51bNkKRyRNiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9l40l5MWzjtbsbsR6eNCWCFc2fBtcWxYi1RScM2JNWvWAbXS2wSQe0vsRQxnJ7FxpS7-Hly9zOKbAYIy9riVzrmGRJgS4PuGQmbXjaxbg2fDzhk0fzVTRilh1Dg5i4BYm9iLOcV7xnhleHYIRY1mnBfK97YnmvOAU-mai6i3jnIE6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...", "description": "关注以上公众号,后台回复 课程 即可领取哦~有路飞爬虫开发App逆向第八期share路飞爬虫开发App逆向第八期share### 路飞爬虫开...",
"author": "黑白之道", "author": "小马找课呀",
"pubDate": "2016-10-26 10:17:15" "pubDate": "2025-01-01 05:11:41"
},
{
"title": "记某APP登录逆向解密过程",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9dW5oQAMZhc7ZBqfiMFLXG0GQTv2lk_XvxV5bo6L_2VOd4t-r5x3pbI1Gx3EPaC8OJkaDwKAihuibfqYjIBScgTBgSQR65GHD1ovgvuYrz1SLBPf7pGpZz4oa7gW5DCyVlBmNg_TQcN2-Xhwn-8fSxrOrI95WfXBN3EzZ8pTvy0INGbbB75bUeA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "0x00 前言最近在学习APP逆向相关的知识,刚好拿到了一个APP目标,该APP登录过程存在加密,所以记录下逆向破解的过程.0x01 ...",
"author": "黑白之道",
"pubDate": "2024-05-03 08:36:47"
},
{
"title": "FlutterAPP逆向实践",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9J_zVaWw2uFg686rt6ZvNVl60K0aBaZDqdFQVXjiv0XhcM1gIerRkPxIxT4lKFS5XT7GwdtE9H4nLgwu6ohgaLTmGcpSyTO8mBlZ-8ML7pptw4tAT8AJhUJTN8HLoTdsqo5mo5LofbMG1GVImin52YaRs1GYXibKaKgMw5X68IbItPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...",
"author": "看雪学苑",
"pubDate": "2022-07-21 17:59:03"
}, },
{ {
"title": "一文了解安卓APP逆向分析与保护机制", "title": "一文了解安卓APP逆向分析与保护机制",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRCh-UHGD48L7-I7DWkXnEsIObYXDBg3HYEMXqu0K6h8xhcc62DSq_lv4XrzZVrB48gYRCjyCMepFYVz4yijIGRhQ0g40xftK4fVFS2KAtKzPeWCeu4Cz_SU18tPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfj3humpwptDRbEJyjNDsbawLqlyDY2crnuCOeWpl1fqHvMk7rssIzzTHnmoiXrmqTp4VL2r66onxNjLT3YKAkrhiStrVU8t3sgukCyJGd2TBXVadmu6l5TOE8RsmObDbtQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...", "description": "安卓APP逆向保护作为开发工作中的重要内容,一直是网易云易盾致力于提供的应用服务.“后续,我们将在SO加密保护方面进行更...",
"author": "FreeBuf", "author": "FreeBuf",
"pubDate": "2018-03-31 18:12:34" "pubDate": "2018-03-31 18:12:34"
}, },
{ {
"title": "鸿蒙APP逆向分析工具和方法", "title": "AndroidApp常见逆向工具和使用技巧",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd96k-G4vgcspPLYU-OdVbivgE_1CqqMF6EOxcfbY4fKS8ON2lobS7MG9GkIaxxwqKhQfj3i8aWjoLflkGcsoJz5Yx2qNurMgWx40Et_0YV0tuvMTeUdWc2sGljxh1T3xgl7amCkbHc5mEEEJl7le_KnBGLfqHxFcxgZqH1DD98IO654z_tGSZTqA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsSr0UegHo_8eVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzZr8ZRNe7_PnoyTi_CaSvQnwfm9fgyvvBMGMaUdyBm9-rIkYKlAX-Dj9vW8_i_qrPyk_5Ok-VIGL8Puv9ti7dcGDU1CviXYnFzuSNq_fyLpgrGOxwXysI1AEZKkSu6ctdDFCQQgOOwZapcVyAZ3I_PY9VtKigBfXGyg4kpWQffwFHw4vjE6ADUXiZqwg0yoRFw.&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "鸿蒙APP逆向分析工具和方法需要结合专用工具与开发环境特性,以下从工具选择、分析流程及注意事项进行详细说明一、逆向分析工...", "description": "前言本文将主要介绍个人在AndroidApp逆向分析时常用到的一些工具和小技巧.说起Android 逆向,就不得不提到常用的逆向分析神...",
"author": "哆啦安全", "author": "黑白之道",
"pubDate": "2025-03-03 07:03:21" "pubDate": "2016-10-26 10:17:15"
},
{
"title": "FlutterAPP逆向实践",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9XaFRr9-KEoQ7epe88ZjBhpKdFNuZ0flx7uWdPvFHT6FLj96Ft5D40pAhJXVi62Fu1OBlqLeQHR6pl7E3Onhe8_KSuYpfoz-nMx6NQN5gvmlwBN2BLnvKNFfgGoVFfvji05X42WeTRJbLWq-d9wNbSveee96zYAzf4ZcQ3sDhmpbdrgozfSg6bw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "本文为看雪论坛优秀文章看雪论坛作者ID:Imyang很长一段时间对于Flutter的app逆向都比较头疼,它不像纯Java app那样可以使用jadx-...",
"author": "看雪学苑",
"pubDate": "2022-07-21 17:59:03"
}, },
{ {
"title": "APP逆向神器之Frida【Android初级篇】", "title": "APP逆向神器之Frida【Android初级篇】",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9c9ru1dp7EGcNRWc7m9Vto2jfuvCS_Mpc9MSOn0VU2l0FC8Zx3aXpX0UJ2-YXO-jeeL7GMcDHdlao26PENFpEby4g9Zv-Q3ZdqXO1gHmfrrNnzI8NoDM7cHXc_aYfqQL-sRWvLKG59mTHAJVAOjd33gOjee0gAZukCiuzuct1FnhhWLv6O878UA..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9_j6j2UQN-vxChK1eOjr0eV4x0Gr7qGfxyJYT1IO9o92OYF_6hIhsjJKE2v5sJLkZQ9POZalNGJgbHBCqMNLOw2ax_tV8iR35g8jJjvvwlC3av3PGngcOQN8XSGpD-AWTkLIzjJ7_lWPAOTdf6aFmfPo5_F-iNt59bA7SDsc8rvcYJSSFPgfogQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...", "description": "说到逆向APP,很多人首先想到的都是反编译,但是单看反编译出来的代码很难得知某个函数在被调用时所传入的参数和它返回的值,...",
"author": "NightTeam", "author": "NightTeam",
"pubDate": "2019-07-03 09:00:11" "pubDate": "2019-07-03 09:00:11"
}, },
{
"title": "APP逆向sign签名算法:Python实战指南",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Z2uQi14zjGFECgple0Il5-1K8SLax84YfVaqkNMacaLrG1rkvGbndY6sEGVytRQ2Xa9okGtxlAiFdqvEtLdW8rbW9xGCpXc-0hrzlDs5UvWb91zgNMTb1rkzPqK4FbfdwKi3bykgC3WcITmV9kKf9MJmAnpcRK7rN62zqqL31VVS6t2rFt2rnA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...",
"author": "雷雷讲py",
"pubDate": "2025-01-03 09:40:29"
},
{
"title": "某文APP逆向抓取分析",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Qik4Bv1BdhGxuGMxUzDpjTHOHAh2qfSAh3Krx_VuApSoTdBPktWaIA3Epnk8GTJMeXFCVhhtbySJLh6_XpknCTNSZNDBWubXlcGZvix282X7mCdrMEP3WRC6Pd_oeSUHGhU87R4ma3wJvots1NbSZ5qCC1EK-lgfPTVgeIFcOgPYl_Q5RRZQjg..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "逆向app一定要多练习,这样才能在实践中找到自己的不懂之处,才能够成长.好啦,今天的逆向小文章就到此结束啦,童鞋们下篇文...",
"author": "猿人学Python",
"pubDate": "2020-05-07 20:19:43"
},
{
"title": "抖音APP逆向:附带抓包与6神算法探索",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKNciYPpIcdmE5dl9P8Paw_x58MkIGEcJw3juWkEMf3Hfa2tGfX7oJGkopviLeKN6p0Qsf5Pjq5lQJ440gcqIG3P92dCjJKmIEw71YhhkAfJptZjnqDZ-9WctPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必...",
"author": "彪哥in讲py",
"pubDate": "2025-01-03 13:10:22"
},
{
"title": "APP逆向工具清单",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKEQotIC1WeYHE8IYVGBIMwjYX9eBY-oL5HUkRlYI-PnA1yRFHhpHP7Sm7W-AWObVBA3hV_7JOu-4Bl_kDMDYSBKlyTq-ojDhmiIxLICWVTQxzYYD-Z4gXxIGX_iHL9MadA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "嘿,各位热爱编程的小伙伴们,今天咱们来聊聊APP逆向的那些事儿.给大家整理一份实用的APP逆向工具清单.一、环境准备篇重点...",
"author": "彪哥in讲py",
"pubDate": "2025-01-03 13:10:22"
},
{ {
"title": "对某数藏类app逆向安全分析", "title": "对某数藏类app逆向安全分析",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9lXcNX9AOOoTm4CBrpf0a-sBoRZk4Hd4NMf3NFX_hTnPUBFDO-H4INSEcbjxWPpdnBn-AZglZbicNTigYbg2H7qdRL4o9ns-lYIMjPuIxF33xHcrOROK0Ryt7VpTw8LTTZmvGGaQd2pfwj2ErCUI2wmyPNzVj_SyltmhBVT1n_jDm0CtGSSkZQQ..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9GiViCKgEh3hp7ZlMSpKeIxQIvdCmAeOoiCEAYw2fNdPDoAUxw7Sq0DjCePM34mg90eQZy34NnNqcQj5B9QyHOBprivnuY9SDKs905S9kj1Tnh4hFQDNN_v8e06kIiEF_i9uWMfyA3VvPejxQjlknYq3DhADG6xVBsJgDwHp2pAz2CsG6-xMgzQ..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA",
"description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...", "description": "对uni-app开发的某app逆向分析不过今天这个app有点不同,我感觉是值得记录的,所以准备再写一篇有关这个的分析首先,打开这个...",
"author": "编角料", "author": "编角料",
"pubDate": "2023-03-10 18:32:22" "pubDate": "2023-03-10 18:32:22"
},
{
"title": "APP逆向系列(一)",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9tUUp5U1amv6rVz_XTmtn0mdOmyG1nqM9oBM4n5C4uAvylPx-49SZoEBhA0b-zBpJsQFk04s6KlDA8AmsqNP4xzefHWP558a5M8BSkLIq_ZaLBrBb6kiIh2RwFHCc_BXVZFugczBJ9VuB_J4lMJKtsrqe2XulivXNeVfmKyOIKAl5LU3lqtPw9g..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "APP逆向系列(一)最近在解决APP逆向问题,之前都是不系统的学习,知道工具,知道hook,但是跟某些金融比起来还是差点意思...",
"author": "呼啦啦安全",
"pubDate": "2024-04-17 21:59:21"
},
{
"title": "好用的APP逆向工具",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9uOgbmr5Xs6SFGTkWWTq1dNh66X-qAb5cKLOT1QvVslrpp4a4I0-m6j9v9f8cIyfgBPGHNfUgAPQE7f2t1-x9mZihVVB2ngV9kemhL-3At65I3PA5-zIKti84ioUpdJtGEgNkWYF66san6mCWt711PMRU6aMXJ2QQ0uW6HRm-x3UHpHkoPMgL3A..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "从此APP逆向快人一步Apkdb概述《Android APK+Dex文件反编译及回编译工具》 简称:APKDB.是一款,针对Android OS系统APK...",
"author": "素人一鸣",
"pubDate": "2025-01-16 15:58:50"
},
{
"title": "【APP逆向】某某租车app逆向分析",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-37YKXPxKcstoK6EhXVOSA6VqXa8Fplpd9WI9MBCWBS0I03fDVYwvSJS7gdYQF3g4s1UKXr8nlM8auXXxFDSEuay2Em97i5hnc2dq6Tx8sa55G6iNoA0zIqXpVSeLn19g1yVT4VUQfUVuda8fN42zql4tEBXYdBMqVO6TiiJTVB3N5_Zy45rSzdXDOat6dFjV5Zas3Dyx4RGjy08OLTBhW0A..&type=2&query=APP%E9%80%86%E5%90%91&token=4B41960A4215BF07D8D1E792E3746110D815985C67D3A546",
"description": "【APP逆向】某某租车app逆向分析 背景 之前了解了fartext 魔改版的功能用法,但是一直没有合适的app用来测试,这次正好拿来练练...",
"author": "EternalBlue",
"pubDate": "2025-03-12 00:11:48"
} }
], ],
"渗透测试": [ "渗透测试": [
{ {
"title": "200万年薪!人民网这个岗位等你来!", "title": "200万年薪!人民网这个岗位等你来!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB2zJSH-XHxJYGg2BRycObnfKc6vqPrRScVijf9WWtRq_tjWUSCTqHZ_zcgr_WXE-m8ZMwKxJ1Y2clHKXN6HAQHSrXT6lBa2GicuNmqm54Rw3bHFnoxEXkhNflztgI7RZ1g..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX8qGwPH3KbbcOfd5INLRfVOxfp1RmFDjWiC5AESW6uBQt1ARzykp6WnXPJqVHomGyuI1e2brDBsJsJAkCE6fFpUM_dvx1Fbs1R1ahyanbhhtQnaAWuchNYhOJBjQH7pCxQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...", "description": "服务器及应用进行渗透测试等信息安全相关工作;3、关注最新的安全动态和漏洞信息,及时修复业务系统相关漏洞.任职资格:1、全...",
"author": "人民网", "author": "人民网",
"pubDate": "2018-08-03 15:22:17" "pubDate": "2018-08-03 15:22:17"
}, },
{
"title": "中新网招新了!打工人,速来!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9m7yv2ccEJ4i5LYy3cPhwUIIrJBaPxbEK8anG_cAz9D5mdEFw6KfCJfNhbADYC1DSHZAO02gCXMIVXr3HxQG1tMPNRm05JJ8Xxu7DlEG3gq69BuoSdIny0WRCDHOB3UXzmb_wXn0lhZVVY7Wc_RgQhKchioy7-HtvNyC4S4f3mI3S-e4Yz84xMA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...",
"author": "中国新闻网",
"pubDate": "2020-11-03 15:52:39"
},
{
"title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9fP4Xj1QflXiE_uUOtgLs-VC7viQvoqUsNljU1prUHdABMu2hSav0LVZ6cZODAmDPnpDumn6Oge4o9xNUzx7burEBVHUFMhkKFEA_qutuCH-2qxk2BJAF6mCQ45mOP0TZd6VZUnHC8jSEQwYN7mKykz41OOAXs8rxyikQyIhN7BcC2Qmj7RgGwQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
"author": "新华网",
"pubDate": "2017-08-24 14:13:15"
},
{ {
"title": "人社部拟新增10个新职业,看看自己能干点啥", "title": "人社部拟新增10个新职业,看看自己能干点啥",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd938XWbZVit1p12c7HjlKcxc0ct2UIRuW2IuQFNtwlOSwNBnqV_XFalJfWH0Fo0sqI2jXtkJpMFXtkJT5spcScNNd43EJRTZQXbKiB8gxe8MmhclEVHlHGuBTdGJnjDE6p1BPfoFHvxLSJhVaPMnaKR4dqv2GDzseij7f4Zuod9ya00NVofL2iDw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9dZOej61YtrTs2h1vajWyLvKQP6bKmphmX2eNGeMCIj9cimnvgL6vCF4lh-VxQl2-B2l1KbtoyjAjcti6Ew5yPemwVke2fiYQ1b2--6hUi0rnBgUnzvAraGWPflbRRq_Cer5174dgOFyK__WHtse0Kf33KGmbqhX4RMGQt_DwgyBAe0f8bRARvQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...", "description": "直播销售员信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的...",
"author": "人民网海南频道", "author": "人民网海南频道",
"pubDate": "2020-05-13 14:27:12" "pubDate": "2020-05-13 14:27:12"
}, },
{
"title": "“徐玉玉案”涉案19岁黑客杜天禹受审 获刑6年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9PqQlcuvFN9g_bqeJ5QbmnFYukolAkRoQx0xYBeMcYYfmYhi8e3rtj7iNCfeiK5HlQDI2bw8Osk9rxaMLLJwXsQphT_kRDliL7scQtccwCZHS-mTRty1p96RW6EiR-yQysa0_N306GbPD4ev3QkpZXZ2tgMs5FpOKxlWWwy28zbM6Ebq8fk9diw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "他成为了一家公司的渗透测试程序技术员,“职责就是测试网站的漏洞,提出修复建议”,每月工资六七千元. 杜天禹业余时间经常...",
"author": "新华网",
"pubDate": "2017-08-24 14:13:15"
},
{
"title": "中新网招新了!打工人,速来!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9wS1-G8W9o-dL0JnQBeYzqIiA8EPSwmklDhtUOAJ_gaxnBlMl-tw95bALxp9cqLooLYczvhrvkAT24s-4JDW_cGN6DcrYgusOEMtZ7fwAigRz1xdN1W7kAnUlIVB0i6u2MT3T0lmG-EXTxO655c74o6kCwZJL8l1weOMKobcj_NQSYTqT4eyLmA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "具备独立开展渗透测试的能力;2、熟悉常见Web和移动安全漏洞分析与防范,包括SQL注入、XSS、CSRF等OWASPTOP10 安全风...",
"author": "中国新闻网",
"pubDate": "2020-11-03 15:52:39"
},
{
"title": "人社部拟新增10个新职业,网友疯狂@李佳琦",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9TZnKhlrYzz2C1Nz4XB2uPAU7INirf6N-EPFi35x_DyDQQ2U_N0i2TTSVXCM-RaBIngebSx1NYTMxIp8fIEf4GllEl1P12oBM0SDJmQOtTYix88S5OWkRiuo1Uqih0dC41ndhrPQ6j07RVVxMWkSNvVEw-HEGSL7N7xWZGQs8WB5535pjGOOjYg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
"author": "光明网",
"pubDate": "2020-05-12 18:12:17"
},
{
"title": "撒贝宁惊现滑雪场!硬核测评来了→",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1by27scDSV9q6BoNp03By_ohkFhfL-9FAgQb7YxWHsEklzyKl78FV8v5UgPr4DyomQ0W08nr1Ts_5vL6-ETYerjVPoYai4WW49pAWUQqAwWLYiM6jy4dt_9S6t2rFt2rnA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "试纸放入衣服内并进入淋水装置水珠在衣服面料表层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如撒贝宁...",
"author": "央视财经",
"pubDate": "2022-12-30 15:14:23"
},
{
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX8qGBPQpmJmF1rRfrn5fJly2VvqaQ-XpG8Wpb2_-zIn6bxmOMqxLrTQLOuuanB1sYdZvgaEPHUQ_udxLIzJIJaLSwU6OPy1lUa_pYMPu4R-tVumWS8jpVoy54z_tGSZTqA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...",
"author": "人民网",
"pubDate": "2020-07-10 19:38:53"
},
{
"title": "【提醒】妹子们注意!上海消保委测试了40款知名面膜,结果...",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9BPIo8QLoEC_lu8ScaJKxGD9-S8LsNyq7vhHn8WWk2filE7c5ZGkw1TQOwn5G3LPFoeGO5WCEDfZNe6QZL1NIGM0VeHsxA5urCoIoQbUY1J-3cRF2qAGGnslLQ8KcPQcAuul1a1w-R5AvAZlJ2xqETo2iEl62_XqAsadlOaPc61ktPujwwRB2Pw..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "4小时保湿功效分别进行了测试.全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面膜...",
"author": "央视财经",
"pubDate": "2018-10-09 06:45:24"
},
{ {
"title": "李佳琦们要“转正”了!", "title": "李佳琦们要“转正”了!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB0DGECEe9GlcaW9mi2MBmXkLrK2aNKTXvdf2gz9sGguY4io2BKEILJvDOwOoWOamJKwz921jTlhuvjn-9H-nyaoEKqCVj_tYRROprp6YKqkfJpE-dnQJNFFr1dbZWbKUeQ..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9ChmC_jRydxQnWP5xI0ohHv-rfwQuX5ncDx-0miHPf8dlE17ianZoX2XNLJWGVtZrGSPoWA-po6Axj2CrwLkI6W7csg2ZrMwZt17z5yDXX6HQdz7ZfgPmpTjMhPRO7p-QXldvSR8sNIdXOd-6aVKXHM3nV99G0kF_8Ut3OBNuY5TFcvUoAZZH7Q..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...", "description": "信息安全测试员通过对评测目标的网络和系统进行渗透测试,发现安全问题并提出改进建议,使网络和系统免受恶意攻击的人员.社群...",
"author": "人民网", "author": "人民网",
"pubDate": "2020-05-12 19:02:37" "pubDate": "2020-05-12 19:02:37"
}, },
{ {
"title": "李佳琦们“转正”了!又一波新职业发布…", "title": "撒贝宁现身滑雪场,硬核测评“小汉堡”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB9EW3vvazU96ZKEnoo_JS3x0BzzWn10ximMuBWlT_5O9I0gqXal3SA9xAkmK__NeNaHmTzIKlvgdHMgV46VOYCkU-z-LXgKpny54VryVnWHIeu_sCOlTFyHvzHZXxeLdyg..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11Kz4N0T500wuWVVHQhd8dqH4VqXa8Fplpd9QCpjvSjbD4VMiHiS6Jej9mDQtM6tDHgU2NR9YST4vm3iEQ4bmE2yk02M3hB3ZKMTnrW9eSQrLikycRLGkWlNpmLZ98gC2Oyx-bbMkKG0AcpkRnl6tX9H2npHvM8XU8Z6eP1WRk_fhw4cVHe0mMGuVfTg_etL_psPgGv70ysPZXq54z_tGSZTqA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=162979FF5520D3149791BD6E7DB4B59098767161677AA0EF",
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,信息安全测试员、互联网信息审核员的工作将越来越重要.据悉...", "description": "层滑过却始终无法渗透入小撒身上的羽绒服实验结束测验试纸整洁如新严苛如小撒也对极光小汉堡的防水性能刮目相看防水测试100分...",
"author": "人民网", "author": "央视新闻",
"pubDate": "2020-07-06 15:08:14" "pubDate": "2022-12-30 18:03:44"
},
{
"title": "妹子们注意!上海消保委测试了40款知名面膜,结果是……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9fP4Xj1QflXiE_uUOtgLs-VC7viQvoqUsNljU1prUHdABMu2hSav0LXFjP6OboT1q_s_i8-oAShCeQ64qo3_4eMPkTSLPrW7GJxBLlQI_Hx1QeXc9ertFCkSjXIGyr7pYJSgLTFHAd537rsyfHp4-1t3va3n34Gw05SG_XagNHQZe0WC6Sbi7DA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "4小时保湿功效分别进行了测试.1全部样品均通过激素筛查今年6月国家药品监督管理局通告了27批次不合格化妆品,其中多批次为面...",
"author": "新华网",
"pubDate": "2018-10-06 16:53:48"
},
{
"title": "柠檬“上海户口、百万房补”?你也不是没有机会!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3BsRBkcbDQRgK6EhXVOSA6VqXa8Fplpd9-0BJzlLy1eTjFD1JRuvsfpVuBnJzdO4GM_We8LBGBZfzv5nkrpRBB3Gf0crth1REpM7pnCtDQFICq64oviefEZ1vGp75hB_-VyPVdkkH4f88ejvmAzB97n9kx5vRkDJvVUmqh55kw-oFE23pG3T_Kpijfgr5UyMHkJlsOtybC6uFW6cwuUnkdA..&type=2&query=%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95&token=4B41BBA12A73D96FB0B680F58546CCA8B1C360E167D3A54B",
"description": "信息安全攻防渗透测试和信息审核评估成为网络安全维护的关键环节,此次发布的5个工种里,信息安全测试员、互联网信息审核员的...",
"author": "人民网",
"pubDate": "2020-07-10 19:38:53"
} }
], ],
"手机银行漏洞": [ "手机银行漏洞": [
{
"title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9NFACt4r9XtAYsMhQto1wHGOTujEotFi8vSykO0Z07Xs9-tfxZkeUpY6iBgpIAt2qlcUFBr4NqlmxP_WAkDDHwxeCu0zsfNpcT2AjinmY7IFW1HgYGZhghgZJSXbhsdjNLtVmEDjiEeZ0w2BEIqo-WgT7-0TtL-1jEEemsV1E7q_f3q8uRDTfkw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...",
"author": "支付百科",
"pubDate": "2020-03-19 19:33:50"
},
{
"title": "警惕!手机银行APP也会存在高危漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksxHjTp5TWgTMtb0QT38qtXqaKAm6xneH4nKOxeqk3nGzTFmHsDF7RoDIQcIWu7eIDiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...",
"author": "中国信通院CAICT",
"pubDate": "2017-03-15 14:13:34"
},
{ {
"title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万", "title": "什么操作?一男子发现银行网银端漏洞,存50元取50万,收获3000万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9Hzh_lyNfZEqbnRTiI9rBQm3Q87lpJNG3cN4vp1YvJLDwBSPpNKz66VhemuvDOBKdbKq8zyckFEcDlRvZYhEBeMw9r9kKDTs8JkqrrVxvBBjVhoGJkK0jKZMExOmTHzxEnZwJiUsgHt426TGjjzW-m9d9apFNp5IhfTyuqbmZb4TFcvUoAZZH7Q..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9fPAEaSpFXxfae8BDlsMpqKDKzXpikguf1JnIOJ71rS9T6B1Ci9_KDPzxj-onF2fZdPfhdIcXYHOVkKtxCkFd_bh9rAkkbR7uxY-OzvxNEhvEQ3sVetUAFgB5hfnp7hwbeS5SeRmQq0lv-OfuKRSevGmV4sGsvp54P435H_cIa_sCYioxHkzTmA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...", "description": "他发现上海某银行的网银有漏洞,可以修改定期存单金额和贷款金额,比如存款改成50元,贷款改成50万,就能套现50万.半年内他...",
"author": "木火通明", "author": "木火通明",
"pubDate": "2019-04-23 21:42:11" "pubDate": "2019-04-23 21:42:11"
}, },
{
"title": "银行手机app存重大漏洞,用户分166笔套取资金300万未被发现",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9ijJxckBNMIw2ONIiAAgQD0orZTwt52sxaQbBLPhNvKiwLwJEB2b8RPJNpWJsPOhDh0JfRVCw0pPHMt0_TuGoNx0Na-eMRsMPacmnLJzQCS_ZsH4040sKCA-L9rfXZZe8viuVGrdaHndRxZSm-4Kf-p229-kDQ-v09MbXGF3_9EnS-e4Yz84xMA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "银行app存重大漏洞判决书显示,朱某系平顶山银行用户,为了更方便的使用各类业务,朱某在手机上下载了平顶山银行app,绑定了...",
"author": "支付百科",
"pubDate": "2020-03-19 19:33:50"
},
{ {
"title": "手机银行漏洞:五行代码可转走银行250亿美元存款", "title": "手机银行漏洞:五行代码可转走银行250亿美元存款",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDrGFFTyF4j-fIHKmKiWmh_gT1RIk9nIJTomqza81rARJOjZaCXpGyzbfa51Lk7hnBdd-PXO8zD4bZBzkEs4qL91zXrAssxq_Fx_iURzYopd5FdYNUIpQFKjqT5bbRtXpk6qvJW3YSGGH4mUNEhHT1092NRPfeW2gOckW9rfO5f8Y4zZqnpfFaZ3i-R9z0OfFxpHSTjVCI9DmVfyAhJ0RCVBxAmAH5j2j34zQH5fQsyygiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDkbox_qHQILDSiF38SaauBfqy2K3HYei7upHkg-JUbg6cdKGl9uj14eWOwHcT_M6tCJqbi9mD7ihv-AKW45ZJaJjKVEYPEpjr3vMz_imG_YfMjZ6IcYXkYeyysg7Ep5txHE-1kFTdXu0k1i_7a7Piw-SzdHavYB6ZE67RWhLBFYsuEt3jaJd8_4YrAqrUNSCl45ZS13pkM7BPtp4uoFW7hbK7RW_-gzNADKbpYdWefeyiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "在银行客户所使用的手机银行软件之中存在一个严重的安全漏洞. Prakash解释称,通过利用这个漏洞,他可以从任何一名银行客户的...", "description": "一名安全研究员发现印度一家大银行手机应用存在漏洞,可使他轻松偷走250亿美元.去年年末,安全研究员萨提亚·普拉卡什在一家...",
"author": "黑白之道", "author": "安全牛",
"pubDate": "2016-05-27 08:16:49" "pubDate": "2016-05-19 11:48:56"
}, },
{ {
"title": "黑客攻击发现:多家手机银行APP存漏洞", "title": "黑客攻击发现:多家手机银行APP存漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9Y7g5Zxp-ImqDVr2SrMfwi1gtbpSKZ2v4PWTMZ0URHjtUoGUnTGtCmFj7kb-frKMWiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDpII3pXlhB4cu4QQVVNjVmAappCK6q5S16c49JwWaZSxh6K1ZbFnBuvxOAGz10wsWDCGOVaVbb4pV_vNEfPvSlDh69B_ygeCeHyP2pP4-9OYzmM9EgVrwn3UJ9paHwZeQ8yY46If-pFETSS-0YEV8fETpKlqv5RkewRoBiPd-aG9_A1AQX6nXlQnF4S0o79mYUL5Owo7YEYZVEwoF7uCZkq0QzDzxkcKxqO__hkw14kXiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...", "description": "手机银行存在的漏洞让人担忧.参赛队伍介绍说,通过对国内20家银行提供给消费者的、基于安卓系统的20个手机银行APP进行攻击...",
"author": "E安全", "author": "E安全",
"pubDate": "2016-09-05 11:36:23" "pubDate": "2016-09-05 11:36:23"
}, },
{
"title": "银行手机app存重大漏洞,余额为0也能成功转账?被人套取资金数百万4个月后才发现",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd95FuX7oHuqTy2vXk0m56mQ70Jd5155gD2Md3QcfhtX3-qLVh5LFUOweFf60r0lcM0QVDRCGxYZGQelXNR3W4tYu5LUfYWhH0buEMkJJBVgjYw_NNWnLEmovv2Q7hapVTrJs1xgQwC0o_gxP6VbP9Q8-ADnlWefaUbxpHxVwDXySyFW6cwuUnkdA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "揭示了平顶山银行APP中存在过巨大漏洞.判决书显示,罪犯朱某鑫,1996年生人,小学文化.2017年至2018年,朱某鑫在手机上下...",
"author": "支付爆光台",
"pubDate": "2020-03-19 20:19:19"
},
{
"title": "警惕!有人利用手机银行漏洞,在我市疯狂作案30余起...",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9uQLYrci54ZeLmLtABBGBCMIvO4GzVCXt80DQXHrBh8VSd1SY3lJZNDZNyjq5zoKt0mT_fnwtE_JIauljziXMGalNG8OVdv5bTR0I2AF5eLpJa2F-yUwexQGdQ_k6SHQwX3ySM0Gj6eAyQBjnkA7l8ZXOMbRNJafAdPiN8gBUESctPujwwRB2Pw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...",
"author": "赣州公安",
"pubDate": "2019-09-11 18:44:52"
},
{
"title": "警惕!有人利用手机银行漏洞疯狂作案30余起……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9NT8RvUvXV0PFeE3a2kUhkP2ZG_sX8zawtBT3KVXDaagk-cP3LlavEKLsUaYCzd6w6DZhlyQ9YspIRZKmkzay6EZQflQxyhdeqKfuAYpCA52ekN5651P75SmY3qYCzo2bOCCca3RPdx4ylb5AvEf1Wk8wPAKoG25Q9dQcrLNGeD3wdVqCwyPdzA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551",
"description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...",
"author": "玉山生活",
"pubDate": "2019-09-15 17:21:04"
},
{ {
"title": "某银行手机APP现支付漏洞3天被盗刷40多万", "title": "某银行手机APP现支付漏洞3天被盗刷40多万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAxH-o62u-IsyVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzHWEdrYZx40buATK0RtUpeKuK4Xnc6AvoJJ3-8f7g0iBwlwVQ0IawpTKu0NTfZRcaiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDt6m0Zx5D-v1Rwjk3P2iLUhEZ-LRrvFkVfsvQ7RvizarNGtYcShVf1nwcLufi6L-Gk7jKfOPejPKPrq1E8X8xtcLtMuSAR7jeYn91RFWK5aCBjj3TewmabqUEL84ZxANtI9op8YjndHKzRF4Q4i9YVEPKrHFAjjttHYqLtFFSwSzG3_-b7D05fUkhS2dCV9OXNE36jCXDB9M-os7L6Y-eOqtKNvldU87WWYxXAeTlg8hiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...", "description": "银行手机APP新上线的支付功能被人发现了漏洞,3天内数十名客户的信用卡遭盗刷,共损失40余万元!银行立即停止这项支付功能,...",
"author": "支付界", "author": "支付界",
"pubDate": "2016-06-16 09:00:18" "pubDate": "2016-06-16 09:00:18"
}, },
{ {
"title": "浅析某城商行手机银行水平授权漏洞问题", "title": "警惕!手机银行APP也会存在高危漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3RBfDGcuhAcYK6EhXVOSA6VqXa8Fplpd9xDBW9Rl70OcDaZ8d2t3eWLxTzFuASo02mX09efynhG3F4_7-WUI3gC3ZjaOrWCB9EsQUbql0RvIrYgINh8Nu28IO5qsg2KkFcI5Ud9tw-aj4WuHTgESjTlTUICBxW3zzbT2DRbilp0A20hoSggt-li4bneigETdENFVo2Of620Pf3q8uRDTfkw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B41E20C0956FC4B9492A4D1A6D81B1B94207FB267D3A551", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDtWJbbJ5gmKdyIb1BwsnXrNcyHcjzrvJNVi8JqrNdaI95E24oXpjz7s0tde0UUnVQU2wSvBGSiqEcBJf6JtGOEEuTsHBXh_3zfXPq_UwJRT6DOmgAA8E1-31epqYloXWzrX1ue8j2gDrpYPwWiONnLh_fKqELnf6cslD4qCPNdksj3rJsloDZaWdhg33lCtO23AQAsZ3q6lwX4133lbIo7gy8Ms0DOToTvctecQCZ7xPiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "也导致此城商行从2019年1月18日至今一直关闭手机银行APP软件中Ⅱ、Ⅲ类账户开户链接功能.-问题原因分析-水平越权缺陷漏洞是...", "description": "实验室的工程师通过实验发现此次测试的手机银行APP普遍存在高危漏洞,用户在进行转账交易时,黑客能够通过一定的技术手段劫持...",
"author": "51Testing软件测试网", "author": "中国信通院CAICT",
"pubDate": "2022-10-12 12:01:01" "pubDate": "2017-03-15 14:13:34"
},
{
"title": "部分三星手机指纹安全漏洞爆发 中国银行:App已关停",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd91yEjxg5etkiY8I05ZkcFL0nIvEBF5_g8o5RMTX_iAs_nm-9XiQA7EEJyd5Wg-dEJPcPyEw422pVmwHvWHUB7VYNk0yk9Ml3Vjx6cvMXlqGD4F4UGOt0mlHgopCQEf0bqYIOMiBW9fSZ-FnGfFUMCXFzVDPQXS5-M9_-pIgBW-HzuL0unUdKkuw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "两款手机和Tab S6平板指纹识别存在漏洞问题,中国银行决定关闭手机银行(包括境内版个人手机银行、境外版个人手机银行企业手机...",
"author": "银行科技研究社",
"pubDate": "2019-10-23 12:18:17"
},
{
"title": "有人利用手机银行漏洞疯狂作案30余起,崇仁人警惕!……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd9kt_cpR-bPG0kD5wAUBIu0u1JVtacfwh98Ugm3ehSMzall6cemiDIOpPJV_E4tHnkDTbC92YPHQBUNCg5TK7X2a-hwy2T-6cnlIIV_Ql6oF2m0MvkUIKrecDciQZHEvrGK_zxjqYk9ms3MZX_VAzzRUmHHdwhzXvTZXgH5Qd66kNf_71bqkOtiw..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "支付货款受害人手机接收到了到账信息可是到银行查询却未实际到账怀疑被诈骗刑侦大队民警接报后立即展开调查经民警努力追捕犯罪...",
"author": "乐享崇仁",
"pubDate": "2019-09-12 22:35:10"
},
{
"title": "警惕!有人利用手机银行漏洞疯狂作案30余起……",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzPsmEBqaCsyRVHQhd8dqH4VqXa8Fplpd99mlF0A7yMALXW7mwfuxq-UcFznooBU5xpthqQqLOe2puE2gTOnKFcqv5h0LNpDTBlArlMgHctDJ8Qa6StRv7o5Zmz8hcmHa9AL1Abj0GMaA_LUDUi-VqaDCw8EW_IlnKo8UDKQVWW1XljufB1jPsn46FOcDw8ZTogywAZbCis970OK9DLfgmPA..&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "行账号但受害人手机仍能接收到银行预转账信息此时受害人误认为钱款已到账实际上手机银行端比对银行账号错误后该笔银行转账会退...",
"author": "玉山生活",
"pubDate": "2019-09-15 17:21:04"
},
{
"title": "【警惕】当心!手机绑定银行卡,这个安全漏洞很危险!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05jsLGDvFRcq-KmVgrFeYQugDibtzWmjNxBtVVQdk0bYDh2I2V0fYBaY4964c3qVs00IYi0PRrVDUG0VsiyakpaPjz8b6EcO6e4sFMZtp7TY0cgI6qFbWRY287fuiHWKVHhAtJWPn9orQQizCy_pnEt8HKVEgJk6G2t6oGqCkbVU5bZOZ-9hS32ygSLff1YnhUUagADWgAB_8d3tAGKyj45KEoeIpC-s0dCPCKrXYMy4_9_3ytPzCl-d1qcPmS2LY4JjiZqwg0yoRFw.&type=2&query=%E6%89%8B%E6%9C%BA%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629A88F8CF705C34E4965B8A432B7EE4F2B56FC677AA0F4",
"description": "手机丢失后先做6件事↓↓↓01致电运营商挂失手机号02致电银行冻结手机网银网络时代,这点特别重要!重要!重要!03手机绑定过支...",
"author": "集宁佰事通",
"pubDate": "2017-01-20 11:26:29"
} }
], ],
"银行漏洞": [ "银行漏洞": [
{ {
"title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?", "title": "银行漏洞改存单,50元变身50万,半年骗取3000万!这是什么骚操作?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9pzKu330fp4wKNvjCnpsTYJy_MYuu2jCD8DAS_luExtAWB1N6-Cxv3qasDw3uxHi0z8MjCNPczv36si2m__UqjpsfZTQNAbaoiYscmaVEzka-Nf0uOtaXOO83W4asiYuUGAW-rQuwk6eo8gpCckTFDmjFBvf9GaZ79Fhd4sLWmCqjotuuiAmOIg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd98XvXEKD25NX6fFkj6ypfZpEleWRT0-zrb0y2ksPWB0hCZa5M_GffioYP7XWySX2IgoOYoA_VtEygDb2d8ClozWAWyKDgpj-KuEqOSQhN2q72Q7l755R7slClKCTTWKS1YOfrh1pswOKaugDOWbuRrlAU04b1nGqdry6eRJDZAHLy08OLTBhW0A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...", "description": "犯罪嫌疑人马某最终如实交代了他利用银行漏洞进行贷款诈骗的行为.那么他又是如何发现银行这一漏洞的呢?据犯罪嫌疑人马某交代...",
"author": "测试届的LV", "author": "测试届的LV",
"pubDate": "2019-06-10 08:18:15" "pubDate": "2019-06-10 08:18:15"
}, },
{
"title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9yCKB9iwOJDtLWv88jWC4D3LqwHy7uz5eXXAi1F7RRhfTmxUGPHxNlpTpcgRBQ6HKHK5da9FY-PQYWsW6wwagjjDjk-whi91Qgy9WtCkxb-qLhZaY-aNqNZo-A-90R7nATCrHl4ejTzTSf1l1B9mwUO_aBLTc1iOYrXXwyxVEjXMHpHkoPMgL3A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
"author": "纽扣资讯网",
"pubDate": "2018-08-21 19:29:05"
},
{
"title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd95i37lwf53KQXhIurbqJ78EwAthuML43VGgVJaQi0-yHjXSXQt6yNSFB9IXhZ2qRlx8h84Wk9DhG-65N7kylrgZSAS8EF4JoB7gLO8CtrkqAkUh-oIJhz2JFYUslUu5suP83v9EowWRAL3jlKxMCZS-F8OToB1kbJVAxZxwFsJHdQL0Hr9Gyd3Q..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...",
"author": "灵枫历史阁",
"pubDate": "2023-06-04 17:49:26"
},
{
"title": "华裔女留学生发现银行漏洞消费超2千万 获无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9Y9dzG87vgOnZ1Pc8kgUn4bOjDKoqa0WENxM-PZgqv19n30ZqfoqFybLK1SR7LYH-QCkY-6vQJJYQTF1vlweUrhn78sPKj2o_GrDfgQa25qzSTggfIFWslDhRkC_VjqvqrWlk0CAlCiFgyV5xySIl44uhYpsJDbjVNZWI5TFmlNCE8RsmObDbtQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
"author": "网易新闻客户端",
"pubDate": "2017-12-04 19:29:22"
},
{ {
"title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”", "title": "银行漏洞还是储户大意?招行贵宾客户竟然这样被“套路”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9v5ehQ7aW1JrlZRA0hZQJXryemPyhOEIG8SsPkKVwA1sPvJD5lLpq7bzDWppkR171ixxIoa_DU8md1f4wjSote19_OcS3Nh9M6nZ0smXRixVcky8-IucQNTXYuUAh4dDsfikJaUblV14sI7zkCqc8NLDAAOczmKq7RstcmWk3oo5Cy6umSSPEsg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9the489nMZTrRM-XiN0wAJS0Ym_01yhUvKd6BHAvqjaLdvSGG1CxgULZG3ha2ETji1FdSP89up2VoDTzKeVNubwaoDcVsKVAwif_kcwLnQPRw5kFShQkUkNc-BP7LNPAhoZmr7jsEJ0DxmcFnVYFC_LDTGB6n0XrwP-BiVSFG9nvy08OLTBhW0A..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...", "description": "正规渠道转出资金银行漏洞还是储户大意?为何李某等人的账户会在其不知情的情况下顺利被他人支取出资金?交易过程中的银行短信...",
"author": "新浪财经", "author": "新浪财经",
"pubDate": "2020-07-21 15:52:31" "pubDate": "2020-07-21 15:52:31"
}, },
{ {
"title": "黑产利用光大银行漏洞,信用卡1万额度可提15万", "title": "银行漏洞丢钱,中移动花式收费,谁来给我们一个交代?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9_l1Bjwrux0F8XX3ZwV0YGrjfAMzkM73UoJC81rUsfwUnC0L0pK2NGWNghIH-J-fYIncaKaBKcUsuIlpwk4-3jk4VToaA9SRp9Vr4XkwUF0LCcfIRH-kfYWOyUAhatvlV7uhKM-K6ewbGShFPW_aIOF1TAIpU4sbeTHGWMu-x92t5LU3lqtPw9g..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9YglTSPBY73UVBVfCyPBM__Gf5YGPS_Bj7SfT1EIH8IyvVr34PjFWfrKthy01X3LANqhKMiac9lptbpW1SwKDvAlRs9QsbW-se_0WCpsQtg0PCxoVK31JriHyCvT02s3dYfQYplz82Nmg5_a2bLQwgBlfCxFmYnIi3wWLVbag0bhhlgeRt7bSzA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...", "description": "银行给出的回复也就是杂费、服务费之类的正常说法,具体是什么银行也说不出来.民警将该案件上报,总队也觉得有些蹊跷,案件升...",
"author": "可转债摊大饼", "author": "纽扣资讯网",
"pubDate": "2018-05-26 13:15:31" "pubDate": "2018-08-21 19:29:05"
},
{
"title": "卷!某银行漏洞管理平台投标限价1115万元,浪潮近半价拿下",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9ifWXEHUoNmfSyLSSYMdnbbqUPPxfMrR_HpEuKaBJKg8PTI9uoyQdisGi3AKbA0cCDIcz0fhIwhmPAuY_jwZcpmJUVzanQWGkl-1v7fBXZvYm5oOi6PffjcUvJJu5EaHf0qt35Qbl3EiiZ3DOOBA-0d2rsxJ5Q5UX7efkrvAUqVI6Ebq8fk9diw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "近期,农业发展银行采购漏洞管理平台,产品包括漏洞管理系统和漏洞扫描设备,投标限价1115万元,要求提供投标产品的同品牌同类...",
"author": "安知讯",
"pubDate": "2023-02-06 19:02:16"
},
{
"title": "六安徽商银行再爆监管漏洞!违规吸收存款,罚25万元!负责人被行政处罚!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9kcTUthZEfb8g-5IZT5zCoUSBUeJYC34rdFaDNYyJmAoXFUZ5CJ3JiX9xGPY5VnW5ScRIpQ68upf1GZG4zUK1E4hjcF9tu16epEQS3uFzQnI4_zOPR7F8DHn-d1o-hRu2S5LGk62RcNBRLRFf_9Xto_IOkkmAQabZ_B7BZGsB0cfm0CtGSSkZQQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556",
"description": "yuan元:银行漏洞百出,金融部门应该管管了.阿莫:金融行业的蛀虫,破坏金融秩序的健康发展...小龙:这样的人居然在银行担担当...",
"author": "六地品安",
"pubDate": "2018-10-25 14:25:30"
}, },
{ {
"title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放", "title": "华人女生发现银行漏洞刷爆2千万,挥霍后竟无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9oW-h7ODZ-2qwX0zMPf7C6RCHPwN_SVrexdeJKTUt6u70a3A4YFjhJy2-ceZ6AezyCVa99sgWUSMG1BxjJXmQTC9necAA8QWQpGliM5Vh89nlmjp6vgvDSiKLTXkY9DkrRgWkt8QJ-tB-Ir1Q1eXP1H87FuOXldJ_GV0QQxjE3Dyq3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9XwF5OfuwLiwn84vZXvJ4dBt4iAqSs2CIC13kr1UbI3ypvWBQyC9QB_u5IGeonYqb7SBVvnI5e7lKTjfuzHtJYpU_EqxULy97EGfcl9S1lr3qzvzynmH7wxNmZMZwfWJ-dvihKku0ApLDfS1jMSzIM-9g54S14GDnD0hS4aQStUR5Nu7CnoSqqg..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...", "description": "李佳欣租住的豪华公寓据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一...",
"author": "外交之声", "author": "外交之声",
"pubDate": "2017-12-03 23:54:42" "pubDate": "2017-12-03 23:54:42"
}, },
{ {
"title": "有钱没命花! 3名华人钻银行“漏洞” 获利千万美元  获刑82年!", "title": "2014年浙江大妈发现银行漏洞,一月内偷走5亿,警方:银行的责任",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-3HBP-6BLzry8K6EhXVOSA6VqXa8Fplpd9B4aKooqWHsSX8MfFu9KbHvc4fitnLtTm8fvOyPI9IxxpfezbeTUEo-5I1gXwlj2nzTlA7YViDnsYI3MiVnSH83UGdL_9nfZ5CnPFsoQNVHHv5gJHFUCJbKrvsffl30U9SZwi1LbYQp5Kjb6rwDDLFSiA5W18-Aksmk_8Z_sDxnoSYTqT4eyLmA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=4B420630663E9422FDFACDB8C96265A4FD0E1B1467D3A556", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9tLqsRfiKt2fcmnJvyG1JPGso0xteYU7eLR8AuGjNEhMPKILCiQeYE5SmV30yzXRecuMT18woYDZjeAkLa7NY8YlORktwzCWZnX3eWNitozAcRICchLoVjBiQ8CX6S7JU5hUj6SM13FlxwsjMq0TTDKyXJkalD7xEOJFXlkKKI-eAFV_3u-a3OQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "银行明明有时间差漏洞为什么不修补,这其实就是最基本的银行与客户间的信任与承诺,过去的几十年里,对于绝大多数客户来说,这...", "description": "她成功找到银行的漏洞,在一个月之内挪走了多家银行近五亿元的存款,直到一年后才东窗事发.事发后,涉事银行却推卸责任,引起...",
"author": "留学生公社", "author": "知书局",
"pubDate": "2023-11-18 18:00:57" "pubDate": "2023-02-03 18:20:39"
},
{
"title": "21岁女生利用银行漏洞奢靡消费近2500万元 被无罪释放",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9lJ5xF9ayVllVDmBWDFddB3A0ze8ILrxRj_Rn0wVXNu-5NdN5ylRK8R_iw2zXyhwzVoGZz01im9bl7iTW1ee2fgayLpJyZZ9z2_mqrFBNm2t3oFDq5ZALjafoVLHWJlsJdIcvkG7cYpWdYJr73NsMTPfiv55fN35LLy7844tQScNhWLv6O878UA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "据悉,李佳欣在发现银行漏洞后疯狂消费,购买各种奢侈品,包括爱马仕、迪奥、香奈儿、卡地亚等,甚至在一天之内消费了30万澳元...",
"author": "澳网",
"pubDate": "2017-12-04 23:18:55"
},
{
"title": "让人惊悚的网络诈骗系列之“银行漏洞骗局”",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd94AGs_6GEpTEOlIDUJWpFLKY35QhP39XQAD2Hjr1EM66fOP8I0uz41ODKxAASi5XO2BwG_GhfAyozzkibN-RyuMjJxUs5GUqRjOh5hvCpWBZRuzTxEfDsKaRiuOXCj7B21oaiktXepiCDsyZdbVYcYRLkCWxQVmNH5hPSIR8jY1BhlgeRt7bSzA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "随着网络环境的日趋复杂,网络诈骗也愈演愈烈,骗子可能不用偷你的银行卡、不用拿走你的身份证,只需通过一些手段获取你的私人...",
"author": "火绒安全",
"pubDate": "2017-09-11 17:23:47"
},
{
"title": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9grUjhSztIpxVqenVsHUGZh__-mG7bPlAymoA4Bvf4Vp9dk7gIbKJ8YWHCC_tuCcsKDQCkyemmn68lSX7JrwtNfFcpGBOjjnHgUOY4BV6vZNh5ssu64OjFc0OzN30N3exJFjQhSGSwP83Csa1ZI-6x0BxIDV3mqpDZPOBGv_nWyvuL0unUdKkuw..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "2013年,大妈发现银行漏洞,仅1个月就偷走银行5个亿存到银行的钱,居然不翼而飞了?2013年3月,方德富在工商银行的天台支行,...",
"author": "灵枫历史阁",
"pubDate": "2023-06-04 17:49:26"
},
{
"title": "日报:银行漏洞一张支票可兑付多次;专家提示不要指望会降息",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9-ZWZ2PHumi7RwfCGcnSI1EEJ4c3z7RFK_xmye9XIRvNsWWpB7oTFg8ile_gcSisdTSI0xxvQ5QnsdCIbp8ptCi-INS9GA1ymH-Owiw3PEGRBwWKE8gKnqfSPjeNpoGEmSVo4F3tSb81SXDQULMjREtgtxVBCitrDMKpDs3NYILuTJmCU1UgHwQ..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "银行漏洞一张支票可兑付多次卑诗企业主以亲身经历发出警告,称该公司一名前员工多次使用手机银行兑现多张支票.Glacier Media报...",
"author": "城市知道温哥华",
"pubDate": "2023-10-09 06:55:35"
},
{
"title": "黑产利用光大银行漏洞,信用卡1万额度可提15万",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzYjR1BHNH9h5VHQhd8dqH4VqXa8Fplpd9YuaXX5I7Blccef99ne-2EIhqkZKehrz2jzlhA9fdpKOiIrdXgWSF9gM5LymyAsqAGL-hJnheY-sczKHmEQMc--omRBFmDI1Ccv1KhlVSo0qHbS0NV5b75zTb-Byz9IG9DUJ78Csr_WM0NoROpsxEcDgootiglj8AOLQbQu07PT-q3X8EKMKOIA..&type=2&query=%E9%93%B6%E8%A1%8C%E6%BC%8F%E6%B4%9E&token=1629D9746C16E422AEA884594560B9EFAFBE2198677AA0F9",
"description": "5月25日,雷锋网宅客频道(微信ID:letshome)从网络安全公司紫豹科技了解到,其情报团队监控到一起银行漏洞事件.紫豹科技相关...",
"author": "可转债摊大饼",
"pubDate": "2018-05-26 13:15:31"
} }
], ],
"支付漏洞": [ "支付漏洞": [
{ {
"title": "天融信:《电子支付漏洞报告》重磅发布!", "title": "史上最全移动支付漏洞案例 谁动了银行卡里的钱?",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9OZBwVnf0OZvVkDThqmS0KvPYf9vd0fHL-1NzwpelId6ZjzS0XkOchUXb-1nTvzwUw2lXvVOhe6UnAbSqXsVbT7SxAOPamN2pIyS9f5HmkZ2B7S2a8JMXTvBYYErM7l8LyDqQEOuupqFCNfmVif-GnjgfY1u-EGPEyR6tmRvfLGcNGbbB75bUeA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDqr95PEUjTPeCjEDtUWlMFjnjBVP8MvhBB3rS-ONO8kWUyXnYwgoFpUbgnrKgIxixCCgP3PeeOCp-4-KGyD-MDLGBaPQAm5n4u5TKu2pEERBbVp5wVG_sJnPLaqVLQTbtqO8XPmq69L45iqF-gaWWwGT45bziwKiEvYbrg2FCKNgZu8tviIIT75g9oJnjSeXJTBPJukiy0atEmChO0frq5n8JGLH2LKcbH3Qi9ySg6yniZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...", "description": "雷锋网硬创公开课-移动支付漏洞案例@GeekPwn随着移动支付的普及,我们的生活变得越来越便利.我们甚至已经可以不带钱包、现...",
"author": "天融信", "author": "GeekPwn",
"pubDate": "2023-07-12 18:21:06" "pubDate": "2016-04-19 09:35:10"
},
{
"title": "敏付科技存“支付漏洞”被约谈整改",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9mXuxCPlr9wuMG1zGFKYTVdQ6NbOgjV3V00dz2oMl86RWnpNZdq7Kx7bwuNXgqln9u0SXOIrj7gbeHDszmwhzqbV1lKylQ6RfvW3H0ycB_6keGoLVmFkX_AXTykKUvEAJQK3ft1pFVY_Vg6kFWy0wgJjjAXrkYVuU453FXdGyDT9Q_LeJW-Rhtg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...",
"author": "支付之家网",
"pubDate": "2022-01-24 08:00:21"
}, },
{ {
"title": "手机支付漏洞已成盗刷之源!小编教你如何防范!", "title": "手机支付漏洞已成盗刷之源!小编教你如何防范!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZDFs5gtIb2zRKTVklZSD7LN6AbwUzvZio_quACiFs8NLmD_Eh-Th7MpDZ-ixMe2dgiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDndALL-7pI3oraek_dUHh9oi3Z6JTpwtmofwF_TsWuaziznq53yTuHU0TY6mSaDfaySSatUm8Q3moWHSxcguBZZMZVuXK0hVAcGyacQrUu5Ux6cGmLX7rcIdYhuFwg_cTwOGdVp36ey1X9nDqO-Kggd2_u5ze64Ec_9Bonpg0IFZn_QnfHYVxrjFBHWq66HXNYTtlU5ZEhjdBmpZs2I0tlE3pUxzRkNegYGNmjurPsOgiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...", "description": "手机明明揣在兜里,怎么支付宝和微信钱包里的钱就没了?你以为手机丢了只是损失一部手机吗?说不定紧跟着与手机(号)绑定的移...",
"author": "电脑爱好者", "author": "电脑爱好者",
"pubDate": "2016-05-20 17:30:26" "pubDate": "2016-05-20 17:30:26"
}, },
{
"title": "从最近的微信支付看XXE漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRChz8_pO8mtSkn9lXhXHUkYMYENsBFAw4MpbDSeZX0cZU1zR3nbXPtYia6L7-46xKO3KmNFRmSu32pWZ_YvGzlmU_R_rWuQm9uNSShFsfQZtiOAS1Eo5m1NxDdrgozfSg6bw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
"author": "FreeBuf",
"pubDate": "2018-07-08 18:03:00"
},
{
"title": "支付漏洞:你可能收到了假微信转账",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDonBfgmHjxCOd5XAY1uNSeSCEkLPGf4cu3kGZpLvvkSCuHaUmcDkcnrwDQLZHUliJi-KdKemZNhbMwwfs2qZ-ey2WueZfM3Q2xvQYgxQa-wMRl520NthlI2CaKKPCpDZe-eWIvRYrW2ZNcTo3KmF86iEowge5WjG0YYa5AR-5kBvaRxFoZVxS3OmJechIZPIVjJajuUu5V_Us1XMZbTAxic6vsr67-iOh1v5FwtbFaAkiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "这一支付方式被别有用心的不法分子玩出了“新套路”.从事服装生意7年的晓雯,眼看“回头客”已将钱转至自己的微信上,谁知是...",
"author": "画乡之窗",
"pubDate": "2017-02-28 18:28:24"
},
{ {
"title": "就一加手机支付漏洞讨论在线支付中的安全风险", "title": "就一加手机支付漏洞讨论在线支付中的安全风险",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9PohLElZHBTPQonqCfZ0TtAmg5tVFTq0IqC9Rtf6vksxuBUsHWIRCh-L5VoC6JnrqApIEh_-2oIPZjtRsmX4pPhbTbM6tiyMB93hkLeBBYoEZOkmyt0NGPjZnp902yylFJvxWBnNXdCSxEFrHicHaEgf3IuPe41nQmxVL51aVjsJflztgI7RZ1g..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfrFmQsylociJLjS-mnBLJuoMu32Rxtsxlr4lo_Z8-Lok-wp9h25dKO7utld1wWLMrmY6bEwRvr7jqxjgki4oBcL8e-taz9vzwD3GLxYY4q1fOy4T1mDuUHJe0WC6Sbi7DA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...", "description": "支付交易的处理是由CyberSource处理的,但是支付表单却仍然托管在OnePlus的基础设施中.如果攻击者拥有该页面的读写权限,那...",
"author": "FreeBuf", "author": "FreeBuf",
"pubDate": "2018-02-12 19:17:27" "pubDate": "2018-02-12 19:17:27"
}, },
{ {
"title": "利用支付漏洞套现1300万被判15年", "title": "天融信:《电子支付漏洞报告》重磅发布!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9NFACt4r9XtAYsMhQto1wHGOTujEotFi8vSykO0Z07Xs9-tfxZkeUpTcjypPGbjy1dzndMaxfsw-B9kMCysl9Q2JC1F-c4KWIii5atqTrR2E5H27QHHkcE0EslGSb2u3Sda0wOdznXVXGERgXa2BsvbMBN1ghMG_zS-JkohXtNAgY-UZGbO56rA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9HLpnE2kVZd1IeNEEadfYBn1loyl1Z-xCgV8ehiYbGHBG_OjiU-GEtAvlLjYH1bf8nBpoZHfKFW50XhDAUifGmms-JrmgtyPsh3RmVxqbNzyY29jqn0GC64yQtkEf0-c9WKZe-yP6TX1f-9A3XG6ZpGgCDhVybA7L-WkjZCD1Lwk5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...", "description": "支付漏洞趋势3电子支付的安全风险3.1线下支付安全风险线下交易要求付款者必须持有有效支付工具,如银行卡和智能手机APP.银行...",
"author": "支付百科", "author": "天融信",
"pubDate": "2022-01-03 13:54:08" "pubDate": "2023-07-12 18:21:06"
},
{
"title": "支付漏洞实战",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9Mhk1GjVLnS3VHON7gk3zpZbU9KmHHCJJLg47g3ZmcNtZwp5Wq-oGePXvAK5urD-4C4yk8q__JM5Jcdj-G0RjPcE93MwAKtCMZRGrluOMy6HFTdJK5HByXKYdciKZTBSxD8fZWRsvoT7OjCsM5Jo-FiA9YWwQV24IAKCjGJg0JjHS-e4Yz84xMA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C",
"description": "本文作者:Heart(Ms08067实验室 SRSP TEAM小组成员) 首先先了解支付漏洞:支付漏洞的理解通常都是篡改价格.比如,一分钱买...",
"author": "Ms08067安全实验室",
"pubDate": "2020-08-28 09:00:22"
}, },
{ {
"title": "银行卡免密支付漏洞这么大!", "title": "银行卡免密支付漏洞这么大!",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DCOjX66B0wQAwUyg1TyL97GVgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20xoJoT7dq0ZINPpTcUcFfc5Yu3qxonRRd6dOgptLPH2lD_2VmKXtAg58IEiz6Zny7IiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6ft3wfAVofsP5Peu-UiA4DPTsYJCZ05js-fjST8gcDG-VgrFeYQugDuQ4kL7uR81Sd2Pr115nJuaGM5bMh5P11s3nipXYh7GfWqnDDAJY_PIfdbK8hCMlRkr3S_2VjJLus9RPhsk5RWH7sUYR0dd2wdL7a2QZgEM0OgnsQfgmP4ojfo-M4oiDVPRlI4SIFNmId2K64e_gRujQTWJyfib4dr5Q4nGwc20x5JWHrDlTUo9CT21SzH5qvJuYARiyPAoZSVbUHFSJ9tCZB-UEOs5lWi13R8piIn5kiZqwg0yoRFw.&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...", "description": "仔细想想,我们信用卡设定的自动还款也是一样,不需要密码,钱就划走了,还有去超市被商户扫支付宝和微信支付的付款码的时候,...",
"author": "犀牛生意经", "author": "犀牛生意经",
"pubDate": "2016-08-29 09:23:44" "pubDate": "2016-08-29 09:23:44"
}, },
{
"title": "敏付科技存“支付漏洞”被约谈整改",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9T7MSItBWUDi6aBtqRJl8vLhibdQpcX9KHK_9pINJAT4FktBvm82SMRpvfx7KRgsW4OQml8kzCMCwukpjvXw1XMhXUljTQZP_Dm8QZubiEB2Wzh2C3Apz7t0e4o8K7SU9wYA2xyLzKOfWoJb2ktKwyzJcQXWJ9t9nw7KM6M30HoTYl_Q5RRZQjg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "支付之家网(ZFZJ.CN) 支付之家网获悉,持牌支付机构敏付科技有限公司(简称“敏付”)因存在“支付漏洞”被北海市公安机关约...",
"author": "支付之家网",
"pubDate": "2022-01-24 08:00:21"
},
{
"title": "利用支付漏洞套现1300万被判15年",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9ijJxckBNMIw2ONIiAAgQD0orZTwt52sxaQbBLPhNvKiwLwJEB2b8RGz9sddV35XEd1tlMDaDHLCaYNpK_xdB_Z2v0AztsETHJ15Ppg0A-HsOyHqMXXU4bszK6kpOJ16P1vLsZk690W2OIuJza-W2HFt2BhuAy6kbEhHkzLhEHNLdrgozfSg6bw..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "利用支付漏洞,他在半年时间里收入1300万元,光用来打赏主播就花了400万元.撰文 | 张浩东出品 | 支付百科 今年8月份,一个17岁黑...",
"author": "支付百科",
"pubDate": "2022-01-03 13:54:08"
},
{ {
"title": "某小程序的支付漏洞+任意地址删除", "title": "某小程序的支付漏洞+任意地址删除",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS0Sn1n1P5K-34ZVeDnWy53UK6EhXVOSA6VqXa8Fplpd9AKiOW-WJ7zh0-bPf6gXkyGutYIrVVRNKhs5Zma6jodl3HgUbak8MkfEx6b8RQNbvd8Ml2TZMWJlGlNstepzq4wMfBNggnY_PHlanDvUbRD6Nm-vWZS8ZccVToRBI7HqsiJmSmiuTe5jjbPG3Qbk94xqlbuVgE15V_OmylOfgzc1hWLv6O878UA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=4B422930C9903A8D5255631767A2805A5348862F67D3A55C", "link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9v5SVMkK_FaY4t9Rq_tvTCDq3JK1LD5qKq7j_abZgfHRDa3Xz345a7lmyooHcu-9Oq-RX4K2AWqz5u8hQyZzsf8RbseD4nJh2td5Kue-f8lIqaOo268sgxzBJHQNy44VdZoHZCerA2BM3-fxCuQZ1xXh-3tgxYpSLLp9hDG4DuBdS6t2rFt2rnA..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...", "description": "常见的逻辑漏洞有交易支付、密码修改、密码找回、越权修改、越权查询、突破限制等,下图是简单的逻辑漏洞总结,在挖掘的过程中...",
"author": "狐狸说安全", "author": "狐狸说安全",
"pubDate": "2023-09-14 14:25:44" "pubDate": "2023-09-14 14:25:44"
},
{
"title": "从最近的微信支付看XXE漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9OA-y9C60IE-npO37WN82TlW0SZ-ySzWn45G6zLFp6I1yj4loMO3bfivnagF8mYgB2rsrNTDEkBApV8-AR7AUMkA9EEK8Aw1AdcG9aMx2QUkIhuszZNfcrNj-h1FCBP0PelgoHGhR28PH_o2UFD_tQBMNt7Adu4CGcPaBna-erXM5eBgmN3LoYQ..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "这就很能说明问题,于是老大让我对微信支付漏洞做漏洞研究并找出产品出问题的原因.所以才有了这篇文章.由于本文的初衷是为了...",
"author": "FreeBuf",
"pubDate": "2018-07-08 18:03:00"
},
{
"title": "渗透测试之支付逻辑漏洞",
"link": "https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzEeNIX7vxc5tVHQhd8dqH4VqXa8Fplpd9UUGtPtyVVNZTv9xUlnGtgS1JYoH7mxQh0H0hQ1X6jRYjs-2iVyuUDzEFvN1xmyxKHyZcXM9YDsTRZLkBtDBZbyO4mTSVLqgnFJ_2Uy17j8jC0fMZuEqAZzdnhwE9jcwlgOKsWBR6u9eTlYP5ju4PjerW_iZb4iJEW_1sV_1wLNhCy6umSSPEsg..&type=2&query=%E6%94%AF%E4%BB%98%E6%BC%8F%E6%B4%9E&token=162A057F82F80BB33F396AC9D4201B004019E298677AA0FF",
"description": "支付逻辑漏洞分类:1、支付过程中可直接修改数据包中的支付金额这种漏洞应该是支付漏洞中最常见的,主要针对支付宝等需要第三...",
"author": "黑白之道",
"pubDate": "2020-05-03 10:23:30"
} }
] ]
} }

View File

@ -1,642 +0,0 @@
[
{
"title": "老显卡福音美团开源首发INT8无损满血版DeepSeek R1",
"link": "https://tech.meituan.com/2025/03/07/meituan-int8-deepseek-r1.html",
"author": "美团技术团队",
"description": "DeepSeek R1模型权重原生为FP8类型仅能被英伟达新型GPU支持。美团技术团队进行了INT8精度量化的尝试量化后模型精度基本无损可部署到A100等其他型号GPU从而解锁了芯片限制相比BF16实现了50%的吞吐提升降低了推理成本。相关技术已在Hugging Face上开源。",
"published": "2025-03-07 08:00:00",
"source": "美团技术团队"
},
{
"title": "上下文感知的聚合页广告优化实践",
"link": "https://tech.meituan.com/2025/03/02/context-enhanced-learning-for-intelligent-marketing.html",
"author": "美团技术团队",
"description": "聚合页广告将商家和优惠信息以多种形式聚合展示给用户,是美团广告业务中一个重要的业务场景。本文从最能影响用户决策的“发券”和“排序”两个方向出发,介绍了上下文感知建模在广告场景的落地方案,证明了聚合页上下文感知的收益空间。希望能对从事相关研究的同学带来一些启发或帮助。",
"published": "2025-03-02 08:00:00",
"source": "美团技术团队"
},
{
"title": "行为正则化与顺序策略优化结合的离线多智能体学习算法",
"link": "https://tech.meituan.com/2025/02/21/marl-in-meituan.html",
"author": "美团技术团队",
"description": "离线多智能体强化学习MARL是一个新兴领域目标是在从预先收集的数据集中学习最佳的多智能体策略。随着人工智能技术的发展多智能体系统在诸如自动驾驶、智能家居、机器人协作以及智能调度决策等方面展现了巨大的应用潜力。但现有的离线MARL方法也面临很多挑战仍存在不协调行为和分布外联合动作的问题。为了应对这些挑战中山大学计算机学院、美团履约平台技术部开展了学术合作项目并取得了一些的成果希望分享给大家。",
"published": "2025-02-21 08:00:00",
"source": "美团技术团队"
},
{
"title": "预测技术在美团弹性伸缩场景的探索与应用",
"link": "https://tech.meituan.com/2025/02/14/prediction-technology-in-meituan-elastic-scaling.html",
"author": "美团技术团队",
"description": "在管理企业大规模服务弹性伸缩的场景下Web应用的负载时序数据分析和预测至关重要。然而由于应用的周期性特征和负载的复杂性寻找一种能够适应所有应用的预测模型成为了一项挑战。美团与中国人民大学信息学院柴云鹏教授团队展开了“预测技术在弹性伸缩场景的应用”科研合作取得了较好的成果。希望能给从事相关研究工作的同学带来一些帮助或启发。",
"published": "2025-02-14 08:00:00",
"source": "美团技术团队"
},
{
"title": "美团技术年货 | 600+页电子书,算法、工程、测试、数据、安全系列大合集",
"link": "https://tech.meituan.com/2025/01/16/2024-spring-festival-present.html",
"author": "美团技术团队",
"description": "值蛇年春节到来之际我们精选过去一年公众号30多篇技术文章和科研论文整理制作成一本600多页的电子书作为一份特别的新年礼物献给每一位热爱技术的你。愿大家乘风破浪勇往直前",
"published": "2025-01-16 08:00:00",
"source": "美团技术团队"
},
{
"title": "鸿蒙应用签名实操及机制探究",
"link": "https://tech.meituan.com/2025/01/06/openharmony.html",
"author": "美团技术团队",
"description": "本文对鸿蒙公开资料进行了深入分析和解读,梳理了鸿蒙单框架应用的签名机制,拆解每一步的实操过程和背后的实现原理,并对源码分析整理签名的校验机制。从中管中窥豹,探究鸿蒙系统的安全设计思路,希望能给从事鸿蒙研发的同学提供一些借鉴。",
"published": "2025-01-06 08:00:00",
"source": "美团技术团队"
},
{
"title": "2024 | 美团技术团队热门技术文章汇总",
"link": "https://tech.meituan.com/2024/12/26/2024-happy-new-year-top10.html",
"author": "美团技术团队",
"description": "本文整理了2024年美团技术团队最为热门的10篇技术文章这些文章覆盖了基础理论、数据存储、因果推断、搜索推荐、智能测试、知识图谱、领域驱动设计等多个技术领域期望这些精选内容能为大家带来一些启发或帮助。愿大家在新的一年里持续深耕技术沃土稳步前行不断攀登新的高峰。",
"published": "2024-12-26 08:00:00",
"source": "美团技术团队"
},
{
"title": "AutoConsisUI内容一致性智能检测",
"link": "https://tech.meituan.com/2024/11/21/autoconsis-ui-meituan.html",
"author": "美团技术团队",
"description": "美团到店研发平台质量工程部与复旦大学计算机学院周扬帆教授团队展开了大前端智能化测试领域的科研合作从UI界面内容一致性校验入手并实现了一套自动化智能检测流程相关论文被软件工程领域具有国际影响力的会议ICSE 2024CCF-A类会议的Software In Practice Track软件工程实践应用收录。",
"published": "2024-11-21 08:00:00",
"source": "美团技术团队"
},
{
"title": "CIKM 2024 | 美团技术团队精选论文解读",
"link": "https://tech.meituan.com/2024/10/31/cikm-2024-meituan.html",
"author": "美团技术团队",
"description": "本文精选了美团技术团队被 CIKM 2024 收录的 8 篇论文进行解读覆盖了自监督学习、解释生成、CTR预测、跨域推荐、向量召回、图像生成、时效预测等多个技术领域。这些论文有美团独立研究还有跟高校、科研机构合作的成果。希望能给从事相关研究工作的同学带来一些帮助或启发。",
"published": "2024-10-31 08:00:00",
"source": "美团技术团队"
},
{
"title": "大前端:如何突破动态化容器的天花板?",
"link": "https://tech.meituan.com/2024/10/18/recce-in-meituan.html",
"author": "美团技术团队",
"description": "长久以来,容器要实现动态化和双端复用,难免要牺牲掉一些性能。有没有办法让动态化容器的性能尽可能接近原生?美团金服大前端团队给出了一种解决方案,尝试突破动态化容器的天花板。",
"published": "2024-10-18 08:00:00",
"source": "美团技术团队"
},
{
"title": "僵尸网络911 S5的数字遗产",
"link": "https://blog.netlab.360.com/911s5/",
"author": "lvxing",
"description": "<h1 id=\"%E6%A6%82%E8%BF%B0\">&#x6982;&#x8ff0;</h1><p>2024&#x5e74;5&#x6708;29&#x65e5;&#xff0c;&#x7f8e;&#x56fd;&#x53f8;&#x6cd5;&#x90e8;&#x53d1;&#x5e03;&#x901a;&#x544a;&#xff0c;&#x58f0;&#x79f0;&#x5176;&#x6267;&#x6cd5;&#x6d3b;&#x52a8;&#x6467;&#x6bc1;&#x4e86;&quot;&#x53f2;&#x4e0a;&#x6700;&#x5927;&#x7684;&#x50f5;&#x5c38;&#x7f51;&#x7edc;&quot; 911 S5&#xff0c;&#x67e5;&#x5c01;&#x4e86;&#x76f8;&#x5173;&#x57df;&#x540d;</p>",
"published": "Fri, 14 Jun 2024 09:20:11 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Heads up! Xdr33, A Variant Of CIAs HIVE Attack Kit Emerges",
"link": "https://blog.netlab.360.com/headsup_xdr33_variant_of_ciahive_emeerges/",
"author": "Alex.Turing",
"description": "<h1 id=\"overview\">Overview</h1>\n<p>On Oct 21, 2022, 360Netlab&apos;s honeypot system captured a suspicious ELF file <code>ee07a74d12c0bb3594965b51d0e45b6f</code>, which propagated via F5 vulnerability with zero VT detection, our system observces that it communicates with IP <code>45.9.150.144</code> using SSL with <strong>forged Kaspersky certificates</strong>, this caught our attention. After further lookup,</p>",
"published": "Tue, 10 Jan 2023 14:00:37 GMT",
"source": "360 Netlab Blog"
},
{
"title": "警惕魔改后的CIA攻击套件Hive进入黑灰产领域",
"link": "https://blog.netlab.360.com/warning-hive-variant-xdr33-is-coming_cn/",
"author": "Alex.Turing",
"description": "<!--kg-card-begin: markdown--><h1 id=\"id\">&#x6982;&#x8ff0;</h1>\n<p>2022&#x5e74;10&#x6708;21&#x65e5;&#xff0c;360Netlab&#x7684;&#x871c;&#x7f50;&#x7cfb;&#x7edf;&#x6355;&#x83b7;&#x4e86;&#x4e00;&#x4e2a;&#x901a;&#x8fc7;F5&#x6f0f;&#x6d1e;&#x4f20;&#x64ad;&#xff0c;VT 0&#x68c0;&#x6d4b;&#x7684;&#x53ef;&#x7591;ELF&#x6587;&#x4ef6;<code>ee07a74d12c0bb3594965b51d0e45b6f</code>&#xff0c;&#x6d41;&#x91cf;&#x76d1;&#x63a7;&#x7cfb;&#x7edf;&#x63d0;&#x793a;&#x5b83;&#x548c;</p>",
"published": "Mon, 09 Jan 2023 03:13:20 GMT",
"source": "360 Netlab Blog"
},
{
"title": "快讯使用21个漏洞传播的DDoS家族WSzero已经发展到第4个版本",
"link": "https://blog.netlab.360.com/new-ddos-botnet-wszeor/",
"author": "Hui Wang",
"description": "<!--kg-card-begin: markdown--><h2 id=\"id\">&#x6982;&#x8ff0;</h2>\n<p>&#x8fd1;&#x671f;&#xff0c;&#x6211;&#x4eec;&#x7684;BotMon&#x7cfb;&#x7edf;&#x8fde;&#x7eed;&#x6355;&#x83b7;&#x5230;&#x4e00;&#x4e2a;&#x7531;Go&#x7f16;&#x5199;&#x7684;DDoS&#x7c7b;&#x578b;&#x7684;&#x50f5;&#x5c38;&#x7f51;&#x7edc;&#x5bb6;&#x65cf;&#xff0c;&#x5b83;&#x7528;&#x4e8e;DDoS&#x653b;&#x51fb;&#xff0c;&#x4f7f;&#x7528;&#x4e86;&#x5305;&#x62ec;SSH/Telnet&#x5f31;&#x53e3;</p>",
"published": "Wed, 07 Dec 2022 12:58:21 GMT",
"source": "360 Netlab Blog"
},
{
"title": "P2P Botnets: Review - Status - Continuous Monitoring",
"link": "https://blog.netlab.360.com/p2p-botnets-review-status-continuous-monitoring/",
"author": "360Netlab",
"description": "<h1 id=\"origins\">Origins</h1>\n<p>P2P networks are more scalable and robust than traditional C/S structures, and these advantages were recognized by the botnet authors early on and used in their botnets. In terms of time, <a href=\"https://en.wikipedia.org/wiki/Storm_botnet?ref=blog.netlab.360.com\">Storm</a>, which appeared in 2007, can be considered the progenitor of this area, when botnet threats were</p>",
"published": "Thu, 03 Nov 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "P2P 僵尸网络:回顾·现状·持续监测",
"link": "https://blog.netlab.360.com/p2p-botnet-monitor/",
"author": "360Netlab",
"description": "<!--kg-card-begin: markdown--><h1 id=\"id\">&#x7f18;&#x8d77;</h1>\n<p>P2P&#x7ed3;&#x6784;&#x7684;&#x7f51;&#x7edc;&#x6bd4;&#x4f20;&#x7edf;&#x7684;C/S&#x7ed3;&#x6784;&#x5177;&#x6709;&#x66f4;&#x597d;&#x7684;&#x53ef;&#x6269;&#x5c55;&#x6027;&#x548c;&#x5065;&#x58ee;&#x6027;&#xff0c;&#x8fd9;&#x4e9b;&#x4f18;&#x70b9;&#x5f88;&#x65e9;&#x5c31;&#x4e3a;botnet&#x7684;&#x4f5c;&#x8005;&#x6240;&#x8ba4;&#x8bc6;&#x5230;&#x5e76;&#x88ab;&#x7528;&#x5230;</p>",
"published": "Wed, 02 Nov 2022 03:11:33 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Fodcha Is Coming Back, Raising A Wave of Ransom DDoS",
"link": "https://blog.netlab.360.com/fodcha-is-coming-back-with-rddos/",
"author": "Alex.Turing",
"description": "<h1 id=\"background\">Background</h1>\n<p>On April 13, 2022, 360Netlab first disclosed the <code>Fodcha</code> botnet. After our article was published, Fodcha suffered a crackdown from the relevant authorities, and its authors quickly responded by leaving <code>&quot;Netlab pls leave me alone I surrender&quot;</code> in an updated sample.No surprise, Fodcha&apos;s authors</p>",
"published": "Mon, 31 Oct 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "卷土重来的DDoS狂魔Fodcha僵尸网络再次露出獠牙",
"link": "https://blog.netlab.360.com/ddosmonster_the_return_of__fodcha_cn/",
"author": "Alex.Turing",
"description": "<h1 id=\"%E8%83%8C%E6%99%AF\">&#x80cc;&#x666f;</h1>\n<p>2022&#x5e74;4&#x6708;13&#x65e5;&#xff0c;360Netlab&#x9996;&#x6b21;&#x5411;&#x793e;&#x533a;&#x62ab;&#x9732;&#x4e86;Fodcha&#x50f5;&#x5c38;&#x7f51;&#x7edc;&#xff0c;&#x5728;&#x6211;&#x4eec;&#x7684;&#x6587;&#x7ae0;&#x53d1;&#x8868;&#x4e4b;&#x540e;&#xff0c;Fodcha&#x906d;&#x53d7;&#x5230;&#x76f8;&#x5173;&#x90e8;&#x95e8;&#x7684;&#x6253;&#x51fb;&#xff0c;&#x5176;&#x4f5c;&#x8005;</p>",
"published": "Thu, 27 Oct 2022 02:49:26 GMT",
"source": "360 Netlab Blog"
},
{
"title": "PureCrypter is busy pumping out various malicious malware families",
"link": "https://blog.netlab.360.com/purecrypter-is-busy-pumping-out-various-malicious-malware-families/",
"author": "wanghao",
"description": "<p>In our daily botnet analysis work, it is common to encounter various loaders.Compared to other types of malware, loaders are unique in that they are mainly used to &quot;promote&quot;, i.e., download and run other malware on the infected machine. According to our observations, most loaders are</p>",
"published": "Mon, 29 Aug 2022 13:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "PureCrypter Loader持续活跃已经传播了10多个其它家族",
"link": "https://blog.netlab.360.com/purecrypter/",
"author": "wanghao",
"description": "<!--kg-card-begin: markdown--><p>&#x5728;&#x6211;&#x4eec;&#x7684;&#x65e5;&#x5e38;botnet&#x5206;&#x6790;&#x5de5;&#x4f5c;&#x4e2d;&#xff0c;&#x78b0;&#x5230;&#x5404;&#x79cd;loader&#x662f;&#x5e38;&#x4e8b;&#x3002;&#x8ddf;&#x5176;&#x5b83;&#x79cd;&#x7c7b;&#x7684;malware&#x76f8;&#x6bd4;&#xff0c;loader&#x7684;&#x7279;&#x6b8a;&#x4e4b;&#x5904;&#x5728;&#x4e8e;&#x5b83;&#x4e3b;&#x8981;&#x7528;&#x6765;&#x201c;&#x63a8;&#x5e7f;&#x201d;&#xff0c;</p>",
"published": "Mon, 29 Aug 2022 01:20:17 GMT",
"source": "360 Netlab Blog"
},
{
"title": "A new botnet Orchard Generates DGA Domains with Bitcoin Transaction Information",
"link": "https://blog.netlab.360.com/a-new-botnet-orchard-generates-dga-domains-with-bitcoin-transaction-information/",
"author": "daji",
"description": "<p>DGA is one of the classic techniques for botnets to hide their C2s, attacker only needs to selectively register a very small number of C2 domains, while for the defenders, it is difficult to determine in advance which domain names will be generated and registered.</p><p>360 netlab has long focused</p>",
"published": "Fri, 05 Aug 2022 14:00:00 GMT",
"source": "360 Netlab Blog"
},
{
"title": "DGA家族Orchard持续变化新版本用比特币交易信息生成DGA域名",
"link": "https://blog.netlab.360.com/orchard-dga/",
"author": "daji",
"description": "<!--kg-card-begin: markdown--><p>DGA&#x662f;&#x4e00;&#x79cd;&#x7ecf;&#x5178;&#x7684;botnet&#x5bf9;&#x6297;&#x68c0;&#x6d4b;&#x7684;&#x6280;&#x672f;&#xff0c;&#x5176;&#x539f;&#x7406;&#x662f;&#x4f7f;&#x7528;&#x67d0;&#x79cd;DGA&#x7b97;&#x6cd5;&#xff0c;&#x7ed3;&#x5408;&#x7279;&#x5b9a;&#x7684;&#x79cd;&#x5b50;&#x548c;&#x5f53;&#x524d;&#x65e5;&#x671f;&#xff0c;&#x5b9a;&#x671f;&#x751f;&#x6210;&#x5927;&#x91cf;&#x7684;&#x57df;&#x540d;</p>",
"published": "Fri, 05 Aug 2022 03:31:07 GMT",
"source": "360 Netlab Blog"
},
{
"title": "公有云网络安全威胁情报202204",
"link": "https://blog.netlab.360.com/public-cloud-threat-intelligence-202204/",
"author": "360Netlab",
"description": "<!--kg-card-begin: markdown--><h2 id=\"id\">&#x6982;&#x8ff0;</h2>\n<!--kg-card-end: markdown--><blockquote>&#x672c;&#x6587;&#x805a;&#x7126;&#x4e8e;&#x4e91;&#x4e0a;&#x91cd;&#x70b9;&#x8d44;&#x4ea7;&#x7684;&#x626b;&#x63cf;&#x653b;&#x51fb;&#x3001;&#x4e91;&#x670d;&#x52a1;&#x5668;&#x603b;&#x4f53;&#x653b;&#x51fb;&#x60c5;&#x51b5;&#x5206;&#x6790;&#x3001;&#x70ed;&#x95e8;&#x6f0f;&#x6d1e;&#x53ca;&#x6076;&#x610f;&#x7a0b;&#x5e8f;&#x7684;&#x653b;&#x51fb;&#x5a01;&#x80c1;&#x3002;</blockquote><!--kg-card-begin: markdown--><ul>\n<li><a href=\"https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com\">360&#x9ad8;&#x7ea7;</a></li></ul>",
"published": "Wed, 11 May 2022 02:53:55 GMT",
"source": "360 Netlab Blog"
},
{
"title": "公有云网络安全威胁情报202203",
"link": "https://blog.netlab.360.com/public-cloud-threat-intelligence-202203/",
"author": "360Netlab",
"description": "<h3 id=\"-\">&#x6982;&#x8ff0;</h3><blockquote>&#x672c;&#x6587;&#x805a;&#x7126;&#x4e8e;&#x4e91;&#x4e0a;&#x91cd;&#x70b9;&#x8d44;&#x4ea7;&#x7684;&#x626b;&#x63cf;&#x653b;&#x51fb;&#x3001;&#x4e91;&#x670d;&#x52a1;&#x5668;&#x603b;&#x4f53;&#x653b;&#x51fb;&#x60c5;&#x51b5;&#x5206;&#x6790;&#x3001;&#x70ed;&#x95e8;&#x6f0f;&#x6d1e;&#x53ca;&#x6076;&#x610f;&#x7a0b;&#x5e8f;&#x7684;&#x653b;&#x51fb;&#x5a01;&#x80c1;&#x3002;</blockquote><ul><li><a href=\"https://netlab.360.com/zh/honeypot?ref=blog.netlab.360.com\">360&#x9ad8;&#x7ea7;</a></li></ul>",
"published": "Tue, 19 Apr 2022 02:24:17 GMT",
"source": "360 Netlab Blog"
},
{
"title": "Fodcha, a new DDos botnet",
"link": "https://blog.netlab.360.com/fodcha-a-new-ddos-botnet/",
"author": "Hui Wang",
"description": "<h2 id=\"overview\">Overview</h2><p>Recently, CNCERT and 360netlab worked together and discovered a rapidly spreading DDoS botnet on the Internet. The global infection looks fairly big as just in China there are more than 10,000 daily active bots (IPs) and alsomore than 100 DDoS victims beingtargeted on a daily basis. We named</p>",
"published": "Wed, 13 Apr 2022 14:01:14 GMT",
"source": "360 Netlab Blog"
},
{
"title": "机器学习的逻辑回归模型",
"link": "https://paper.seebug.org/3303/",
"author": "",
"description": ".katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日\n1. 前言\n在「机器学习的线性回归模型」文章中我们学习了监督学习中如何使用线性回归模型拟合连...",
"published": "2025-03-13 15:37:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最憋屈的漏洞披露",
"link": "https://paper.seebug.org/3304/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/Y8-wT88VnLeMUiD-HssPyw\n在网络安全领域漏洞披露一直被视为保护用户的重要环节但在现实中这一过程却充满了争议和矛盾。究竟什么才算得上“负责任的披露”当厂商在信息公开和补丁发布上占据主导地位而安全研究者则需要耗费大量精力进行沟通与博弈这一模式是否还能真正实现保护用户安全的初衷...",
"published": "2025-03-12 16:28:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最“安全”的防线",
"link": "https://paper.seebug.org/3302/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/LaM5iz_EKbAK_lkaAcBshw\n在攻防对抗日益激烈的2024年安全软件一直被视为企业安全防线的重要基石。然而这些安全软件本身也可能存在漏洞甚至被攻击者利用作为入侵的跳板来对用户造成危害。多年来因为安全软件而导致的事故不禁让人产生一个疑问——安全软件真的可信吗\n安全软件被滥用为攻击工...",
"published": "2025-03-11 16:39:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最难以阻挡的攻防趋势",
"link": "https://paper.seebug.org/3301/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/lUA03YjBiCAatcJh-bUHEQ\n近年来漏洞攻防不断演进。从多年前仅需一个栈溢出就能攻破系统到如今需要运用各种精妙的手法来突破系统的层层防御。“盾”与“矛”始终处于动态对抗每当新的防御措施出现新的攻击手段随之而来。防御机制的升级促使攻击者寻找新的突破口而攻击方法的创新又推动着防御技术...",
"published": "2025-03-10 16:19:00",
"source": "知道创宇404实验室"
},
{
"title": "机器学习的线性回归模型",
"link": "https://paper.seebug.org/3300/",
"author": "",
"description": ".katex img {\n display: block;\n position: absolute;\n width: 100%;\n height: inherit;\n }\n\n作者0x7F@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\n跟随着 ChatGPT 等大语言模型掀起的人工智能的浪潮,在这个时间点学习 A...",
"published": "2025-03-07 15:22:00",
"source": "知道创宇404实验室"
},
{
"title": "Llama 的悖论:深入探索 Llama.cpp 的堆迷宫,从堆溢出到远程代码执行",
"link": "https://paper.seebug.org/3299/",
"author": "",
"description": "作者Patrick Peng \n译者知道创宇404实验室翻译组\n原文链接https://retr0.blog/blog/llama-rpc-rce\n我一直对 Llama.cpp 情有独钟,它堪称我在人工智能与机器学习研究领域孜孜以求的“终极目标”。不仅如此,能在如此复杂且成熟的人工智能项目中挖掘出堆栈/堆溢出导致的远程代码执行漏洞,听起来就格外酷炫。当然,我内心深处渴望在人工智能项目中...",
"published": "2025-03-06 14:27:00",
"source": "知道创宇404实验室"
},
{
"title": "Emoji攻击增强针对Judge LLMs检测的越狱攻击",
"link": "https://paper.seebug.org/3297/",
"author": "",
"description": "作者Zhipeng Wei, Yuqi Liu, N. Benjamin Erichson\n译者知道创宇404实验室翻译组\n原文链接https://arxiv.org/html/2411.01077v2\n摘要\n越狱Jailbreaking技术可以欺骗大型语言模型LLMs使其生成受限制的输出从而构成严重威胁。其中一种防御方法是使用另一个 LLM 作为 Judge裁判来评估...",
"published": "2025-03-04 17:37:00",
"source": "知道创宇404实验室"
},
{
"title": "模型序列化攻击",
"link": "https://paper.seebug.org/3298/",
"author": "",
"description": "译者知道创宇404实验室翻译组\n原文链接https://github.com/protectai/modelscan/blob/main/docs/model_serialization_attacks.md\n机器学习ML模型是基于机器学习的应用程序的核心资产。安全地存储和检索模型对成功至关重要。根据使用的机器学习库模型可以以多种常见格式保存。流行的选择包括Pickle、HDF5...",
"published": "2025-03-04 15:09:00",
"source": "知道创宇404实验室"
},
{
"title": "关于 Chat Template 注入方式的学习",
"link": "https://paper.seebug.org/3296/",
"author": "",
"description": "作者: dawu@知道创宇404实验室\n日期: 2025年2月28日 \n1. 前言\n伴随着年后 DeepSeek R1 模型的火热,号称能运行 DeepSeek R1 “满血版” 的 Ktransformers 框架也受到了大量关注。在使用该框架和阅读相关源码时,我发现框架在借助聊天模版(chat template) 将用户输入转化为输入模型的 token 列表的过程中,可能会存在类似于拼...",
"published": "2025-03-03 14:35:00",
"source": "知道创宇404实验室"
},
{
"title": "从零开始搭建:基于本地 DeepSeek 的 Web 蜜罐自动化识别",
"link": "https://paper.seebug.org/3295/",
"author": "",
"description": "作者wh0am1i@知道创宇404实验室\n日期2025年2月28日 \n1. 前言\npocsuite3 框架可以通过 --dork 或 --dork-zoomeye 参数获取 ZoomEye 网络空间测绘平台的搜索引擎数据。但随着近几年网络空间领域的攻防对抗升级导致网络空间中存在大量的蜜罐。为了过滤掉这些蜜罐ZoomEye 中加入了自动标注蜜罐的识别算法, 同时 pocsuite3 ...",
"published": "2025-02-28 14:18:00",
"source": "知道创宇404实验室"
},
{
"title": "DeepSeek 启示:深度揭秘基于 PTX 的 GPU 底层优化技术",
"link": "https://paper.seebug.org/3294/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/FVVes7UIK_OORUk3fXy9mQ\n一、概述\n近日DeepSeek连续不断地开源了多个项目一时间引发了关于GPU底层优化的热潮这在如今国内算力被广泛打压的背景下给我国在现代高性能计算HPC和人工智能AI领域带来了希望其中尤其引人瞩目的是关于底层PTX优化技术引入这在一定程度...",
"published": "2025-02-27 15:24:00",
"source": "知道创宇404实验室"
},
{
"title": "银狐突袭DeepSeek本地化部署暗藏“致命陷阱”",
"link": "https://paper.seebug.org/3293/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/VUzwaR7eti2YoNebGFz80A\n一、前言\n近期国产大模型DeepSeek凭借其高效的推理能力、创新性的优化技术、低门槛本地化部署能力、灵活的开源商业授权等迅速成为开源生态中的“现象级选手”。然而技术普及的加速期往往伴随着网络安全攻防对抗的升级。当前大量政府、企业和个人开发者在基于D...",
"published": "2025-02-27 10:47:00",
"source": "知道创宇404实验室"
},
{
"title": "使用 DeepSeek-R1 在固件漏洞挖掘领域的新实践",
"link": "https://paper.seebug.org/3292/",
"author": "",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/rZ4iGXs2O_xYD1yEOyu3CQ\n1. 前言\n在数字化时代固件是硬件设备的核心软件组件直接控制着硬件的运行状态和功能其安全性至关重要。一旦固件存在安全漏洞黑客即可利用来攻击设备的运行或者控制设备发起其它网络攻击典型有Mirai病毒利用设备固件漏洞发起大规模的分布式拒绝服务。因此挖...",
"published": "2025-02-26 15:20:00",
"source": "知道创宇404实验室"
},
{
"title": "Fuzz 工作流解析与 AI 引入方案分享",
"link": "https://paper.seebug.org/3291/",
"author": "",
"description": "作者ghost461@知道创宇404实验室\n时间2025年2月26日\n本文为知道创宇404实验室内部分享沙龙“404 Open Day”的议题内容作为目前团队AI安全研究系列的一部分分享出来与大家一同交流学习。\n1. 概述\n本文受 Google 安全博客的《Leveling Up Fuzzing: Finding more vulnerabilities with AI》启发结合自...",
"published": "2025-02-26 14:10:00",
"source": "知道创宇404实验室"
},
{
"title": "「深蓝洞察」2024年度最悲剧的后门",
"link": "https://paper.seebug.org/3290/",
"author": "",
"description": "作者DARKNAVY\n原文链接https://mp.weixin.qq.com/s/BZtSTpTQbNiAY_KDhnqc8Q\n“看到了软件的源码就意味着没有后门吗”\n1983年的图灵奖颁奖仪式上Ken Thompson抛出了这个问题。作为历史上唯三在40岁以下获得图灵奖的传奇之一他在获奖演讲中向听众展示了如何通过在编译器中植入后门来骇入由无害源码编译得到的Unix系统。Ken...",
"published": "2025-02-25 17:17:00",
"source": "知道创宇404实验室"
},
{
"title": "AI 帮你高效构建代码安全策略【大模型应用实践系列四】",
"link": "https://security.tencent.com/index.php/blog/msg/213",
"author": "",
"description": "腾讯啄木鸟代码安全团队依托混元大模型的超强代码理解和安全分析能力在SQL注入威胁检测场景验证中新增识别上百个漏洞检测策略相比传统方法人效比提升3.8倍在Github高star项目上斩获10+0day漏洞。",
"published": "2025-01-08 10:26:57",
"source": "腾讯安全响应中心"
},
{
"title": "AI猎手我们用大模型挖到了0day漏洞【大模型应用实践系列三】",
"link": "https://security.tencent.com/index.php/blog/msg/212",
"author": "",
"description": "AI版“赏金猎人”登场基于混元大模型能力打造的自动漏洞挖掘工具7*24小时自动感知、追踪、挖橱0day。 AI猎人VS黑客的角逐战正式开始。",
"published": "2025-01-03 10:23:17",
"source": "腾讯安全响应中心"
},
{
"title": "AI助力明文密码泄漏无处遁形【大模型应用实践系列二】",
"link": "https://security.tencent.com/index.php/blog/msg/211",
"author": "",
"description": "本文聚焦于密钥硬编码的问题,分析了传统检测策略的缺陷,并详细介绍了大模型在该场景下的优势、检测实施方案和效果。我们将继续推出更多关于大模型在研发安全、网络安全、威胁情报等领域的应用探索与总结",
"published": "2024-12-05 17:14:13",
"source": "腾讯安全响应中心"
},
{
"title": "大模型应用实践AI助力Code Review安全漏洞发现",
"link": "https://security.tencent.com/index.php/blog/msg/210",
"author": "",
"description": "借助混元大模型腾讯啄木鸟代码安全团队在代码评审Code Review下文简称CR场景下的安全漏洞检出能力取得显著提升日均发现和阻断300+个代码安全风险,极大提升了公司核心数据资产安全性。",
"published": "2024-11-27 10:39:46",
"source": "腾讯安全响应中心"
},
{
"title": "警惕Hugging Face开源组件风险被利用于大模型供应链攻击",
"link": "https://security.tencent.com/index.php/blog/msg/209",
"author": "",
"description": "著名AI社区Hugging Face开源组件datasets存在不安全特性可引发供应链后门投毒攻击风险。",
"published": "2023-11-03 14:00:00",
"source": "腾讯安全响应中心"
},
{
"title": "虚拟货币挖矿检测与防御",
"link": "https://security.tencent.com/index.php/blog/msg/208",
"author": "",
"description": "从流量和主机层入手,分析挖矿木马的防御之策。",
"published": "2021-11-18 18:00:58",
"source": "腾讯安全响应中心"
},
{
"title": "安全通知NPM官方仓库遭遇coa等恶意包投毒攻击",
"link": "https://security.tencent.com/index.php/blog/msg/207",
"author": "",
"description": "腾讯洋葱入侵检测系统发现开源软件沙箱主机出现异常行为跟进发现npm官方仓库的coa、rc被投毒攻击已经在腾讯软件源紧急拦截相关版本。目前npm官方仓库已将相应版本的恶意包删除但由于国内开源镜像站均同步npm官方仓库且存在缓存所以恶意包还可能通过各个开源镜像站影响广大用户。",
"published": "2021-11-05 21:31:07",
"source": "腾讯安全响应中心"
},
{
"title": "云原生安全攻防使用eBPF逃逸容器技术分析与实践",
"link": "https://security.tencent.com/index.php/blog/msg/206",
"author": "",
"description": "在新版本容器运行时中适用的攻击手法,并使用新方式把“任意文件写”转化为“远程代码执行”。",
"published": "2021-11-03 18:56:37",
"source": "腾讯安全响应中心"
},
{
"title": "Ghostscript沙箱绕过(CVE-2021-3781)分析",
"link": "https://security.tencent.com/index.php/blog/msg/205",
"author": "",
"description": "完整分析从ImageMagick到Ghostscript的攻击利用链",
"published": "2021-10-29 18:40:35",
"source": "腾讯安全响应中心"
},
{
"title": "实时中文语音克隆——开源项目MockingBird体验",
"link": "https://security.tencent.com/index.php/blog/msg/204",
"author": "",
"description": "5秒内克隆生成任意声音以语音克隆开源项目MockingBird为例看AI项目面临的安全风险",
"published": "2021-10-27 22:06:51",
"source": "腾讯安全响应中心"
},
{
"title": "关于BGP那些事儿",
"link": "https://security.tencent.com/index.php/blog/msg/203",
"author": "",
"description": "这是Facebook创立以来最严重的一次网络访问事故在这起故障中我们又看到了BGP的身影",
"published": "2021-10-19 18:10:52",
"source": "腾讯安全响应中心"
},
{
"title": "红蓝对抗之隐蔽通信应用及防御",
"link": "https://security.tencent.com/index.php/blog/msg/202",
"author": "",
"description": "腾讯蓝军和红军十多年案例经验、总结沉淀",
"published": "2021-09-27 16:40:43",
"source": "腾讯安全响应中心"
},
{
"title": "Web应用组件自动化发现的探索",
"link": "https://security.tencent.com/index.php/blog/msg/201",
"author": "",
"description": "另一种方式的指纹识别",
"published": "2021-09-17 19:30:59",
"source": "腾讯安全响应中心"
},
{
"title": "云原生——容器和应用安全运营实践思考",
"link": "https://security.tencent.com/index.php/blog/msg/200",
"author": "",
"description": "从安全攻击面出发,以防御视角分享我们在云原生安全运营上的一些实践和思考",
"published": "2021-09-07 18:00:59",
"source": "腾讯安全响应中心"
},
{
"title": "自动化数据分析下的威胁发现",
"link": "https://security.tencent.com/index.php/blog/msg/199",
"author": "",
"description": "企业防御之安全运营数据分析",
"published": "2021-08-16 18:41:00",
"source": "腾讯安全响应中心"
},
{
"title": "可信安全网络 —— 安全左移之DDoS对抗",
"link": "https://security.tencent.com/index.php/blog/msg/198",
"author": "",
"description": "DDoS对抗新思路",
"published": "2021-07-28 18:13:13",
"source": "腾讯安全响应中心"
},
{
"title": "攻防启示Chromium组件风险剖析与收敛",
"link": "https://security.tencent.com/index.php/blog/msg/197",
"author": "",
"description": "Chromium内核的安全问题早已悄无声息地牵动着互联网生活方方面面。基于对实战经历的复盘本文将从Chromium架构及安全机制概况入手剖析Chromium组件在多场景下给企业带来的安全风险并一探收敛方案。",
"published": "2021-07-15 10:30:58",
"source": "腾讯安全响应中心"
},
{
"title": "腾讯 SOAR 的安全运营探索",
"link": "https://security.tencent.com/index.php/blog/msg/196",
"author": "",
"description": "与业界先行者相比,我们数据面板、剧本等平台功能方面仍有一些差距,未来也会持续建设",
"published": "2021-07-09 17:55:48",
"source": "腾讯安全响应中心"
},
{
"title": "警惕!这种新型挖矿可能盯上你主机",
"link": "https://security.tencent.com/index.php/blog/msg/195",
"author": "",
"description": "除了门罗币这种不消耗CPU资源的虚拟货币可能成为黑产的新宠儿提前预知方能不乱阵脚。",
"published": "2021-07-01 20:27:10",
"source": "腾讯安全响应中心"
},
{
"title": "腾讯自研HIDS「洋葱」后台上云架构演进实践",
"link": "https://security.tencent.com/index.php/blog/msg/194",
"author": "",
"description": "云计算时代,洋葱拥抱云原生方案实践,希望能为大家系统上云提供参考。",
"published": "2021-06-17 18:16:08",
"source": "腾讯安全响应中心"
},
{
"title": "荣誉 | 美团SRC2024年终奖励荣耀揭晓",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493717&idx=1&sn=fe94bf647a29fff908cc7ed29b70554c&chksm=ec180986db6f80904efbb237256479db8ebb60e2521763cbbb272c604f641c3549211606bcc5&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "向每一位守护者致敬!",
"published": "2025-01-17 18:01:00",
"source": "微信公众号"
},
{
"title": "美团SRC邀您领取新年礼盒啦",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493717&idx=2&sn=f317d3190e4e199c933d1b29fa2f2d94&chksm=ec180986db6f809093c190d72edcad5b3b289422052597427f2eeb42ea44a93a729aff84a87c&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "获取方式见文中。",
"published": "2025-01-17 18:01:00",
"source": "微信公众号"
},
{
"title": "鸿蒙应用签名实操及机制探究",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493695&idx=1&sn=89a37bdee61841877d1acf28b8a68cbf&chksm=ec1809ecdb6f80faccbf32d3be7076832bfb6b0d443881e05d93cac96cecaad3952bdf8fba50&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "本文对鸿蒙公开资料进行了深入分析和解读,梳理了鸿蒙单框架应用的签名机制,拆解每一步的实操过程和背后的实现原理,并对源码分析整理签名的校验机制。",
"published": "2024-12-31 10:01:00",
"source": "微信公众号"
},
{
"title": "白帽世界大会 | 美团SRC期待与您在澳门相见",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493590&idx=1&sn=0281d8d3faa07d26a91b338102cb7c61&chksm=ec180605db6f8f138853b493e0e34cf24d9ccc265a72fc721fba5cfbd25c0854f757b3cd0e16&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "HackProve World 2025用真正的技术验证数字世界的安全。",
"published": "2024-12-19 17:31:00",
"source": "微信公众号"
},
{
"title": "年末冲刺2024漏洞马拉松『美团站』正式启动",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493372&idx=1&sn=f8ed6cc9dc514805d164f9d47277e8f5&chksm=ec18072fdb6f8e39c609c95ac1b0aba49aa2e9f70246d4c7af7ce82ca6d40ee9caa7fef0e362&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间即日起至2024年12月15日。",
"published": "2024-12-03 18:30:00",
"source": "微信公众号"
},
{
"title": "活动|短视频激励系统专测开启!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493353&idx=1&sn=60d8aea7934fa17d1e2077e2b879d3ae&chksm=ec18073adb6f8e2cdb2c0881302bcad6094724119dd5f6d5e0ecccc18fc1e2323067d6d00593&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间11月25日-11月28日",
"published": "2024-11-25 10:00:00",
"source": "微信公众号"
},
{
"title": "活动美团SRC七周年多重惊喜派送中",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493342&idx=1&sn=5aadfd7e004ccab04ad3286741aeca6f&chksm=ec18070ddb6f8e1b739a0a4e922e09723ce21d5d296c78c97d8c69a515bcf67f4c84e27e7972&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间11月11日10: 00-11月18日0: 00",
"published": "2024-11-11 10:08:00",
"source": "微信公众号"
},
{
"title": "活动正式开启美团SRC邀您加入双11安全保卫战",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493302&idx=1&sn=38e8eb7b46ba68d83932055efcf06386&chksm=ec180765db6f8e73f7e8e9039563065a99de826daeafcb49ee5b0231e48816907e306d43fe1c&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "美团SRC活动时间2024.09.19-09.30",
"published": "2024-09-18 19:36:05",
"source": "微信公众号"
},
{
"title": "你的中秋福利已上线美团SRC预祝各位中秋佳节愉快",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493276&idx=1&sn=02f5b0a74938d0be8764ba9658a0c98e&chksm=ec18074fdb6f8e593725883103e1ae90af22dda6af3e178d008da8c28713a6d0ba252605396e&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "兑换时间9月5日18:00起。",
"published": "2024-09-05 11:42:42",
"source": "微信公众号"
},
{
"title": "美团安全25届秋招启动心动offer等你拿",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493276&idx=2&sn=ca4080f1e1607bb22730e538f02ea6a0&chksm=ec18074fdb6f8e5920d56d573dd6c838afb76315ebd36dc1f113f5a747fdf584302ecd8faf0b&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "网申时间即日起至2024年10月31日。",
"published": "2024-09-05 11:42:42",
"source": "微信公众号"
},
{
"title": "美团安全亮相KCon 2024分享RDI技术新视角",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493266&idx=1&sn=148ab2c53446796b415384e9fd0dbaf2&chksm=ec180741db6f8e572f536ff844ca8d39d378c9d8a24b6cdbaaad31101f21175ab9637b7f578d&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "RDI技术以其高效和隐蔽的特性在恶意代码开发中占据了不可替代的地位尤其是在现代C2架构中发挥着关键作用。",
"published": "2024-09-04 10:27:03",
"source": "微信公众号"
},
{
"title": "美团安全25届秋招启动心动offer等你拿",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493248&idx=1&sn=74436f59fe2d7b203814c0aa0c91800a&chksm=ec180753db6f8e45010393fcad6b673a46c7db73b98e93dbdff667495e798104c8ec3b8345b8&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "网申时间即日起至2024年10月31日。",
"published": "2024-08-28 10:27:44",
"source": "微信公众号"
},
{
"title": "美团安全团队在第五期移动互联网APP产品安全漏洞技术沙龙中分享移动应用自动化安全实践历程",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493233&idx=1&sn=fcbc3a07cee5cf64e3c6b24925e2bd46&chksm=ec1807a2db6f8eb4f9e072ab8c517a39542fe6943b282abfc2271cd3ac558ac504c019e15748&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-08-20 14:21:24",
"source": "微信公众号"
},
{
"title": "新机会,新挑战,新可能,美团信息安全部邀你加入~",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493119&idx=1&sn=ce5d6f489f9d802e5ff5075d90c1ca17&chksm=ec18042cdb6f8d3a4e15bdc3051d92275f75a65008e0b8ce8f0a67746aa967ad5e8cdd1be831&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "欢迎向我们投递简历或推荐身边朋友投递简历!",
"published": "2024-07-29 14:37:08",
"source": "微信公众号"
},
{
"title": "活动 | 开店宝专测已开启,邀你参加!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493104&idx=1&sn=3f5514acce114a1dfeb40fbba5738023&chksm=ec180423db6f8d356d65dc19e7934dca55a1fb1c9ff7b8428f7962b13e552a13af3920ba89b0&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "活动时间6月24日—6月30日",
"published": "2024-06-24 10:06:08",
"source": "微信公众号"
},
{
"title": "美团安全团队携议题亮相CSOP大会共探网络安全高效运营之道",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493090&idx=1&sn=8b1c7315ef4ae4b2331c0f75d181825e&chksm=ec180431db6f8d27893e8aa04f4f005c2dfa6ce34ad5d62215a6ce17fe070977e33e213ec309&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "议题聚焦于SOC平台的构建历程从概念的萌芽到实践的落地再到不断的优化升级各阶段进行深入探讨。",
"published": "2024-05-17 18:54:11",
"source": "微信公众号"
},
{
"title": "招聘 | 美团安全实习生招聘正在进行中",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493059&idx=1&sn=362fa696530db9493fa8c165e6f64e6b&chksm=ec180410db6f8d06d8e74196d9ef89d31c92ce0964c8fddc638fe17e2642ff0b9806086b55e5&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "一起成长一起BETTER",
"published": "2024-05-07 17:27:47",
"source": "微信公众号"
},
{
"title": "活动 | 优选专测,提供测试账号,速来!",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493041&idx=1&sn=daf61012fec9f3aa6fd227dd1f39b828&chksm=ec180462db6f8d74fdff596bd8b60fab42607b31db7c8a820b9a1007af9036c59da29cc74151&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "4月23日至4月30日000邀你参与优选业务专测",
"published": "2024-04-23 09:56:55",
"source": "微信公众号"
},
{
"title": "特别漏洞奖励,祝你挖洞把把都超神~",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493024&idx=1&sn=c0b762ef29c35ece879f1fdb7560c710&chksm=ec180473db6f8d65ce15c48fdcd8ef0c2525421c8f95a70f6cb7f7d282ccc304faf03ac0c8a8&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-03-26 19:58:18",
"source": "微信公众号"
},
{
"title": "3倍活动戳这里",
"link": "https://mp.weixin.qq.com/s?__biz=MzI5MDc4MTM3Mg==&mid=2247493024&idx=2&sn=9ca5dd0591b7ffb8dd9cbd166d94826d&chksm=ec180473db6f8d65e4e4b185143fe292dc4aac665b4ae9e5607d14a79213d690aec68dce3daa&scene=58&subscene=0#rd",
"author": "美团技术团队",
"description": "",
"published": "2024-03-26 19:58:18",
"source": "微信公众号"
}
]

View File

@ -1,454 +1,4 @@
[ [
{
"title": "从PAGE_GUARD HOOK 到内存扫描规避",
"link": "https://xz.aliyun.com/t/17046",
"published": "2025-01-07T12:31:52+08:00",
"id": "https://xz.aliyun.com/t/17046",
"summary": {
"@type": "html",
"#text": "从PAGE_GUARD HOOK 到内存扫描规避"
}
},
{
"title": "免杀基础-硬断Hook",
"link": "https://xz.aliyun.com/t/17045",
"published": "2025-01-07T12:31:25+08:00",
"id": "https://xz.aliyun.com/t/17045",
"summary": {
"@type": "html",
"#text": "免杀基础-硬断Hook"
}
},
{
"title": "记一次题型VM-软件系统安全赛-pwn-<vm>",
"link": "https://xz.aliyun.com/t/17043",
"published": "2025-01-07T01:21:16+08:00",
"id": "https://xz.aliyun.com/t/17043",
"summary": {
"@type": "html",
"#text": "记一次题型VM-软件系统安全赛-pwn-<vm>"
}
},
{
"title": "aws之创建后门实现持久化利用的方式",
"link": "https://xz.aliyun.com/t/17040",
"published": "2025-01-06T17:14:00+08:00",
"id": "https://xz.aliyun.com/t/17040",
"summary": {
"@type": "html",
"#text": "aws之创建后门实现持久化利用的方式"
}
},
{
"title": "Sharp4Rundll32一款通过.NET反射实现Rundll32功能绕过安全防护的工具",
"link": "https://xz.aliyun.com/t/17038",
"published": "2025-01-06T15:54:34+08:00",
"id": "https://xz.aliyun.com/t/17038",
"summary": {
"@type": "html",
"#text": "Sharp4Rundll32一款通过.NET反射实现Rundll32功能绕过安全防护的工具"
}
},
{
"title": "软件系统安全赛CachedVisitor详解——记一次对Redis+ssrf的详细分析",
"link": "https://xz.aliyun.com/t/17036",
"published": "2025-01-06T12:07:06+08:00",
"id": "https://xz.aliyun.com/t/17036",
"summary": {
"@type": "html",
"#text": "软件系统安全赛CachedVisitor详解——记一次对Redis+ssrf的详细分析"
}
},
{
"title": "Lua项目下SSRF利用Redis文件覆盖lua回显RCE",
"link": "https://xz.aliyun.com/t/17034",
"published": "2025-01-06T10:05:25+08:00",
"id": "https://xz.aliyun.com/t/17034",
"summary": {
"@type": "html",
"#text": "Lua项目下SSRF利用Redis文件覆盖lua回显RCE"
}
},
{
"title": "MaxKB远程命令执行漏洞分析(CVE-2024-56137)",
"link": "https://xz.aliyun.com/t/17031",
"published": "2025-01-05T22:37:00+08:00",
"id": "https://xz.aliyun.com/t/17031",
"summary": {
"@type": "html",
"#text": "MaxKB远程命令执行漏洞分析(CVE-2024-56137)"
}
},
{
"title": "codeql 之 SSRF 漏洞自动化 寻找",
"link": "https://xz.aliyun.com/t/17030",
"published": "2025-01-05T21:18:11+08:00",
"id": "https://xz.aliyun.com/t/17030",
"summary": {
"@type": "html",
"#text": "codeql 之 SSRF 漏洞自动化 寻找"
}
},
{
"title": "使用分支对抗进行webshell bypass",
"link": "https://xz.aliyun.com/t/17029",
"published": "2025-01-05T18:33:40+08:00",
"id": "https://xz.aliyun.com/t/17029",
"summary": {
"@type": "html",
"#text": "使用分支对抗进行webshell bypass"
}
},
{
"title": "Solon内存马构造",
"link": "https://xz.aliyun.com/t/17028",
"published": "2025-01-05T17:36:22+08:00",
"id": "https://xz.aliyun.com/t/17028",
"summary": {
"@type": "html",
"#text": "Solon内存马构造"
}
},
{
"title": "强网杯RS加密签名伪造及PyramidWeb利用栈帧打内存马",
"link": "https://xz.aliyun.com/t/17027",
"published": "2025-01-05T17:12:56+08:00",
"id": "https://xz.aliyun.com/t/17027",
"summary": {
"@type": "html",
"#text": "强网杯RS加密签名伪造及PyramidWeb利用栈帧打内存马"
}
},
{
"title": "XXE 在文件上传当中的应用",
"link": "https://xz.aliyun.com/t/17026",
"published": "2025-01-05T17:10:20+08:00",
"id": "https://xz.aliyun.com/t/17026",
"summary": {
"@type": "html",
"#text": "XXE 在文件上传当中的应用"
}
},
{
"title": "php木马的混淆免杀探究",
"link": "https://xz.aliyun.com/t/17023",
"published": "2025-01-05T13:29:00+08:00",
"id": "https://xz.aliyun.com/t/17023",
"summary": {
"@type": "html",
"#text": "php木马的混淆免杀探究"
}
},
{
"title": "ctf中的字节爆破",
"link": "https://xz.aliyun.com/t/17022",
"published": "2025-01-04T19:37:51+08:00",
"id": "https://xz.aliyun.com/t/17022",
"summary": {
"@type": "html",
"#text": "ctf中的字节爆破"
}
},
{
"title": "Thinkphp6高版本反序列化toString新链调试挖掘",
"link": "https://xz.aliyun.com/t/17019",
"published": "2025-01-04T13:17:14+08:00",
"id": "https://xz.aliyun.com/t/17019",
"summary": {
"@type": "html",
"#text": "Thinkphp6高版本反序列化toString新链调试挖掘"
}
},
{
"title": "探究Pker对opcode字节码的利用",
"link": "https://xz.aliyun.com/t/17018",
"published": "2025-01-04T11:11:08+08:00",
"id": "https://xz.aliyun.com/t/17018",
"summary": {
"@type": "html",
"#text": "探究Pker对opcode字节码的利用"
}
},
{
"title": "Yaml反序列化name标签打响应头回显",
"link": "https://xz.aliyun.com/t/17017",
"published": "2025-01-04T01:27:15+08:00",
"id": "https://xz.aliyun.com/t/17017",
"summary": {
"@type": "html",
"#text": "Yaml反序列化name标签打响应头回显"
}
},
{
"title": "Pickle反序列化中的字节码重写绕过",
"link": "https://xz.aliyun.com/t/17016",
"published": "2025-01-03T23:50:09+08:00",
"id": "https://xz.aliyun.com/t/17016",
"summary": {
"@type": "html",
"#text": "Pickle反序列化中的字节码重写绕过"
}
},
{
"title": "【Reverse-Crypto】深入逆向-密码篇-MD5算法详解以及代码编写",
"link": "https://xz.aliyun.com/t/17014",
"published": "2025-01-03T21:40:27+08:00",
"id": "https://xz.aliyun.com/t/17014",
"summary": {
"@type": "html",
"#text": "【Reverse-Crypto】深入逆向-密码篇-MD5算法详解以及代码编写"
}
},
{
"title": "ORW侧信道时间盲注",
"link": "https://xz.aliyun.com/t/17011",
"published": "2025-01-03T21:22:32+08:00",
"id": "https://xz.aliyun.com/t/17011",
"summary": {
"@type": "html",
"#text": "ORW侧信道时间盲注"
}
},
{
"title": "AWDPWN流程与技巧总结",
"link": "https://xz.aliyun.com/t/17010",
"published": "2025-01-03T21:17:32+08:00",
"id": "https://xz.aliyun.com/t/17010",
"summary": {
"@type": "html",
"#text": "AWDPWN流程与技巧总结"
}
},
{
"title": "信呼 OA 最新 sql 注入分析",
"link": "https://xz.aliyun.com/t/17007",
"published": "2025-01-03T16:54:52+08:00",
"id": "https://xz.aliyun.com/t/17007",
"summary": {
"@type": "html",
"#text": "信呼 OA 最新 sql 注入分析"
}
},
{
"title": "某小说vip破解代码分析",
"link": "https://xz.aliyun.com/t/17006",
"published": "2025-01-03T16:01:37+08:00",
"id": "https://xz.aliyun.com/t/17006",
"summary": {
"@type": "html",
"#text": "某小说vip破解代码分析"
}
},
{
"title": "Hoverfly 任意文件读取漏洞分析",
"link": "https://xz.aliyun.com/t/17004",
"published": "2025-01-03T15:39:34+08:00",
"id": "https://xz.aliyun.com/t/17004",
"summary": {
"@type": "html",
"#text": "Hoverfly 任意文件读取漏洞分析"
}
},
{
"title": "Sekiro+Yakit 热加载无痛绕sign",
"link": "https://xz.aliyun.com/t/17003",
"published": "2025-01-03T15:09:34+08:00",
"id": "https://xz.aliyun.com/t/17003",
"summary": {
"@type": "html",
"#text": "Sekiro+Yakit 热加载无痛绕sign"
}
},
{
"title": "cJSON库函数存在的堆溢出漏洞分析",
"link": "https://xz.aliyun.com/t/16999",
"published": "2025-01-02T20:58:51+08:00",
"id": "https://xz.aliyun.com/t/16999",
"summary": {
"@type": "html",
"#text": "cJSON库函数存在的堆溢出漏洞分析"
}
},
{
"title": "WP-0ops2024-pwn-<IP Management System>",
"link": "https://xz.aliyun.com/t/16998",
"published": "2025-01-02T18:50:18+08:00",
"id": "https://xz.aliyun.com/t/16998",
"summary": {
"@type": "html",
"#text": "WP-0ops2024-pwn-<IP Management System>"
}
},
{
"title": "Linux渗透实战之Hackademic: RTB1靶场提权",
"link": "https://xz.aliyun.com/t/16995",
"published": "2025-01-02T15:22:06+08:00",
"id": "https://xz.aliyun.com/t/16995",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之Hackademic: RTB1靶场提权"
}
},
{
"title": "Sharp4UACPASS一款通过调用CMSTP进程绕过UAC的工具",
"link": "https://xz.aliyun.com/t/16994",
"published": "2025-01-02T15:12:05+08:00",
"id": "https://xz.aliyun.com/t/16994",
"summary": {
"@type": "html",
"#text": "Sharp4UACPASS一款通过调用CMSTP进程绕过UAC的工具"
}
},
{
"title": "传统Office结构下的后门和利用手段解析",
"link": "https://xz.aliyun.com/t/16993",
"published": "2025-01-02T14:54:47+08:00",
"id": "https://xz.aliyun.com/t/16993",
"summary": {
"@type": "html",
"#text": "传统Office结构下的后门和利用手段解析"
}
},
{
"title": "蚁景网安实验室-双层内网渗透虚拟仿真实战",
"link": "https://xz.aliyun.com/t/16992",
"published": "2025-01-02T14:51:14+08:00",
"id": "https://xz.aliyun.com/t/16992",
"summary": {
"@type": "html",
"#text": "蚁景网安实验室-双层内网渗透虚拟仿真实战"
}
},
{
"title": "春秋云镜—专业徽章—Initial",
"link": "https://xz.aliyun.com/t/16991",
"published": "2025-01-02T14:43:00+08:00",
"id": "https://xz.aliyun.com/t/16991",
"summary": {
"@type": "html",
"#text": "春秋云镜—专业徽章—Initial"
}
},
{
"title": "JAVA代码审计-StudentManager",
"link": "https://xz.aliyun.com/t/16990",
"published": "2025-01-02T11:32:05+08:00",
"id": "https://xz.aliyun.com/t/16990",
"summary": {
"@type": "html",
"#text": "JAVA代码审计-StudentManager"
}
},
{
"title": "伪装成Chrome安装程序传播银狐最新变种",
"link": "https://xz.aliyun.com/t/16989",
"published": "2025-01-02T07:46:43+08:00",
"id": "https://xz.aliyun.com/t/16989",
"summary": {
"@type": "html",
"#text": "伪装成Chrome安装程序传播银狐最新变种"
}
},
{
"title": "绕过App某加密企业版加固Frida检测",
"link": "https://xz.aliyun.com/t/16988",
"published": "2025-01-01T23:59:38+08:00",
"id": "https://xz.aliyun.com/t/16988",
"summary": {
"@type": "html",
"#text": "绕过App某加密企业版加固Frida检测"
}
},
{
"title": "无限安全靶场-月挑战靶场1",
"link": "https://xz.aliyun.com/t/16984",
"published": "2025-01-01T22:30:52+08:00",
"id": "https://xz.aliyun.com/t/16984",
"summary": {
"@type": "html",
"#text": "无限安全靶场-月挑战靶场1"
}
},
{
"title": "shiro codeql分析理解附带完整ql代码",
"link": "https://xz.aliyun.com/t/16983",
"published": "2025-01-01T20:07:25+08:00",
"id": "https://xz.aliyun.com/t/16983",
"summary": {
"@type": "html",
"#text": "shiro codeql分析理解附带完整ql代码"
}
},
{
"title": "前端加密对抗常见场景突破",
"link": "https://xz.aliyun.com/t/16981",
"published": "2025-01-01T17:09:23+08:00",
"id": "https://xz.aliyun.com/t/16981",
"summary": {
"@type": "html",
"#text": "前端加密对抗常见场景突破"
}
},
{
"title": "BurpSuite插件OneScan - 递归目录扫描插件",
"link": "https://xz.aliyun.com/t/16980",
"published": "2025-01-01T12:22:35+08:00",
"id": "https://xz.aliyun.com/t/16980",
"summary": {
"@type": "html",
"#text": "BurpSuite插件OneScan - 递归目录扫描插件"
}
},
{
"title": "CVE-2024-13025-Codezips 大学管理系统 faculty.php sql 注入分析及拓展",
"link": "https://xz.aliyun.com/t/16979",
"published": "2025-01-01T07:22:48+08:00",
"id": "https://xz.aliyun.com/t/16979",
"summary": {
"@type": "html",
"#text": "CVE-2024-13025-Codezips 大学管理系统 faculty.php sql 注入分析及拓展"
}
},
{
"title": "第二届CN-fnst::CTF WriteUp(web,misc,crypto,osint,pwn)",
"link": "https://xz.aliyun.com/t/16978",
"published": "2024-12-31T23:28:53+08:00",
"id": "https://xz.aliyun.com/t/16978",
"summary": {
"@type": "html",
"#text": "第二届CN-fnst::CTF WriteUp(web,misc,crypto,osint,pwn)"
}
},
{
"title": "禅道CMS开源版SQL注入漏洞分析",
"link": "https://xz.aliyun.com/t/16976",
"published": "2024-12-31T21:12:31+08:00",
"id": "https://xz.aliyun.com/t/16976",
"summary": {
"@type": "html",
"#text": "禅道CMS开源版SQL注入漏洞分析"
}
},
{
"title": "2024ImaginaryCTF 12月练习赛——部分Crypto题解分享",
"link": "https://xz.aliyun.com/t/16975",
"published": "2024-12-31T18:14:07+08:00",
"id": "https://xz.aliyun.com/t/16975",
"summary": {
"@type": "html",
"#text": "2024ImaginaryCTF 12月练习赛——部分Crypto题解分享"
}
},
{
"title": "JAVA代码审计-某报表平台",
"link": "https://xz.aliyun.com/t/16974",
"published": "2024-12-31T17:15:00+08:00",
"id": "https://xz.aliyun.com/t/16974",
"summary": {
"@type": "html",
"#text": "JAVA代码审计-某报表平台"
}
},
{ {
"title": "记一次渗透测试实战之Sea", "title": "记一次渗透测试实战之Sea",
"link": "https://xz.aliyun.com/t/16972", "link": "https://xz.aliyun.com/t/16972",
@ -998,5 +548,455 @@
"@type": "html", "@type": "html",
"#text": "企业上云的新攻击面分析" "#text": "企业上云的新攻击面分析"
} }
},
{
"title": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集",
"link": "https://xz.aliyun.com/t/16886",
"published": "2024-12-23T17:29:43+08:00",
"id": "https://xz.aliyun.com/t/16886",
"summary": {
"@type": "html",
"#text": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集"
}
},
{
"title": "ECH新时代的域前置",
"link": "https://xz.aliyun.com/t/16884",
"published": "2024-12-23T16:17:20+08:00",
"id": "https://xz.aliyun.com/t/16884",
"summary": {
"@type": "html",
"#text": "ECH新时代的域前置"
}
},
{
"title": "CSS Injection 从入门到精通",
"link": "https://xz.aliyun.com/t/16879",
"published": "2024-12-22T22:06:24+08:00",
"id": "https://xz.aliyun.com/t/16879",
"summary": {
"@type": "html",
"#text": "CSS Injection 从入门到精通"
}
},
{
"title": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解",
"link": "https://xz.aliyun.com/t/16878",
"published": "2024-12-22T20:46:30+08:00",
"id": "https://xz.aliyun.com/t/16878",
"summary": {
"@type": "html",
"#text": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解"
}
},
{
"title": "LitCTF2024--Crypto-wp",
"link": "https://xz.aliyun.com/t/16875",
"published": "2024-12-22T16:19:45+08:00",
"id": "https://xz.aliyun.com/t/16875",
"summary": {
"@type": "html",
"#text": "LitCTF2024--Crypto-wp"
}
},
{
"title": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)",
"link": "https://xz.aliyun.com/t/16874",
"published": "2024-12-22T16:15:09+08:00",
"id": "https://xz.aliyun.com/t/16874",
"summary": {
"@type": "html",
"#text": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)"
}
},
{
"title": "Linux渗透实战之HTB-Heal",
"link": "https://xz.aliyun.com/t/16873",
"published": "2024-12-22T15:13:56+08:00",
"id": "https://xz.aliyun.com/t/16873",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之HTB-Heal"
}
},
{
"title": "春秋云境-多维挑战-CloudNet-WP",
"link": "https://xz.aliyun.com/t/16872",
"published": "2024-12-22T03:40:12+08:00",
"id": "https://xz.aliyun.com/t/16872",
"summary": {
"@type": "html",
"#text": "春秋云境-多维挑战-CloudNet-WP"
}
},
{
"title": "另辟蹊径的bypass方式",
"link": "https://xz.aliyun.com/t/16871",
"published": "2024-12-22T00:16:30+08:00",
"id": "https://xz.aliyun.com/t/16871",
"summary": {
"@type": "html",
"#text": "另辟蹊径的bypass方式"
}
},
{
"title": "国城杯线下web出题思路分享",
"link": "https://xz.aliyun.com/t/16870",
"published": "2024-12-21T23:05:12+08:00",
"id": "https://xz.aliyun.com/t/16870",
"summary": {
"@type": "html",
"#text": "国城杯线下web出题思路分享"
}
},
{
"title": "国城杯线下决赛master_ast题解",
"link": "https://xz.aliyun.com/t/16869",
"published": "2024-12-21T21:44:07+08:00",
"id": "https://xz.aliyun.com/t/16869",
"summary": {
"@type": "html",
"#text": "国城杯线下决赛master_ast题解"
}
},
{
"title": "暴力通关PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解",
"link": "https://xz.aliyun.com/t/16867",
"published": "2024-12-21T20:50:08+08:00",
"id": "https://xz.aliyun.com/t/16867",
"summary": {
"@type": "html",
"#text": "暴力通关PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解"
}
},
{
"title": "DASCTF 2024最后一战寒夜破晓冬至终章(部分wp)",
"link": "https://xz.aliyun.com/t/16866",
"published": "2024-12-21T20:16:12+08:00",
"id": "https://xz.aliyun.com/t/16866",
"summary": {
"@type": "html",
"#text": "DASCTF 2024最后一战寒夜破晓冬至终章(部分wp)"
}
},
{
"title": "2024 DASCTF const_python详解",
"link": "https://xz.aliyun.com/t/16864",
"published": "2024-12-21T19:51:16+08:00",
"id": "https://xz.aliyun.com/t/16864",
"summary": {
"@type": "html",
"#text": "2024 DASCTF const_python详解"
}
},
{
"title": "Zeropz-楚慧杯L组WP",
"link": "https://xz.aliyun.com/t/16863",
"published": "2024-12-21T19:44:53+08:00",
"id": "https://xz.aliyun.com/t/16863",
"summary": {
"@type": "html",
"#text": "Zeropz-楚慧杯L组WP"
}
},
{
"title": "Dirty Pagetable 学习 & 例题",
"link": "https://xz.aliyun.com/t/16862",
"published": "2024-12-21T19:23:38+08:00",
"id": "https://xz.aliyun.com/t/16862",
"summary": {
"@type": "html",
"#text": "Dirty Pagetable 学习 & 例题"
}
},
{
"title": "针对单一系统渗透测试",
"link": "https://xz.aliyun.com/t/16861",
"published": "2024-12-21T19:21:15+08:00",
"id": "https://xz.aliyun.com/t/16861",
"summary": {
"@type": "html",
"#text": "针对单一系统渗透测试"
}
},
{
"title": "Cross cache Attack技术细节分析",
"link": "https://xz.aliyun.com/t/16860",
"published": "2024-12-21T19:19:11+08:00",
"id": "https://xz.aliyun.com/t/16860",
"summary": {
"@type": "html",
"#text": "Cross cache Attack技术细节分析"
}
},
{
"title": "某某语音auth值生成分析",
"link": "https://xz.aliyun.com/t/16859",
"published": "2024-12-21T17:59:50+08:00",
"id": "https://xz.aliyun.com/t/16859",
"summary": {
"@type": "html",
"#text": "某某语音auth值生成分析"
}
},
{
"title": "蓝队—反钓鱼的策略提供",
"link": "https://xz.aliyun.com/t/16858",
"published": "2024-12-21T17:12:06+08:00",
"id": "https://xz.aliyun.com/t/16858",
"summary": {
"@type": "html",
"#text": "蓝队—反钓鱼的策略提供"
}
},
{
"title": "windows内核进程遍历常见方式",
"link": "https://xz.aliyun.com/t/16857",
"published": "2024-12-21T16:38:04+08:00",
"id": "https://xz.aliyun.com/t/16857",
"summary": {
"@type": "html",
"#text": "windows内核进程遍历常见方式"
}
},
{
"title": "ez_zhuawa出题记录",
"link": "https://xz.aliyun.com/t/16856",
"published": "2024-12-21T15:44:09+08:00",
"id": "https://xz.aliyun.com/t/16856",
"summary": {
"@type": "html",
"#text": "ez_zhuawa出题记录"
}
},
{
"title": "Windows内核回调",
"link": "https://xz.aliyun.com/t/16855",
"published": "2024-12-21T15:17:48+08:00",
"id": "https://xz.aliyun.com/t/16855",
"summary": {
"@type": "html",
"#text": "Windows内核回调"
}
},
{
"title": "Linux渗透实战之不一样的XSS",
"link": "https://xz.aliyun.com/t/16853",
"published": "2024-12-21T10:53:08+08:00",
"id": "https://xz.aliyun.com/t/16853",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之不一样的XSS"
}
},
{
"title": "基于优化的大模型越狱技术分析与实战",
"link": "https://xz.aliyun.com/t/16852",
"published": "2024-12-20T21:17:55+08:00",
"id": "https://xz.aliyun.com/t/16852",
"summary": {
"@type": "html",
"#text": "基于优化的大模型越狱技术分析与实战"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE",
"link": "https://xz.aliyun.com/t/16850",
"published": "2024-12-20T18:55:42+08:00",
"id": "https://xz.aliyun.com/t/16850",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解",
"link": "https://xz.aliyun.com/t/16849",
"published": "2024-12-20T17:24:00+08:00",
"id": "https://xz.aliyun.com/t/16849",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解"
}
},
{
"title": "代码审计-某物联网系统RCE",
"link": "https://xz.aliyun.com/t/16848",
"published": "2024-12-20T17:19:40+08:00",
"id": "https://xz.aliyun.com/t/16848",
"summary": {
"@type": "html",
"#text": "代码审计-某物联网系统RCE"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP",
"link": "https://xz.aliyun.com/t/16847",
"published": "2024-12-20T17:10:07+08:00",
"id": "https://xz.aliyun.com/t/16847",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP"
}
},
{
"title": "某系统审计权限绕过-CVE-2024-9554",
"link": "https://xz.aliyun.com/t/16845",
"published": "2024-12-20T16:53:05+08:00",
"id": "https://xz.aliyun.com/t/16845",
"summary": {
"@type": "html",
"#text": "某系统审计权限绕过-CVE-2024-9554"
}
},
{
"title": "某系统代码审计到getshell",
"link": "https://xz.aliyun.com/t/16841",
"published": "2024-12-20T16:08:09+08:00",
"id": "https://xz.aliyun.com/t/16841",
"summary": {
"@type": "html",
"#text": "某系统代码审计到getshell"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto",
"link": "https://xz.aliyun.com/t/16846",
"published": "2024-12-20T14:30:16+08:00",
"id": "https://xz.aliyun.com/t/16846",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto"
}
},
{
"title": "银狐黑产组织最新免杀样本详细分析",
"link": "https://xz.aliyun.com/t/16837",
"published": "2024-12-20T08:17:20+08:00",
"id": "https://xz.aliyun.com/t/16837",
"summary": {
"@type": "html",
"#text": "银狐黑产组织最新免杀样本详细分析"
}
},
{
"title": "初识AFL工具安装与基本用法",
"link": "https://xz.aliyun.com/t/16836",
"published": "2024-12-20T03:07:30+08:00",
"id": "https://xz.aliyun.com/t/16836",
"summary": {
"@type": "html",
"#text": "初识AFL工具安装与基本用法"
}
},
{
"title": "某渗透中代码审计到内网遨游",
"link": "https://xz.aliyun.com/t/16835",
"published": "2024-12-19T21:53:53+08:00",
"id": "https://xz.aliyun.com/t/16835",
"summary": {
"@type": "html",
"#text": "某渗透中代码审计到内网遨游"
}
},
{
"title": "Pointer Overflow CTF - 2024 Web全write up",
"link": "https://xz.aliyun.com/t/16834",
"published": "2024-12-19T20:58:58+08:00",
"id": "https://xz.aliyun.com/t/16834",
"summary": {
"@type": "html",
"#text": "Pointer Overflow CTF - 2024 Web全write up"
}
},
{
"title": "浅析实战攻防中的信息收集",
"link": "https://xz.aliyun.com/t/16832",
"published": "2024-12-19T16:32:00+08:00",
"id": "https://xz.aliyun.com/t/16832",
"summary": {
"@type": "html",
"#text": "浅析实战攻防中的信息收集"
}
},
{
"title": "Spring FatJar写文件到RCE分析",
"link": "https://xz.aliyun.com/t/16831",
"published": "2024-12-19T16:04:00+08:00",
"id": "https://xz.aliyun.com/t/16831",
"summary": {
"@type": "html",
"#text": "Spring FatJar写文件到RCE分析"
}
},
{
"title": "应急响应记录之水坑挂马事件分析与恢复",
"link": "https://xz.aliyun.com/t/16829",
"published": "2024-12-19T14:27:41+08:00",
"id": "https://xz.aliyun.com/t/16829",
"summary": {
"@type": "html",
"#text": "应急响应记录之水坑挂马事件分析与恢复"
}
},
{
"title": "万字长文窥探信息收集真正的艺术",
"link": "https://xz.aliyun.com/t/16828",
"published": "2024-12-19T13:57:53+08:00",
"id": "https://xz.aliyun.com/t/16828",
"summary": {
"@type": "html",
"#text": "万字长文窥探信息收集真正的艺术"
}
},
{
"title": "记一次5000万资产的渗透测试",
"link": "https://xz.aliyun.com/t/16827",
"published": "2024-12-19T12:34:52+08:00",
"id": "https://xz.aliyun.com/t/16827",
"summary": {
"@type": "html",
"#text": "记一次5000万资产的渗透测试"
}
},
{
"title": "一次 house of force 练习HTB pwn - Fancy names",
"link": "https://xz.aliyun.com/t/16825",
"published": "2024-12-19T11:41:53+08:00",
"id": "https://xz.aliyun.com/t/16825",
"summary": {
"@type": "html",
"#text": "一次 house of force 练习HTB pwn - Fancy names"
}
},
{
"title": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞",
"link": "https://xz.aliyun.com/t/16824",
"published": "2024-12-19T11:13:41+08:00",
"id": "https://xz.aliyun.com/t/16824",
"summary": {
"@type": "html",
"#text": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞"
}
},
{
"title": "面向GPTs的提示词注入攻击分析",
"link": "https://xz.aliyun.com/t/16816",
"published": "2024-12-18T23:23:30+08:00",
"id": "https://xz.aliyun.com/t/16816",
"summary": {
"@type": "html",
"#text": "面向GPTs的提示词注入攻击分析"
}
},
{
"title": "PE文件代码注入",
"link": "https://xz.aliyun.com/t/16815",
"published": "2024-12-18T23:11:47+08:00",
"id": "https://xz.aliyun.com/t/16815",
"summary": {
"@type": "html",
"#text": "PE文件代码注入"
}
} }
] ]

BIN
resources/db/4hou.db Normal file

Binary file not shown.

BIN
resources/db/anquanke.db Normal file

Binary file not shown.

BIN
resources/db/doonsec.db Normal file

Binary file not shown.

BIN
resources/db/freebuf.db Normal file

Binary file not shown.

BIN
resources/db/github.db Normal file

Binary file not shown.

BIN
resources/db/qianxin.db Normal file

Binary file not shown.

BIN
resources/db/seebug.db Normal file

Binary file not shown.

BIN
resources/db/sougou-wx.db Normal file

Binary file not shown.

BIN
resources/db/xianzhi.db Normal file

Binary file not shown.

View File

@ -0,0 +1,25 @@
#### 大佬 su18 上传了一个新工具:[woodpecker-plugin-template](https://github.com/su18/woodpecker-plugin-template)
**项目描述**woodpecker-plugin-template
**上传时间**2024-12-13 08:47:27
----------
#### 大佬 su18 上传了一个新工具:[closure-compiler](https://github.com/su18/closure-compiler)
**项目描述**A JavaScript checker and optimizer.
**上传时间**2024-12-08 05:13:17
----------
#### 大佬 projectdiscovery 上传了一个新工具:[nuclei-templates-ai](https://github.com/projectdiscovery/nuclei-templates-ai)
**项目描述**Repository of AI-generated Nuclei templates for public CVEs not yet covered by existing templates, enhancing detection speed and coverage 👾
**上传时间**2024-12-04 01:46:51
----------
#### 大佬 projectdiscovery 上传了一个新工具:[nuclei-templates-test](https://github.com/projectdiscovery/nuclei-templates-test)
**项目描述**Nuclei Templates test
**上传时间**2024-11-18 10:30:37
----------
#### 大佬 su18 上传了一个新工具:[CVE-2022-25845-In-Spring](https://github.com/su18/CVE-2022-25845-In-Spring)
**项目描述**CVE-2022-25845(fastjson1.2.80) exploit in Spring Env!
**上传时间**2024-11-08 08:24:12
----------

View File

@ -0,0 +1,594 @@
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
**作者**:教父爱分享
**上传时间**2025-01-05 23:19:42
**简介**None
----------------------------------------
#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0)
**作者**:暴暴的皮卡丘
**上传时间**2025-01-05 22:44:13
**简介**None
----------------------------------------
#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839)
**作者**:安全初心
**上传时间**2025-01-05 22:32:13
**简介**None
----------------------------------------
#### 文章:[Windows 曝9.8分漏洞已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6)
**作者**:商密君
**上传时间**2025-01-05 19:15:38
**简介**None
----------------------------------------
#### 文章:[通过模拟功能实现提权Bugcrowd](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608)
**作者**:玲珑安全
**上传时间**2025-01-05 18:55:21
**简介**None
----------------------------------------
#### 文章:[通过模拟功能实现提权Bugcrowd](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768)
**作者**:芳华绝代安全团队
**上传时间**2025-01-05 18:53:58
**简介**None
----------------------------------------
#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770)
**作者**securitainment
**上传时间**2025-01-04 23:04:05
**简介**None
----------------------------------------
#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5)
**作者**:冲鸭安全
**上传时间**2025-01-04 10:00:36
**简介**None
----------------------------------------
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Apache MINA存在反序列化漏洞攻击者可通过向受影响的应用程序发送特制的恶意序列化数据利用不安全的反序列化过程触发该漏洞从而可能导致远程代码执行。
----------------------------------------
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞读取服务器任意文件从而获取服务器大量敏感信息。
----------------------------------------
#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Metasploit Framework是一款开源安全漏洞检测工具。
----------------------------------------
#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9)
**作者**:技术修道场
**上传时间**2025-01-04 08:00:17
**简介**:安全紧急关注!据 VulnCheck 最新披露知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞CVE-2024-12856目前正遭受黑客大规模攻击更危险的是利用该漏洞竟只需默认密码
----------------------------------------
#### 文章:[【oscp】Tr0ll 靶机全系列1-3FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74)
**作者**泷羽Sec
**上传时间**2025-01-04 07:44:56
**简介**None
----------------------------------------
#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8)
**作者**:安全狗的自我修养
**上传时间**2025-01-04 07:09:11
**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构
----------------------------------------
#### 文章:[无文件恶意软件 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822)
**作者**:河南等级保护测评
**上传时间**2025-01-04 07:05:19
**简介**None
----------------------------------------
#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621)
**作者**:七芒星实验室
**上传时间**2025-01-04 07:00:24
**简介**None
----------------------------------------
#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182)
**作者**:船山信安
**上传时间**2025-01-04 02:01:04
**简介**None
----------------------------------------
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
**作者**OneMoreThink
**上传时间**2025-01-04 01:17:57
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
----------------------------------------
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
**作者**:教父爱分享
**上传时间**2025-01-05 23:19:42
**简介**None
----------------------------------------
#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0)
**作者**:暴暴的皮卡丘
**上传时间**2025-01-05 22:44:13
**简介**None
----------------------------------------
#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839)
**作者**:安全初心
**上传时间**2025-01-05 22:32:13
**简介**None
----------------------------------------
#### 文章:[Windows 曝9.8分漏洞已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6)
**作者**:商密君
**上传时间**2025-01-05 19:15:38
**简介**None
----------------------------------------
#### 文章:[通过模拟功能实现提权Bugcrowd](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608)
**作者**:玲珑安全
**上传时间**2025-01-05 18:55:21
**简介**None
----------------------------------------
#### 文章:[通过模拟功能实现提权Bugcrowd](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768)
**作者**:芳华绝代安全团队
**上传时间**2025-01-05 18:53:58
**简介**None
----------------------------------------
#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770)
**作者**securitainment
**上传时间**2025-01-04 23:04:05
**简介**None
----------------------------------------
#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5)
**作者**:冲鸭安全
**上传时间**2025-01-04 10:00:36
**简介**None
----------------------------------------
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Apache MINA存在反序列化漏洞攻击者可通过向受影响的应用程序发送特制的恶意序列化数据利用不安全的反序列化过程触发该漏洞从而可能导致远程代码执行。
----------------------------------------
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞读取服务器任意文件从而获取服务器大量敏感信息。
----------------------------------------
#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Metasploit Framework是一款开源安全漏洞检测工具。
----------------------------------------
#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9)
**作者**:技术修道场
**上传时间**2025-01-04 08:00:17
**简介**:安全紧急关注!据 VulnCheck 最新披露知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞CVE-2024-12856目前正遭受黑客大规模攻击更危险的是利用该漏洞竟只需默认密码
----------------------------------------
#### 文章:[【oscp】Tr0ll 靶机全系列1-3FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74)
**作者**泷羽Sec
**上传时间**2025-01-04 07:44:56
**简介**None
----------------------------------------
#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8)
**作者**:安全狗的自我修养
**上传时间**2025-01-04 07:09:11
**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构
----------------------------------------
#### 文章:[无文件恶意软件 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822)
**作者**:河南等级保护测评
**上传时间**2025-01-04 07:05:19
**简介**None
----------------------------------------
#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621)
**作者**:七芒星实验室
**上传时间**2025-01-04 07:00:24
**简介**None
----------------------------------------
#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182)
**作者**:船山信安
**上传时间**2025-01-04 02:01:04
**简介**None
----------------------------------------
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
**作者**OneMoreThink
**上传时间**2025-01-04 01:17:57
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
----------------------------------------
#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8)
**作者**:网络研究观
**上传时间**2025-01-04 00:30:41
**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。
----------------------------------------
#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50)
**作者**:网络研究观
**上传时间**2025-01-04 00:30:41
**简介**None
----------------------------------------
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
**作者**:教父爱分享
**上传时间**2025-01-05 23:19:42
**简介**None
----------------------------------------
#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0)
**作者**:暴暴的皮卡丘
**上传时间**2025-01-05 22:44:13
**简介**None
----------------------------------------
#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839)
**作者**:安全初心
**上传时间**2025-01-05 22:32:13
**简介**None
----------------------------------------
#### 文章:[Windows 曝9.8分漏洞已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6)
**作者**:商密君
**上传时间**2025-01-05 19:15:38
**简介**None
----------------------------------------
#### 文章:[通过模拟功能实现提权Bugcrowd](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608)
**作者**:玲珑安全
**上传时间**2025-01-05 18:55:21
**简介**None
----------------------------------------
#### 文章:[通过模拟功能实现提权Bugcrowd](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768)
**作者**:芳华绝代安全团队
**上传时间**2025-01-05 18:53:58
**简介**None
----------------------------------------
#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770)
**作者**securitainment
**上传时间**2025-01-04 23:04:05
**简介**None
----------------------------------------
#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5)
**作者**:冲鸭安全
**上传时间**2025-01-04 10:00:36
**简介**None
----------------------------------------
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Apache MINA存在反序列化漏洞攻击者可通过向受影响的应用程序发送特制的恶意序列化数据利用不安全的反序列化过程触发该漏洞从而可能导致远程代码执行。
----------------------------------------
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞读取服务器任意文件从而获取服务器大量敏感信息。
----------------------------------------
#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Metasploit Framework是一款开源安全漏洞检测工具。
----------------------------------------
#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9)
**作者**:技术修道场
**上传时间**2025-01-04 08:00:17
**简介**:安全紧急关注!据 VulnCheck 最新披露知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞CVE-2024-12856目前正遭受黑客大规模攻击更危险的是利用该漏洞竟只需默认密码
----------------------------------------
#### 文章:[【oscp】Tr0ll 靶机全系列1-3FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74)
**作者**泷羽Sec
**上传时间**2025-01-04 07:44:56
**简介**None
----------------------------------------
#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8)
**作者**:安全狗的自我修养
**上传时间**2025-01-04 07:09:11
**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构
----------------------------------------
#### 文章:[无文件恶意软件 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822)
**作者**:河南等级保护测评
**上传时间**2025-01-04 07:05:19
**简介**None
----------------------------------------
#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621)
**作者**:七芒星实验室
**上传时间**2025-01-04 07:00:24
**简介**None
----------------------------------------
#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182)
**作者**:船山信安
**上传时间**2025-01-04 02:01:04
**简介**None
----------------------------------------
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
**作者**OneMoreThink
**上传时间**2025-01-04 01:17:57
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
----------------------------------------
#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8)
**作者**:网络研究观
**上传时间**2025-01-04 00:30:41
**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。
----------------------------------------
#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50)
**作者**:网络研究观
**上传时间**2025-01-04 00:30:41
**简介**None
----------------------------------------
#### 文章:[国外红队大佬内核+系统级后门维持骚姿势【附代码】](https://mp.weixin.qq.com/s?__biz=MzI1Mjc3NTUwMQ==&mid=2247538309&idx=1&sn=dd64f573e068a0ec20c175049061bcb5)
**作者**:教父爱分享
**上传时间**2025-01-05 23:19:42
**简介**None
----------------------------------------
#### 文章:[Windows注册表 IFEO注入](https://mp.weixin.qq.com/s?__biz=MzU0NDI5NTY4OQ==&mid=2247486252&idx=1&sn=aa3c25ab63b811804e30eea2e29263b0)
**作者**:暴暴的皮卡丘
**上传时间**2025-01-05 22:44:13
**简介**None
----------------------------------------
#### 文章:[国密测评抓取APP的TCP握手报文](https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247489518&idx=1&sn=81e228fe4680b9ad6e061a9bb9396839)
**作者**:安全初心
**上传时间**2025-01-05 22:32:13
**简介**None
----------------------------------------
#### 文章:[通过模拟功能实现提权Bugcrowd](https://mp.weixin.qq.com/s?__biz=Mzg4NjY3OTQ3NA==&mid=2247486466&idx=1&sn=a30b93ae9f1bcb37ae3d5fbb97c3f608)
**作者**:玲珑安全
**上传时间**2025-01-05 18:55:21
**简介**None
----------------------------------------
#### 文章:[通过模拟功能实现提权Bugcrowd](https://mp.weixin.qq.com/s?__biz=MzI4NTYwMzc5OQ==&mid=2247500656&idx=1&sn=8cd3d32e7a74ea7a64d7e7932730f768)
**作者**:芳华绝代安全团队
**上传时间**2025-01-05 18:53:58
**简介**None
----------------------------------------
#### 文章:[(滥用) ClickOnce 实现可信任意代码执行](https://mp.weixin.qq.com/s?__biz=MzAxODM5ODQzNQ==&mid=2247486184&idx=1&sn=5c1bd5ddbc40812af82fbfa7a9f22770)
**作者**securitainment
**上传时间**2025-01-04 23:04:05
**简介**None
----------------------------------------
#### 文章:[Steam假入库深入解析](https://mp.weixin.qq.com/s?__biz=MzkyOTc0NDY2Nw==&mid=2247484579&idx=1&sn=59e527ca060e26343855dce02d6e5eb5)
**作者**:冲鸭安全
**上传时间**2025-01-04 10:00:36
**简介**None
----------------------------------------
#### 文章:[工具 | Metasploit](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=4&sn=c8de45b234450a36e9a22d0bb76734bb)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Metasploit Framework是一款开源安全漏洞检测工具。
----------------------------------------
#### 文章:[警报升级!超 15,000 台 Four-Faith 路由器正遭黑客攻击,利用默认密码即可入侵!](https://mp.weixin.qq.com/s?__biz=MzA4NTY4MjAyMQ==&mid=2447899916&idx=1&sn=c7bd48c8e4031bc1a4a427c4014293c9)
**作者**:技术修道场
**上传时间**2025-01-04 08:00:17
**简介**:安全紧急关注!据 VulnCheck 最新披露知名工业物联网路由器制造商Four-Faith旗下两款路由器存在严重安全漏洞CVE-2024-12856目前正遭受黑客大规模攻击更危险的是利用该漏洞竟只需默认密码
----------------------------------------
#### 文章:[【oscp】Tr0ll 靶机全系列1-3FTP被玩坏了](https://mp.weixin.qq.com/s?__biz=Mzg2Nzk0NjA4Mg==&mid=2247497565&idx=1&sn=0495a32e8e257d65c7ad14810a22fa74)
**作者**泷羽Sec
**上传时间**2025-01-04 07:44:56
**简介**None
----------------------------------------
#### 文章:[使用 Azure 上的 Dapr 保护微服务:实现端到端安全性](https://mp.weixin.qq.com/s?__biz=MzkwOTE5MDY5NA==&mid=2247504388&idx=1&sn=fe35c01f86f69c8072a03db66361d2a8)
**作者**:安全狗的自我修养
**上传时间**2025-01-04 07:09:11
**简介**:在微服务领域,各个服务跨网络进行通信,安全性至关重要。随着分布式系统和微服务架构
----------------------------------------
#### 文章:[无文件恶意软件 检测、响应和预防](https://mp.weixin.qq.com/s?__biz=Mzg2NjY2MTI3Mg==&mid=2247498040&idx=1&sn=df0fee8a13e4cae93c015af689d05822)
**作者**:河南等级保护测评
**上传时间**2025-01-04 07:05:19
**简介**None
----------------------------------------
#### 文章:[【神兵利器】红队浏览器凭据提取工具](https://mp.weixin.qq.com/s?__biz=Mzg4MTU4NTc2Nw==&mid=2247494577&idx=1&sn=beae3d675ef8ab93ef534f4998553621)
**作者**:七芒星实验室
**上传时间**2025-01-04 07:00:24
**简介**None
----------------------------------------
#### 文章:[安卓app抓包总结](https://mp.weixin.qq.com/s?__biz=MzU2NDY2OTU4Nw==&mid=2247518123&idx=1&sn=7c1cb512d57a482e7d7486845b297182)
**作者**:船山信安
**上传时间**2025-01-04 02:01:04
**简介**None
----------------------------------------
#### 文章:[双击劫持:攻击者可以悄无声息地窃取用户账户](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=3&sn=6b53d706b8c196758b7385fb31f0e0a8)
**作者**:网络研究观
**上传时间**2025-01-04 00:30:41
**简介**:两次鼠标点击之间的时间足以让黑客交换网页并诱骗受害者意外授权访问或转账。
----------------------------------------
#### 文章:[新的“DoubleClickjacking”攻击针对 OAuth 进行帐户接管](https://mp.weixin.qq.com/s?__biz=MzkxNDM4OTM3OQ==&mid=2247505495&idx=5&sn=9bd1c23d7430a1486c6ad45a04a34d50)
**作者**:网络研究观
**上传时间**2025-01-04 00:30:41
**简介**None
----------------------------------------
#### 文章:[Windows 曝9.8分漏洞已有PoC及利用情况](https://mp.weixin.qq.com/s?__biz=MzI5NTM4OTQ5Mg==&mid=2247633558&idx=3&sn=52cfdbc169143c290a49fffc945d77d6)
**作者**:商密君
**上传时间**2025-01-05 19:15:38
**简介**None
----------------------------------------
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Apache MINA存在反序列化漏洞攻击者可通过向受影响的应用程序发送特制的恶意序列化数据利用不安全的反序列化过程触发该漏洞从而可能导致远程代码执行。
----------------------------------------
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞读取服务器任意文件从而获取服务器大量敏感信息。
----------------------------------------
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
**作者**OneMoreThink
**上传时间**2025-01-04 01:17:57
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
----------------------------------------
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Apache MINA存在反序列化漏洞攻击者可通过向受影响的应用程序发送特制的恶意序列化数据利用不安全的反序列化过程触发该漏洞从而可能导致远程代码执行。
----------------------------------------
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞读取服务器任意文件从而获取服务器大量敏感信息。
----------------------------------------
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
**作者**OneMoreThink
**上传时间**2025-01-04 01:17:57
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
----------------------------------------
#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞CVE-2024-49112](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c)
**作者**:飓风网络安全
**上传时间**2025-01-03 22:37:58
**简介**None
----------------------------------------
#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7)
**作者**:奇安信 CERT
**上传时间**2025-01-03 22:18:20
**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
----------------------------------------
#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed)
**作者**:弥天安全实验室
**上传时间**2025-01-03 18:50:36
**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞
----------------------------------------
#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b)
**作者**:河北镌远网络科技有限公司
**上传时间**2025-01-03 18:29:17
**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险
----------------------------------------
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Apache MINA存在反序列化漏洞攻击者可通过向受影响的应用程序发送特制的恶意序列化数据利用不安全的反序列化过程触发该漏洞从而可能导致远程代码执行。
----------------------------------------
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞读取服务器任意文件从而获取服务器大量敏感信息。
----------------------------------------
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
**作者**OneMoreThink
**上传时间**2025-01-04 01:17:57
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
----------------------------------------
#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞CVE-2024-49112](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c)
**作者**:飓风网络安全
**上传时间**2025-01-03 22:37:58
**简介**None
----------------------------------------
#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7)
**作者**:奇安信 CERT
**上传时间**2025-01-03 22:18:20
**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
----------------------------------------
#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed)
**作者**:弥天安全实验室
**上传时间**2025-01-03 18:50:36
**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞
----------------------------------------
#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b)
**作者**:河北镌远网络科技有限公司
**上传时间**2025-01-03 18:29:17
**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险
----------------------------------------
#### 文章:[漏洞预警 | Apache MINA反序列化漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=1&sn=307a01116d071dca48ffee093d16aaab)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**Apache MINA存在反序列化漏洞攻击者可通过向受影响的应用程序发送特制的恶意序列化数据利用不安全的反序列化过程触发该漏洞从而可能导致远程代码执行。
----------------------------------------
#### 文章:[漏洞预警 | 卓软计量业务管理平台任意文件读取漏洞](https://mp.weixin.qq.com/s?__biz=MzkwMTQ0NDA1NQ==&mid=2247491972&idx=3&sn=ff471839b4b2ae7ac321141a08593a64)
**作者**:浅安安全
**上传时间**2025-01-04 08:03:54
**简介**:卓软计量业务管理平台的/HuameiMeasure/image.ashx接口存在任意文件读取漏洞未经身份验证的攻击者可以通过该漏洞读取服务器任意文件从而获取服务器大量敏感信息。
----------------------------------------
#### 文章:[攻防靶场(31):日志投毒与文件包含漏洞 Solstice](https://mp.weixin.qq.com/s?__biz=MzI0NjA3Mzk2NQ==&mid=2247495429&idx=1&sn=38b21b3d0a81ed449647cb0de481cac6)
**作者**OneMoreThink
**上传时间**2025-01-04 01:17:57
**简介**:基于 ATTCK 的 OSCP PG Play 靶场通关攻略
----------------------------------------
#### 文章:[【高危漏洞预警】Windows LDAP远程代码执行漏洞CVE-2024-49112](https://mp.weixin.qq.com/s?__biz=MzI3NzMzNzE5Ng==&mid=2247489400&idx=1&sn=c983947941f4637d6fade0c80b18ea2c)
**作者**:飓风网络安全
**上传时间**2025-01-03 22:37:58
**简介**None
----------------------------------------
#### 文章:[【已复现】Windows 轻量级目录访问协议 (LDAP) 拒绝服务漏洞(CVE-2024-49113)安全风险通告](https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247502708&idx=1&sn=30ee0bf007924eb359c6c609b3ba1cb7)
**作者**:奇安信 CERT
**上传时间**2025-01-03 22:18:20
**简介**:致力于第一时间为企业级用户提供权威漏洞情报和有效解决方案。
----------------------------------------
#### 文章:[【成功复现】大华智能物联综合管理平台远程代码执行漏洞](https://mp.weixin.qq.com/s?__biz=MzU2NDgzOTQzNw==&mid=2247502820&idx=1&sn=5ebcb4158f712c89ddc3f0c5b1ee0bed)
**作者**:弥天安全实验室
**上传时间**2025-01-03 18:50:36
**简介**:【成功复现】大华智能物联综合管理平台远程代码执行漏洞
----------------------------------------
#### 文章:[大量 Four-Faith 路由器因严重漏洞面临远程攻击风险](https://mp.weixin.qq.com/s?__biz=MzU3MzU4NjI4OQ==&mid=2247515719&idx=1&sn=01c1fdb783a2a11f73b6961114c9435b)
**作者**:河北镌远网络科技有限公司
**上传时间**2025-01-03 18:29:17
**简介**:大量 Four-Faith 路由器因严重漏洞面临远程攻击风险
----------------------------------------

View File

@ -0,0 +1,28 @@
#### 文章:[路飞爬虫开发App逆向第八期share](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9l40l5MWzjtbsbsR6eNCWCFc2fBtcWxYi1RScM2JNWvWAbXS2wSQe0vsRQxnJ7FxpS7-Hly9zOKbAYIy9riVzrmGRJgS4PuGQmbXjaxbg2fDzhk0fzVTRilh1Dg5i4BYm9iLOcV7xnhleHYIRY1mnBfK97YnmvOAU-mai6i3jnIE6Ebq8fk9diw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA)
描述:关注以上公众号,后台回复 课程 即可领取哦~有路飞爬虫开发App逆向第八期share路飞爬虫开发App逆向第八期share### 路飞爬虫开...
**上传时间**2025-01-01 05:11:41
**作者**:小马找课呀
**关键词**APP逆向
----------------------------------------
#### 文章:[抖音APP逆向:附带抓包与6神算法探索](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKNciYPpIcdmE5dl9P8Paw_x58MkIGEcJw3juWkEMf3Hfa2tGfX7oJGkopviLeKN6p0Qsf5Pjq5lQJ440gcqIG3P92dCjJKmIEw71YhhkAfJptZjnqDZ-9WctPujwwRB2Pw..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA)
描述走进抖音APP逆向的世界,结合抓包技术和传说中的“6神算法”,一起揭开其神秘面纱.环境准备:基础工具搭建重点内容:安装必...
**上传时间**2025-01-03 13:10:22
**作者**彪哥in讲py
**关键词**APP逆向
----------------------------------------
#### 文章:[APP逆向工具清单](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd951tlle8LxESo-zDlqxSX6pocMxwkvRmnDq000DCRO83Wk9wH2pxzKEQotIC1WeYHE8IYVGBIMwjYX9eBY-oL5HUkRlYI-PnA1yRFHhpHP7Sm7W-AWObVBA3hV_7JOu-4Bl_kDMDYSBKlyTq-ojDhmiIxLICWVTQxzYYD-Z4gXxIGX_iHL9MadA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA)
描述:嘿,各位热爱编程的小伙伴们,今天咱们来聊聊APP逆向的那些事儿.给大家整理一份实用的APP逆向工具清单.一、环境准备篇重点...
**上传时间**2025-01-03 13:10:22
**作者**彪哥in讲py
**关键词**APP逆向
----------------------------------------
#### 文章:[APP逆向sign签名算法:Python实战指南](https://weixin.sogou.com/link?url=dn9a_-gY295K0Rci_xozVXfdMkSQTLW6cwJThYulHEtVjXrGTiVgS3RIfFrW11KzAR6XDQQibTJVHQhd8dqH4VqXa8Fplpd9Z2uQi14zjGFECgple0Il5-1K8SLax84YfVaqkNMacaLrG1rkvGbndY6sEGVytRQ2Xa9okGtxlAiFdqvEtLdW8rbW9xGCpXc-0hrzlDs5UvWb91zgNMTb1rkzPqK4FbfdwKi3bykgC3WcITmV9kKf9MJmAnpcRK7rN62zqqL31VVS6t2rFt2rnA..&type=2&query=APP%E9%80%86%E5%90%91&token=16294B5FBEC330F77B7A568A95A70A6C7CD387FE677AA0EA)
描述在APP逆向分析领域,sign签名算法无疑是一个核心且复杂的话题.今天,咱们就来聊聊这个话题,话不多说,直接进入正题.环境准...
**上传时间**2025-01-03 09:40:29
**作者**雷雷讲py
**关键词**APP逆向
----------------------------------------

View File

@ -0,0 +1,162 @@
2025-01-05 23:09:45 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [1, 2], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-05 23:09:45 - INFO - __main__:<module>:249 - 程序正在运行当中。
2025-01-05 23:09:55 - INFO - __main__:main_job:182 - 发送程序启动当前时间为2025-01-05 23:09:55
2025-01-05 23:09:55 - INFO - __main__:main_job:183 - 正在启动各爬虫并获取资源中...
2025-01-05 23:09:55 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【银行测试】的微信公众号-Sogou搜索内容保存成功。
2025-01-05 23:10:01 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【APP逆向】的微信公众号-Sogou搜索内容保存成功。
2025-01-05 23:10:06 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【渗透测试】的微信公众号-Sogou搜索内容保存成功。
2025-01-05 23:10:11 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【手机银行漏洞】的微信公众号-Sogou搜索内容保存成功。
2025-01-05 23:10:17 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【银行漏洞】的微信公众号-Sogou搜索内容保存成功。
2025-01-05 23:10:22 - WARNING - spider.sougou_wx:sougou_wx_main:102 - 关键词【支付漏洞】的微信公众号-Sogou搜索内容保存成功。
2025-01-05 23:10:27 - INFO - __main__:check_avaliable:65 - 飞书发送 微信公众号关键词相关内容 成功
2025-01-05 23:10:42 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【sql注入】获取开始。
2025-01-05 23:10:48 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【cnvd】获取开始。
2025-01-05 23:10:54 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【未授权】获取开始。
2025-01-05 23:11:01 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【漏洞POC】获取开始。
2025-01-05 23:11:07 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【RCE】获取开始。
2025-01-05 23:11:13 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【渗透测试】获取开始。
2025-01-05 23:11:19 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【反序列化】获取开始。
2025-01-05 23:11:27 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【攻防】获取开始。
2025-01-05 23:11:35 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【webshell】获取开始。
2025-01-05 23:11:41 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【红队】获取开始。
2025-01-05 23:11:48 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【redteam】获取开始。
2025-01-05 23:11:54 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【信息收集】获取开始。
2025-01-05 23:12:00 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【绕过】获取开始。
2025-01-05 23:12:06 - INFO - spider.github:github_main_keyword:48 - github_keyword:关键词【bypass av】获取开始。
2025-01-05 23:12:12 - INFO - spider.github:github_main_repo:99 - github_repo:项目【BeichenDream/Godzilla】更新情况获取开始。
2025-01-05 23:12:17 - INFO - spider.github:github_main_repo:99 - github_repo:项目【rebeyond/Behinder】更新情况获取开始。
2025-01-05 23:12:23 - INFO - spider.github:github_main_repo:99 - github_repo:项目【AntSwordProject/antSword】更新情况获取开始。
2025-01-05 23:12:29 - INFO - spider.github:github_main_repo:99 - github_repo:项目【j1anFen/shiro_attack】更新情况获取开始。
2025-01-05 23:12:29 - ERROR - spider.github:fetch_rss:38 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/commits?per_page=1
2025-01-05 23:12:34 - INFO - spider.github:github_main_repo:99 - github_repo:项目【yhy0/github-cve-monitor】更新情况获取开始。
2025-01-05 23:12:40 - INFO - spider.github:github_main_repo:99 - github_repo:项目【gentilkiwi/mimikatz】更新情况获取开始。
2025-01-05 23:12:46 - INFO - spider.github:github_main_repo:99 - github_repo:项目【ehang-io/nps】更新情况获取开始。
2025-01-05 23:12:51 - INFO - spider.github:github_main_repo:99 - github_repo:项目【chaitin/xray】更新情况获取开始。
2025-01-05 23:12:57 - INFO - spider.github:github_main_repo:99 - github_repo:项目【FunnyWolf/pystinger】更新情况获取开始。
2025-01-05 23:13:03 - INFO - spider.github:github_main_repo:99 - github_repo:项目【L-codes/Neo-reGeorg】更新情况获取开始。
2025-01-05 23:13:08 - INFO - spider.github:github_main_repo:99 - github_repo:项目【shadow1ng/fscan】更新情况获取开始。
2025-01-05 23:13:14 - INFO - spider.github:github_main_repo:99 - github_repo:项目【SafeGroceryStore/MDUT】更新情况获取开始。
2025-01-05 23:13:21 - INFO - spider.github:github_main_repo:99 - github_repo:项目【EdgeSecurityTeam/Vulnerability】更新情况获取开始。
2025-01-05 23:13:22 - ERROR - spider.github:fetch_rss:38 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/commits?per_page=1
2025-01-05 23:13:27 - INFO - spider.github:github_main_repo:99 - github_repo:项目【Vme18000yuan/FreePOC】更新情况获取开始。
2025-01-05 23:13:33 - INFO - spider.github:github_main_repo:99 - github_repo:项目【wy876/POC】更新情况获取开始。
2025-01-05 23:13:39 - INFO - spider.github:github_main_release:144 - github_repo:项目【BeichenDream/Godzilla】发版情况获取开始。
2025-01-05 23:13:45 - INFO - spider.github:github_main_release:144 - github_repo:项目【rebeyond/Behinder】发版情况获取开始。
2025-01-05 23:13:50 - INFO - spider.github:github_main_release:144 - github_repo:项目【AntSwordProject/antSword】发版情况获取开始。
2025-01-05 23:13:56 - INFO - spider.github:github_main_release:144 - github_repo:项目【j1anFen/shiro_attack】发版情况获取开始。
2025-01-05 23:13:57 - ERROR - spider.github:fetch_rss:38 - 请求 https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/j1anFen/shiro_attack/releases?per_page=1
2025-01-05 23:14:02 - INFO - spider.github:github_main_release:144 - github_repo:项目【yhy0/github-cve-monitor】发版情况获取开始。
2025-01-05 23:14:02 - WARNING - spider.github:github_main_release:151 - github_repo:项目【yhy0/github-cve-monitor】不存在版本发布情况。
2025-01-05 23:14:07 - INFO - spider.github:github_main_release:144 - github_repo:项目【gentilkiwi/mimikatz】发版情况获取开始。
2025-01-05 23:14:13 - INFO - spider.github:github_main_release:144 - github_repo:项目【ehang-io/nps】发版情况获取开始。
2025-01-05 23:14:19 - INFO - spider.github:github_main_release:144 - github_repo:项目【chaitin/xray】发版情况获取开始。
2025-01-05 23:14:25 - INFO - spider.github:github_main_release:144 - github_repo:项目【FunnyWolf/pystinger】发版情况获取开始。
2025-01-05 23:14:30 - INFO - spider.github:github_main_release:144 - github_repo:项目【L-codes/Neo-reGeorg】发版情况获取开始。
2025-01-05 23:14:36 - INFO - spider.github:github_main_release:144 - github_repo:项目【shadow1ng/fscan】发版情况获取开始。
2025-01-05 23:14:42 - INFO - spider.github:github_main_release:144 - github_repo:项目【SafeGroceryStore/MDUT】发版情况获取开始。
2025-01-05 23:14:47 - INFO - spider.github:github_main_release:144 - github_repo:项目【EdgeSecurityTeam/Vulnerability】发版情况获取开始。
2025-01-05 23:14:48 - ERROR - spider.github:fetch_rss:38 - 请求 https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1 时发生错误: 404 Client Error: Not Found for url: https://api.github.com/repos/EdgeSecurityTeam/Vulnerability/releases?per_page=1
2025-01-05 23:14:53 - INFO - spider.github:github_main_release:144 - github_repo:项目【Vme18000yuan/FreePOC】发版情况获取开始。
2025-01-05 23:14:54 - WARNING - spider.github:github_main_release:151 - github_repo:项目【Vme18000yuan/FreePOC】不存在版本发布情况。
2025-01-05 23:14:59 - INFO - spider.github:github_main_release:144 - github_repo:项目【wy876/POC】发版情况获取开始。
2025-01-05 23:15:04 - INFO - spider.github:github_main_user:179 - github_user:作者【su18】更新情况获取开始。
2025-01-05 23:15:10 - INFO - spider.github:github_main_user:179 - github_user:作者【BeichenDream】更新情况获取开始。
2025-01-05 23:15:16 - INFO - spider.github:github_main_user:179 - github_user:作者【phith0n】更新情况获取开始。
2025-01-05 23:15:21 - INFO - spider.github:github_main_user:179 - github_user:作者【zhzyker】更新情况获取开始。
2025-01-05 23:15:27 - INFO - spider.github:github_main_user:179 - github_user:作者【lijiejie】更新情况获取开始。
2025-01-05 23:15:34 - INFO - spider.github:github_main_user:179 - github_user:作者【projectdiscovery】更新情况获取开始。
2025-01-05 23:15:39 - INFO - spider.github:github_main_user:179 - github_user:作者【HavocFramework】更新情况获取开始。
2025-01-05 23:15:45 - INFO - __main__:check_avaliable:88 - Github项目监控-关键词监控数据为空,跳过执行。
2025-01-05 23:15:45 - INFO - __main__:check_avaliable:88 - Github项目监控-项目更新情况数据为空,跳过执行。
2025-01-05 23:15:46 - INFO - __main__:check_avaliable:65 - 飞书发送 Github项目监控-大佬工具 成功
2025-01-05 23:16:01 - INFO - __main__:check_avaliable:88 - Github项目监控-项目版本发布监测数据为空,跳过执行。
2025-01-05 23:18:32 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-05 23:18:36 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-05 23:18:36 - INFO - __main__:<module>:249 - 程序正在运行当中。
2025-01-05 23:18:45 - INFO - __main__:send_first_message:229 - 飞书发送 程序信息 成功
2025-01-05 23:18:46 - INFO - __main__:send_first_message:232 - 飞书发送 RSS源状态 成功
2025-01-05 23:18:46 - INFO - __main__:send_first_message:234 - 飞书发送 首次运行提醒 成功
2025-01-05 23:18:46 - INFO - __main__:main_job:182 - 发送程序启动当前时间为2025-01-05 23:18:46
2025-01-05 23:18:46 - INFO - __main__:main_job:183 - 正在启动各爬虫并获取资源中...
2025-01-05 23:18:46 - ERROR - spider.common:fetch_rss:47 - 请求 https://paper.seebug.org/rss/ 时发生错误: 521 Server Error: for url: https://paper.seebug.org/rss/
2025-01-05 23:18:46 - WARNING - spider.common:seebug_main:70 - 无法获取Seebug社区RSS内容跳过保存操作。
2025-01-05 23:18:47 - INFO - spider.common:anquanke_main:116 - 数据已保存到 ./resources/JSON/anquanke.json
2025-01-05 23:18:47 - INFO - spider.common:huawei_main:152 - 数据已保存到 ./resources/JSON/huawei.json
2025-01-05 23:18:47 - INFO - spider.common:doonsec_main:170 - 数据已保存到 ./resources/JSON/doonsec.json
2025-01-05 23:18:47 - INFO - spider.common:qianxin_main:188 - 数据已保存到 ./resources/JSON/qianxin.json
2025-01-05 23:18:48 - INFO - spider.freebuf:freebuf_main:69 - 数据已保存到 ./resources/JSON/freebuf.json
2025-01-05 23:18:49 - INFO - spider.xianzhi:xianzhi_main:67 - 数据已保存到 ./resources/JSON/xianzhi.json
2025-01-05 23:18:49 - INFO - spider.common:M_4hou_main:98 - 数据已保存到 ./resources/JSON/4hou.json
2025-01-05 23:18:49 - ERROR - __main__:main_loop:200 - 发生错误: seebug.json文件不存在请检查程序是否运行正常, 程序已暂停
2025-01-05 23:43:11 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-05 23:43:11 - INFO - __main__:<module>:249 - 程序正在运行当中。
2025-01-05 23:43:24 - INFO - __main__:send_first_message:229 - 飞书发送 程序信息 成功
2025-01-05 23:43:25 - INFO - __main__:send_first_message:232 - 飞书发送 RSS源状态 成功
2025-01-05 23:43:25 - INFO - __main__:send_first_message:234 - 飞书发送 首次运行提醒 成功
2025-01-05 23:43:25 - INFO - __main__:main_job:182 - 发送程序启动当前时间为2025-01-05 23:43:25
2025-01-05 23:43:25 - INFO - __main__:main_job:183 - 正在启动各爬虫并获取资源中...
2025-01-05 23:43:25 - WARNING - spider.common:fetch_rss:47 - 请求 https://paper.seebug.org/rss/ 时发生错误: 521 Server Error: for url: https://paper.seebug.org/rss/
2025-01-05 23:43:25 - WARNING - spider.common:seebug_main:70 - 无法获取Seebug社区RSS内容跳过保存操作。
2025-01-05 23:43:26 - INFO - spider.common:anquanke_main:116 - 数据已保存到 ./resources/JSON/anquanke.json
2025-01-05 23:43:26 - INFO - spider.common:huawei_main:152 - 数据已保存到 ./resources/JSON/huawei.json
2025-01-05 23:43:26 - INFO - spider.common:doonsec_main:170 - 数据已保存到 ./resources/JSON/doonsec.json
2025-01-05 23:43:26 - INFO - spider.common:qianxin_main:188 - 数据已保存到 ./resources/JSON/qianxin.json
2025-01-05 23:43:28 - INFO - spider.freebuf:freebuf_main:69 - 数据已保存到 ./resources/JSON/freebuf.json
2025-01-05 23:43:29 - INFO - spider.xianzhi:xianzhi_main:67 - 数据已保存到 ./resources/JSON/xianzhi.json
2025-01-05 23:43:29 - INFO - spider.common:M_4hou_main:98 - 数据已保存到 ./resources/JSON/4hou.json
2025-01-05 23:43:29 - ERROR - __main__:main_loop:200 - 发生错误: seebug.json文件不存在请检查程序是否运行正常, 程序已暂停
2025-01-06 00:04:38 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:04:38 - INFO - __main__:<module>:249 - 程序正在运行当中。
2025-01-06 00:04:43 - INFO - __main__:main_job:182 - 发送程序启动当前时间为2025-01-06 00:04:43
2025-01-06 00:04:43 - INFO - __main__:main_job:183 - 正在启动各爬虫并获取资源中...
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:04:43 - INFO - __main__:check_avaliable:88 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:04:58 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-06 00:08:39 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:08:39 - INFO - __main__:<module>:250 - 程序正在运行当中。
2025-01-06 00:08:44 - INFO - __main__:main_job:183 - 发送程序启动当前时间为2025-01-06 00:08:44
2025-01-06 00:08:44 - INFO - __main__:main_job:184 - 正在启动各爬虫并获取资源中...
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:08:45 - INFO - __main__:check_avaliable:89 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:08:53 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-06 00:24:00 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:24:00 - INFO - __main__:<module>:251 - 程序正在运行当中。
2025-01-06 00:24:05 - INFO - __main__:main_job:184 - 发送程序启动当前时间为2025-01-06 00:24:05
2025-01-06 00:24:05 - INFO - __main__:main_job:185 - 正在启动各爬虫并获取资源中...
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:24:05 - INFO - __main__:check_avaliable:89 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:25:27 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-06 00:25:30 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:25:30 - INFO - __main__:<module>:251 - 程序正在运行当中。
2025-01-06 00:25:35 - INFO - __main__:main_job:184 - 发送程序启动当前时间为2025-01-06 00:25:35
2025-01-06 00:25:35 - INFO - __main__:main_job:185 - 正在启动各爬虫并获取资源中...
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:25:35 - INFO - __main__:check_avaliable:89 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:25:38 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...
2025-01-06 00:26:59 - DEBUG - config.check_config:get_core_config:20 - Loaded config: {'fs_activate': True, 'fs_key': '202d7e51-9a46-422e-a035-863bc42bc459', 'fs_secret': 'eZaSCl5DSqtJyZ8QpJBDFh', 'wx_activate': False, 'wx_key': None, 'ding_activate': False, 'ding_key': None, 'lx_activate': False, 'lx_key': None, 'mail_host': 'smtp.masonliu.com', 'mail_user': 'test@masonliu.com', 'mail_pass': 'Test123456', 'sender': 'test@masonliu.com', 'receivers': ['2857911564@qq.com'], 'e_hour': 4, 'time_mode': 1, 'mode': [0], 'url': 'https://info.masonliu.com/', 'debug': True}
2025-01-06 00:26:59 - INFO - __main__:<module>:251 - 程序正在运行当中。
2025-01-06 00:27:04 - INFO - __main__:main_job:184 - 发送程序启动当前时间为2025-01-06 00:27:04
2025-01-06 00:27:04 - INFO - __main__:main_job:185 - 正在启动各爬虫并获取资源中...
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 嘶吼资讯数据为空,跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 安全客资讯数据为空,跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 洞见微信安全资讯数据为空,跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 先知社区资讯数据为空,跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - FreeBuf资讯数据为空跳过执行。
2025-01-06 00:27:04 - INFO - __main__:check_avaliable:89 - 奇安信攻防社区资讯数据为空,跳过执行。
2025-01-06 00:28:35 - INFO - __main__:signal_handler:49 - 接收到退出信号,程序即将退出...

View File

@ -1,150 +0,0 @@
# -*- coding: utf-8 -*-
import requests
from bs4 import BeautifulSoup
import json
import time
import os
import re
from datetime import datetime, timedelta
from requests.exceptions import RequestException
from loguru import logger
headers = {
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,image/avif,image/webp,image/apng,*/*;q=0.8,application/signed-exchange;v=b3;q=0.7",
"User-Agent": "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/58.0.3029.110 Safari/537.3",
"Accept-Language": "en-US,en;q=0.9",
"Cache-Control": "no-cache",
"Connection": "keep-alive",
"Pragma": "no-cache",
"Sec-Fetch-Dest": "document",
"Sec-Fetch-Mode": "navigate",
"Sec-Fetch-Site": "same-origin",
"Sec-Fetch-User": "?1",
"Upgrade-Insecure-Requests": "1",
"sec-ch-ua": '"Google Chrome";v="131", "Chromium";v="131", "Not_A Brand";v="24"',
"sec-ch-ua-mobile": "?0",
"sec-ch-ua-platform": '"Windows"'
}
def fetch_html(url, timeout=10):
try:
response = requests.get(url, headers=headers, timeout=timeout)
response.raise_for_status()
return response.text
except requests.Timeout:
logger.warning(f"请求 {url} 超时,跳过保存操作。")
except requests.exceptions.RequestException as e:
logger.warning(f"请求 {url} 时发生错误: {e}")
def normalize_pub_date(pub_date):
# 检查是否为日期格式 2024-12-06
if re.match(r'\d{4}-\d{2}-\d{2}', pub_date):
return pub_date
# 检查是否为 '8天前' 格式
days_ago_match = re.match(r'(\d+)天前', pub_date)
if days_ago_match:
days_ago = int(days_ago_match.group(1))
return (datetime.now() - timedelta(days=days_ago)).strftime('%Y-%m-%d')
# 检查是否为 '小时前' 格式
hours_ago_match = re.match(r'(\d+)小时前', pub_date)
if hours_ago_match:
return datetime.now().strftime('%Y-%m-%d')
# 如果都不匹配,返回原始值
return pub_date
def parse_html(html_content):
soup = BeautifulSoup(html_content, 'html.parser')
# 提取所有符合条件的<table>标签
tables = soup.find_all('table', class_='result')
results = []
for table in tables:
# 提取标题和链接
h3_tag = table.find('h3', class_='t')
if h3_tag:
a_tag = h3_tag.find('a')
title = a_tag.get_text(strip=True) if a_tag else "No title found"
link = a_tag['href'] if a_tag else "No link found"
else:
title = "No title found"
link = "No link found"
# 提取摘要
td_element = table.find('td', class_='f')
# 从td中进一步查找div.realtime之后的所有文本
realtime_div = td_element.find('div', class_='realtime')
if realtime_div:
text_parts = []
for sibling in realtime_div.next_siblings:
if sibling.name == 'font':
break
if isinstance(sibling, str) and sibling.strip():
text_parts.append(sibling.strip())
elif sibling.name and sibling.get_text(strip=True):
text_parts.append(sibling.get_text(strip=True))
# 将所有文本片段合并成一个字符串,并整理格式
cleaned_text = ' '.join(text_parts)
# 提取发布者
publisher_tag = table.find('a', class_='m')
publisher = publisher_tag.get_text(strip=True) if publisher_tag else "百度快照"
# 提取时间戳
time_tag = table.find('div', class_='realtime')
pub_date = time_tag.get_text(strip=True) if time_tag else "No timestamp found"
pub_date = normalize_pub_date(pub_date)
results.append({
"title": title,
"link": link,
"description": cleaned_text,
"author": publisher,
"pubDate": pub_date
})
return results
def baidu_main(keywords):
all_results = {} # 用于存储所有关键词的结果
for keyword in keywords:
url = f"https://www.baidu.com/s?tn=baidurt&cl=3&rn=20&ie=utf-8&rsv_bp=1&wd={keyword}"
# print(url)
html_content = fetch_html(url)
# 将解析后的数据保存到 JSON 文件
with open('./test.html', 'w', encoding='utf-8') as f:
f.write(html_content)
# print(html_content)
if html_content is None:
logger.warning(f"无法获取百度搜索内容,跳过保存操作。关键词: {keyword}")
continue
results = parse_html(html_content)
# 移除非法代理对
logger.info(f"关键词【{keyword}】的百度搜索内容保存成功。")
all_results[keyword] = results # 将结果存储在字典中,以关键词为键
time.sleep(5)
# 将所有结果转换为JSON格式
json_results = json.dumps(all_results, ensure_ascii=False, indent=4)
# print(json_results)
# 确保目录存在
os.makedirs(os.path.dirname('./resources/JSON/baidu.json'), exist_ok=True)
# 将解析后的数据保存到 JSON 文件
with open('./resources/JSON/baidu.json', 'w', encoding='utf-8') as f:
f.write(json_results)
if __name__ == "__main__":
keywords = ["齐鲁银行"]
baidu_main(keywords)

View File

@ -57,10 +57,9 @@ def github_main_keyword(key, black_words):
api_node = "https://api.github.com/search/repositories?q={}&sort=updated&per_page=20".format(keyword) api_node = "https://api.github.com/search/repositories?q={}&sort=updated&per_page=20".format(keyword)
result = fetch_rss(api_node) result = fetch_rss(api_node)
if result == None: if result == None:
time.sleep(3) time.sleep(5)
continue continue
n = len(result['items']) for i in range(0, 20):
for i in range(0, n):
description = result['items'][i]['description'] description = result['items'][i]['description']
if description is None: if description is None:
@ -96,7 +95,7 @@ def github_main_keyword(key, black_words):
} }
# print(project_info) # print(project_info)
all_results.append(project_info) all_results.append(project_info)
time.sleep(3) time.sleep(5)
# 将所有结果写入JSON文件 # 将所有结果写入JSON文件
save_to_json(all_results, './resources/JSON/github_keyword.json') save_to_json(all_results, './resources/JSON/github_keyword.json')
@ -109,7 +108,7 @@ def github_main_repo(key):
api_node = "https://api.github.com/repos/{}/commits?per_page=1".format(keyword) api_node = "https://api.github.com/repos/{}/commits?per_page=1".format(keyword)
result = fetch_rss(api_node) result = fetch_rss(api_node)
if result == None: if result == None:
time.sleep(3) time.sleep(5)
continue continue
commit = result[0] # 获取最新的提交记录 commit = result[0] # 获取最新的提交记录
@ -142,7 +141,7 @@ def github_main_repo(key):
} }
# print(project_info) # print(project_info)
all_results.append(project_info) all_results.append(project_info)
time.sleep(3) time.sleep(5)
# 将所有结果写入JSON文件 # 将所有结果写入JSON文件
save_to_json(all_results, './resources/JSON/github_repo.json') save_to_json(all_results, './resources/JSON/github_repo.json')
@ -154,11 +153,11 @@ def github_main_release(key):
api_node = "https://api.github.com/repos/{}/releases?per_page=1".format(keyword) api_node = "https://api.github.com/repos/{}/releases?per_page=1".format(keyword)
result = fetch_rss(api_node) result = fetch_rss(api_node)
if result == None: if result == None:
time.sleep(3) time.sleep(5)
continue continue
if not result: if not result:
logger.warning(f"github_repo:项目【{keyword}】不存在版本发布情况。") logger.warning(f"github_repo:项目【{keyword}】不存在版本发布情况。")
time.sleep(3) time.sleep(5)
continue continue
# print(result) # print(result)
@ -177,7 +176,7 @@ def github_main_release(key):
} }
# print(project_info) # print(project_info)
all_results.append(project_info) all_results.append(project_info)
time.sleep(3) time.sleep(5)
# 将所有结果写入JSON文件 # 将所有结果写入JSON文件
save_to_json(all_results, './resources/JSON/github_release.json') save_to_json(all_results, './resources/JSON/github_release.json')
@ -189,7 +188,7 @@ def github_main_user(key, black_words):
api_node = "https://api.github.com/users/{}/repos?sort=created&per_page=10".format(keyword) api_node = "https://api.github.com/users/{}/repos?sort=created&per_page=10".format(keyword)
result = fetch_rss(api_node) result = fetch_rss(api_node)
if result == None: if result == None:
time.sleep(3) time.sleep(5)
continue continue
for i in range(0, len(result)): for i in range(0, len(result)):
description = result[i]['description'] description = result[i]['description']
@ -227,7 +226,7 @@ def github_main_user(key, black_words):
} }
# print(project_info) # print(project_info)
all_results.append(project_info) all_results.append(project_info)
time.sleep(3) time.sleep(5)
# 将所有结果写入JSON文件 # 将所有结果写入JSON文件
save_to_json(all_results, './resources/JSON/github_user.json') save_to_json(all_results, './resources/JSON/github_user.json')
@ -242,5 +241,4 @@ def github_main(keyword_list, tool_list, user_list, black_words):
github_main_user(user_list, black_words) github_main_user(user_list, black_words)
if __name__ == "__main__": if __name__ == "__main__":
keyword_list, tool_list, user_list, black_words = load_github_config() github_main()
github_main(keyword_list, tool_list, user_list, black_words)

View File

@ -12,6 +12,12 @@ headers = {
"Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8", "Accept": "text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8",
"Accept-Language": "zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2", "Accept-Language": "zh-CN,zh;q=0.8,zh-TW;q=0.7,zh-HK;q=0.5,en-US;q=0.3,en;q=0.2",
"Accept-Encoding": "gzip, deflate, br", "Accept-Encoding": "gzip, deflate, br",
"Upgrade-Insecure-Requests": "1",
"Sec-Fetch-Dest": "document",
"Sec-Fetch-Mode": "navigate",
"Sec-Fetch-Site": "none",
"Sec-Fetch-User": "?1",
"Priority": "u=0, i",
"Te": "trailers", "Te": "trailers",
"Connection": "keep-alive" "Connection": "keep-alive"
} }
@ -93,7 +99,7 @@ def sougou_wx_main(keywords):
results = parse_html(html_content) results = parse_html(html_content)
# 移除非法代理对 # 移除非法代理对
cleaned_results = [{k: remove_surrogates(v) for k, v in item.items()} for item in results] cleaned_results = [{k: remove_surrogates(v) for k, v in item.items()} for item in results]
logger.info(f"关键词【{keyword}】的微信公众号-Sogou搜索内容保存成功。") logger.warning(f"关键词【{keyword}】的微信公众号-Sogou搜索内容保存成功。")
all_results[keyword] = cleaned_results # 将结果存储在字典中,以关键词为键 all_results[keyword] = cleaned_results # 将结果存储在字典中,以关键词为键
time.sleep(5) time.sleep(5)

View File

@ -1,86 +0,0 @@
import feedparser
import json
from datetime import datetime, timezone, timedelta
from loguru import logger
import yaml
def fetch_rss_data(feed_urls, wechat_urls):
all_entries = []
# 处理通用 RSS 链接
for rss_url in feed_urls:
source, url = rss_url.split('|')
feed = feedparser.parse(url)
for entry in feed.entries:
entry_data = {
'title': entry.get('title', ''),
'link': entry.get('link', ''),
'author': entry.get('author', ''),
'description': entry.get('summary', ''),
'published': entry.get('published', ''),
'source': source.strip()
}
# 处理 published 字段
if entry_data['published']:
try:
# 尝试解析 published 字段
dt = datetime.strptime(entry_data['published'], '%a, %d %b %Y %H:%M:%S %z')
dt_china = dt.astimezone(timezone(timedelta(hours=8)))
entry_data['published'] = dt_china.strftime('%Y-%m-%d %H:%M:%S')
except ValueError:
# 如果解析失败,直接使用 published 字段
pass
all_entries.append(entry_data)
# 处理微信 RSS 链接
for wx_url in wechat_urls:
author, url = wx_url.split('|')
feed = feedparser.parse(url)
for entry in feed.entries:
entry_data = {
'title': entry.get('title', ''),
'link': entry.get('link', ''),
'author': author.strip(), # 使用 YAML 文件中指定的作者名
'description': entry.get('summary', ''),
'published': entry.get('published', ''),
'source': '微信公众号'
}
# 处理 published 字段
if entry_data['published']:
try:
# 尝试解析 published 字段
dt = datetime.strptime(entry_data['published'], '%a, %d %b %Y %H:%M:%S %z')
dt_china = dt.astimezone(timezone(timedelta(hours=8)))
entry_data['published'] = dt_china.strftime('%Y-%m-%d %H:%M:%S')
except ValueError:
# 如果解析失败,直接使用 published 字段
pass
all_entries.append(entry_data)
return all_entries
def save_to_json(data, filename):
with open(filename, 'w', encoding='utf-8') as f:
json.dump(data, f, ensure_ascii=False, indent=4)
logger.info(f"通用爬虫数据已保存到 {filename}")
def uni_spider():
# 读取 links.yaml 文件
with open('./config/uni_rss.yaml', 'r', encoding='utf-8') as f:
links = yaml.safe_load(f)
feed_urls = links.get('link', [])
wechat_urls = links.get('wechat', [])
# 获取 RSS 数据
rss_data = fetch_rss_data(feed_urls, wechat_urls)
# 保存到 JSON 文件
save_to_json(rss_data, './resources/JSON/uni_rss.json')
if __name__ == "__main__":
uni_spider()

13
test.py
View File

@ -1,13 +0,0 @@
import feedparser
feed_url = "https://security.tencent.com/index.php/feed/blog/0"
feed = feedparser.parse(feed_url)
for entry in feed.entries:
print(entry.title)
print(entry.link)
print(entry.id)
print(entry.summary)
print(entry.id)
# 打印所有属性,找出正确的日期字段名
# print(entry.keys())

View File

@ -1,6 +1,4 @@
from flask import Flask, jsonify, render_template from flask import Flask, jsonify, render_template
from flask import send_from_directory
from collections import deque
import os import os
import logging import logging
@ -11,9 +9,6 @@ BASE_DIR = os.path.dirname(os.path.abspath(__file__))
PARENT_DIR = os.path.dirname(BASE_DIR) # 上一个文件夹 PARENT_DIR = os.path.dirname(BASE_DIR) # 上一个文件夹
SEC_NEWS_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'sec_news.md') SEC_NEWS_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'sec_news.md')
TECH_PASSAGE_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'tech_passage.md') TECH_PASSAGE_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'tech_passage.md')
BAIDU_NEWS_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'baidu_news.md')
GITHUB_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'github.md')
WX_NEWS_PATH = os.path.join(PARENT_DIR, 'resources', 'history', 'wx_news.md')
CORE_LOG_PATH = os.path.join(PARENT_DIR, 'resources', 'log', 'core.log') CORE_LOG_PATH = os.path.join(PARENT_DIR, 'resources', 'log', 'core.log')
WEB_LOG_PATH = os.path.join(PARENT_DIR, 'resources', 'log', 'app.log') WEB_LOG_PATH = os.path.join(PARENT_DIR, 'resources', 'log', 'app.log')
@ -24,50 +19,52 @@ logging.basicConfig(
format= '%(asctime)s - %(levelname)s - %(message)s' format= '%(asctime)s - %(levelname)s - %(message)s'
) )
@app.route('/')
def index():
logging.info("访问主页")
return render_template('index.html')
@app.route('/static/favicon.ico')
def favicon():
return send_from_directory(os.path.join(app.root_path, 'templates/static'), 'favicon.ico')
def replace_content(content): def replace_content(content):
content = content.replace('####', '###') content = content.replace('####', '###')
content = content.replace(r"e:\Self-Tool-Code\PyBot", '.') # 修改: 使用原始字符串避免转义问题 content = content.replace(r"e:\Self-Tool-Code\PyBot", '.') # 修改: 使用原始字符串避免转义问题
return content return content
def get_records(content, num_records=20, delimiter='-'*40): @app.route('/')
records = content.split(delimiter) def index():
selected_records = records[:num_records] logging.info("访问主页")
return delimiter.join(selected_records) return render_template('index.html')
def read_last_lines(file_path, num_lines=100): @app.route('/get-sec-news')
with open(file_path, 'r', encoding='utf-8') as file: def get_sec_news():
return deque(file, maxlen=num_lines) logging.info(f"尝试打开安全新闻历史推送文件: {SEC_NEWS_PATH}")
def read_md_file(file_path):
try: try:
with open(file_path, 'r', encoding='utf-8') as file: with open(SEC_NEWS_PATH, 'r', encoding='utf-8') as file:
content = file.read() content = file.read()
content = replace_content(content) content = replace_content(content)
content = get_records(content) return jsonify({'content': content}), 200
return content, 200
except FileNotFoundError: except FileNotFoundError:
logging.error(f"文件缺失: {file_path}") logging.error(f"文件缺失: {SEC_NEWS_PATH}")
return f"{os.path.basename(file_path)} 文件缺失!", 404 return jsonify({'error': '安全新闻历史推送文件缺失!'}), 404
except Exception as e: except Exception as e:
logging.error(f"读取时出错: {file_path}, 原因: {str(e)}") logging.error(f"读取时出错: {SEC_NEWS_PATH}, 原因: {str(e)}")
return str(e), 500 return jsonify({'error': str(e)}), 500
@app.route('/get-tech-passage')
def get_tech_passage():
logging.info(f"尝试打开技术文章历史推送文件: {TECH_PASSAGE_PATH}")
try:
with open(TECH_PASSAGE_PATH, 'r', encoding='utf-8') as file:
content = file.read()
content = replace_content(content)
return jsonify({'content': content}), 200
except FileNotFoundError:
logging.error(f"文件缺失: {TECH_PASSAGE_PATH}")
return jsonify({'error': '技术文章历史推送文件缺失!'}), 404
except Exception as e:
logging.error(f"读取时出错: {TECH_PASSAGE_PATH}, 原因: {str(e)}")
return jsonify({'error': str(e)}), 500
@app.route('/log') @app.route('/log')
def get_log(): def get_log():
logging.info(f"尝试打开核心日志文件: {CORE_LOG_PATH}") logging.info(f"尝试打开核心日志文件: {CORE_LOG_PATH}")
# 读取日志文件内容 # 读取日志文件内容
log_content = read_last_lines(CORE_LOG_PATH) with open(CORE_LOG_PATH, 'r', encoding='utf-8') as file:
log_content = '\n'.join(log_content) log_content = file.read()
# 将日志内容传递给模板 # 将日志内容传递给模板
return render_template('log.html', log_content=log_content) return render_template('log.html', log_content=log_content)
@ -75,40 +72,12 @@ def get_log():
def get_weblog(): def get_weblog():
logging.info(f"尝试打开Web应用日志文件: {WEB_LOG_PATH}") logging.info(f"尝试打开Web应用日志文件: {WEB_LOG_PATH}")
with open(WEB_LOG_PATH, 'r') as file: with open(WEB_LOG_PATH, 'r') as file:
log_content = deque(file, maxlen=100) log_content = file.read()
log_content = '\n'.join(log_content)
log_content = replace_content(log_content) log_content = replace_content(log_content)
return render_template('log.html', log_content=log_content) return render_template('log.html', log_content=log_content)
@app.route('/get-sec-news') def run_server():
def get_sec_news(): app.run(host='0.0.0.0', port=5000)
logging.info(f"尝试打开安全新闻历史推送文件: {SEC_NEWS_PATH}")
content, status_code = read_md_file(SEC_NEWS_PATH)
return jsonify({'content': content}), status_code
@app.route('/get-tech-passage')
def get_tech_passage():
logging.info(f"尝试打开技术文章历史推送文件: {TECH_PASSAGE_PATH}")
content, status_code = read_md_file(TECH_PASSAGE_PATH)
return jsonify({'content': content}), status_code
@app.route('/get-baidu-news')
def get_baidu_news():
logging.info(f"尝试打开百度新闻历史推送文件: {BAIDU_NEWS_PATH}")
content, status_code = read_md_file(BAIDU_NEWS_PATH)
return jsonify({'content': content}), status_code
@app.route('/get-github-news')
def get_github_news():
logging.info(f"尝试打开GitHub历史推送文件: {GITHUB_PATH}")
content, status_code = read_md_file(GITHUB_PATH)
return jsonify({'content': content}), status_code
@app.route('/get-wx-news')
def get_wx_news():
logging.info(f"尝试打开微信历史推送文件: {WX_NEWS_PATH}")
content, status_code = read_md_file(WX_NEWS_PATH)
return jsonify({'content': content}), status_code
if __name__ == '__main__': if __name__ == '__main__':
app.run(debug=True, port=666) # 在生产环境中应设置为 False app.run(debug=False) # 在生产环境中应设置为 False

View File

@ -4,7 +4,6 @@
<meta charset="UTF-8"> <meta charset="UTF-8">
<title>资讯推送Web端</title> <title>资讯推送Web端</title>
<meta name="viewport" content="width=device-width, initial-scale=1.0"> <meta name="viewport" content="width=device-width, initial-scale=1.0">
<link rel="shortcut icon" href="{{ url_for('static', filename='favicon.ico') }}">
<!-- 引入 Layui 的 CSS --> <!-- 引入 Layui 的 CSS -->
<link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/layui-src/dist/css/layui.css"> <link rel="stylesheet" href="https://cdn.jsdelivr.net/npm/layui-src/dist/css/layui.css">
<script src="https://cdn.jsdelivr.net/npm/marked/marked.min.js"></script> <script src="https://cdn.jsdelivr.net/npm/marked/marked.min.js"></script>
@ -40,13 +39,6 @@
#back-to-top:hover { #back-to-top:hover {
background-color: #777; background-color: #777;
} }
#markdown-content a {
color: blue;
text-decoration: none; /* 可选:去掉下划线 */
}
#markdown-content a:hover {
text-decoration: underline; /* 可选:鼠标悬停时显示下划线 */
}
/* 移动端样式调整 */ /* 移动端样式调整 */
@media only screen and (max-width: 600px) { @media only screen and (max-width: 600px) {
@ -63,46 +55,13 @@
font-size: 14px; font-size: 14px;
padding: 8px; padding: 8px;
} }
#markdown-content a {
color: blue;
text-decoration: none; /* 可选:去掉下划线 */
}
#markdown-content a:hover {
text-decoration: underline; /* 可选:鼠标悬停时显示下划线 */
}
/* 按钮样式调整 */
#button-container {
flex-direction: column; /* 换行显示按钮 */
align-items: center; /* 按钮居中对齐 */
}
#button-container .layui-btn {
margin: 5px 0; /* 增加按钮间距 */
width: 90%; /* 调整按钮宽度 */
max-width: 300px; /* 设置最大宽度 */
}
} }
</style> </style>
</head> </head>
<body> <body>
<div class="layui-container"> <div class="layui-container">
<center><h1 class="layui-title" id="page-title">历史推送读取</h1><br> <center><h1 class="layui-title" id="page-title">历史推送读取</h1><br>
<!-- 折叠面板 --> <button id="toggle-fetch-btn" class="layui-btn">切换读取源</button><br></center>
<div class="layui-collapse" lay-filter="test">
<div class="layui-colla-item">
<h2 class="layui-colla-title">选择监控源新闻类型</h2>
<div class="layui-colla-content">
<div id="button-container" class="layui-btn-group">
<button id="sec-news-btn" class="layui-btn">安全新闻</button>
<button id="tech-passage-btn" class="layui-btn">技术文章</button>
<button id="baidu-news-btn" class="layui-btn">百度新闻</button>
<button id="github-news-btn" class="layui-btn">GitHub新闻</button>
<button id="wx-news-btn" class="layui-btn">微信新闻</button>
</div>
</div>
</div>
</div>
<h4>为保证网页运作性能默认仅读取前20条记录若您有需求可自行更改app.py</h4></center>
<div id="markdown-content" class="layui-card-body"></div> <div id="markdown-content" class="layui-card-body"></div>
</div> </div>
@ -112,48 +71,33 @@
<!-- 引入 Layui 的 JS --> <!-- 引入 Layui 的 JS -->
<script src="https://cdn.jsdelivr.net/npm/layui-src/dist/layui.js"></script> <script src="https://cdn.jsdelivr.net/npm/layui-src/dist/layui.js"></script>
<script> <script>
layui.use(['layer', 'element'], function(){ layui.use(['layer'], function(){
var layer = layui.layer; var layer = layui.layer;
var element = layui.element; var currentUrl = '/get-sec-news';
var buttonMap = {
'sec-news-btn': '/get-sec-news',
'tech-passage-btn': '/get-tech-passage',
'baidu-news-btn': '/get-baidu-news',
'github-news-btn': '/get-github-news',
'wx-news-btn': '/get-wx-news'
};
var titleMap = { var titleMap = {
'/get-sec-news': '安全新闻', '/get-sec-news': '安全新闻',
'/get-tech-passage': '技术文章', '/get-tech-passage': '技术文章'
'/get-baidu-news': '百度新闻',
'/get-github-news': 'GitHub监控',
'/get-wx-news': '微信文章监控'
}; };
function updateTitle(url) { function updateTitle(url) {
document.getElementById('page-title').innerText = titleMap[url] || '历史推送读取'; document.getElementById('page-title').innerText = titleMap[url] || '历史推送读取';
} }
function fetchContent(url, buttonId) { document.getElementById('toggle-fetch-btn').addEventListener('click', function() {
// Disable all buttons if (currentUrl === '/get-sec-news') {
Object.keys(buttonMap).forEach(key => { currentUrl = '/get-tech-passage';
document.getElementById(key).disabled = false; } else {
}); currentUrl = '/get-sec-news';
// Enable the clicked button }
document.getElementById(buttonId).disabled = true;
updateTitle(url); updateTitle(currentUrl);
fetch(url) fetch(currentUrl)
.then(response => response.json()) .then(response => response.json())
.then(data => { .then(data => {
if (data.content) { if (data.content) {
const htmlContent = marked.parse(data.content); const htmlContent = marked.parse(data.content);
document.getElementById('markdown-content').innerHTML = htmlContent; document.getElementById('markdown-content').innerHTML = htmlContent;
// 添加这一行代码
addTargetBlankToLinks();
} else { } else {
document.getElementById('markdown-content').innerHTML = '<p>加载历史推送文件时出错!(推送历史记录为空)</p>'; document.getElementById('markdown-content').innerHTML = '<p>加载历史推送文件时出错!(推送历史记录为空)</p>';
} }
@ -161,25 +105,27 @@
.catch(error => { .catch(error => {
console.error('获取源文件失败:', error); console.error('获取源文件失败:', error);
document.getElementById('markdown-content').innerHTML = '<p>无法加载历史推送文件!</p>'; document.getElementById('markdown-content').innerHTML = '<p>无法加载历史推送文件!</p>';
layer.msg('加载资源失败', {icon: 5}); layer.msg('Failed to load markdown.', {icon: 5});
});
}
// Add event listeners to buttons
Object.keys(buttonMap).forEach(key => {
document.getElementById(key).addEventListener('click', function() {
fetchContent(buttonMap[key], key);
// Check if the device is mobile
if (isMobileDevice()) {
// Collapse the panel
element.collapse('hide', 'test', 0);
}
}); });
}); });
// Initial fetch on page load // Initial fetch on page load
var initialButtonId = 'sec-news-btn'; // Default button updateTitle(currentUrl);
fetchContent(buttonMap[initialButtonId], initialButtonId);
fetch(currentUrl)
.then(response => response.json())
.then(data => {
if (data.content) {
const htmlContent = marked.parse(data.content);
document.getElementById('markdown-content').innerHTML = htmlContent;
} else {
document.getElementById('markdown-content').innerHTML = '<p>加载历史推送文件时出错!(推送历史记录为空)</p>';
}
})
.catch(error => {
console.error('获取源文件失败:', error);
document.getElementById('markdown-content').innerHTML = '<p>无法加载历史推送文件!</p>';
layer.msg('Failed to load markdown.', {icon: 5});
}); });
// 显示或隐藏返回顶部按钮 // 显示或隐藏返回顶部按钮
@ -200,23 +146,7 @@
document.body.scrollTop = 0; document.body.scrollTop = 0;
document.documentElement.scrollTop = 0; document.documentElement.scrollTop = 0;
}); });
// 检测是否为移动设备
function isMobileDevice() {
return /Android|webOS|iPhone|iPad|iPod|BlackBerry|IEMobile|Opera Mini/i.test(navigator.userAgent);
}
function addTargetBlankToLinks() {
var links = document.querySelectorAll('#markdown-content a');
links.forEach(function(link) {
link.setAttribute('target', '_blank');
}); });
}
// 在页面加载完成后调用该函数
window.onload = function() {
addTargetBlankToLinks();
};
</script> </script>
</body> </body>
</html> </html>

View File

@ -22,7 +22,6 @@
<body> <body>
<div class="layui-container"> <div class="layui-container">
<h1 class="layui-title">程序运行日志</h1> <h1 class="layui-title">程序运行日志</h1>
<h4>为保证网页运作性能默认仅读取后100条记录若您有需求可自行更改app.py</h4><br>
<pre>{{ log_content }}</pre> <pre>{{ log_content }}</pre>
<div id="markdown-content" class="layui-card-body"></div> <div id="markdown-content" class="layui-card-body"></div>
</div> </div>

View File

@ -9,7 +9,7 @@ check_config.py: 核查配置信息并获取到配置信息返回给核心程序
app.py: web运行日志 app.py: web运行日志
core.py: 程序运行日志 core.py: 程序运行日志
- ./spider - ./media
爬取RSS源以及信息源的json数据并保存 爬取RSS源以及信息源的json数据并保存
- ./resources/JSON - ./resources/JSON

View File

@ -1,22 +0,0 @@
### 设计思路
前情提要:百度搜索的爬取处理逻辑和搜狗-微信公众号的逻辑基本一致,但是百度搜索杂系数太大,存在大量不相关内容,所以使用百度的一个参数进行调整。
api地址
www.baidu.com/s?wd={关键词}&cl=3&pn=1&ie=utf-8&rn=20&tn=baidurt
- wd={关键词}:设置查询关键词
- cl=3查询类型3为网页2为图片默认为3
- pn=1指定查询页数
- rn=20每页显示数量
- ie=utf-8指定查询编码格式
- tn=baidurt设置为简化格式爬虫友好化
### 速率限制
建议设置高每页数量,减小搜索次数以规避反爬虫措施。
### 使用技术
- python-bs4网页解析
- python-sqlite联动
- python-request爬虫
- sqlite筛选
### 问题阐述
- 百度抓取的文章若是时间是近日,则不会显示具体时间,而是显示【*天前】,需要处理

View File

@ -1,40 +0,0 @@
### 个人监测源接入
#### 配置信息
- 路径:./config/
- 配置输出:参考下面函数
```python
def get_debug_config(): # 函数名称,获取调试配置信息
with open('./config/config.yaml', 'r', encoding="utf-8") as file: # 获取配置文件路径
config = yaml.safe_load(file)
debug = f"{config['debug']}" # 加载需要的配置
return debug # 返回配置信息
```
#### 爬虫程序
- 路径:./spider/
- 开发方法使用普通爬虫程序然后提取其中的有用信息以json格式存储于./resources/JSON/中
#### 分析程序
- 路径:./GotoSend/
- 开发方法将json文件中各元素依次存储于./resources/db/内利用sqlite技术存储过程中记得将时间格式化年月日 时分秒使用cursor查询数据库中符合筛选条件的文章最后构造发送文本以markdown+数列的形式返回return
###### 注意事项RSS类订阅信息大多结构类似仅需复制其他RSS源爬虫如common.py进行保留字段删改即可在分析模块中仅需处理时间格式并且注意字段的删改即可复用然后可以现在单独创建函数也可以选择合并入send_job_RSS函数中
#### 核心程序
- 路径:./Core.py
- 开发方法先引入爬虫和分析模块import直接创建新函数然后再main_loop函数中执行即可
参考代码:
```python
from config.check_config import get_core_config, get_debug_config, get_kewords_config # 引入配置信息
from spider.sougou_wx import sougou_wx_main # 引入爬虫模块
from GotoSend.sougou_wx import Src_sougou_wx # 引入分析模块
def send_job_SX(): # 创建新函数
Sogou_WX = get_kewords_config('Sogou_WX') # 获取配置信息
sougou_wx_main(Sogou_WX) # 爬虫爬取信息
result_sx_long = Src_sougou_wx(False) # 获取长文本信息
result_sx_short = Src_sougou_wx(True) # 获取短文本信息
webhook_url, timestamp, sign = gen_sign() # 飞书时间密钥生成
check_avaliable(result_sx_long, result_sx_short, "微信公众号关键词相关内容", webhook_url, timestamp, sign) # 进入筛选程序分发到各渠道
```
- 温馨提示您还可更改send_first_message函数使程序的首次运行提示更加符合程序的运行。