[ { "title": "JAVA安全之SpEL表达式执行", "link": "https://xz.aliyun.com/t/16905", "published": "2024-12-25T14:36:47+08:00", "id": "https://xz.aliyun.com/t/16905", "summary": { "@type": "html", "#text": "JAVA安全之SpEL表达式执行" } }, { "title": "从源码角度分析hessian特别的原因", "link": "https://xz.aliyun.com/t/16904", "published": "2024-12-25T13:46:49+08:00", "id": "https://xz.aliyun.com/t/16904", "summary": { "@type": "html", "#text": "从源码角度分析hessian特别的原因" } }, { "title": "fastapi 框架中的无回显利用", "link": "https://xz.aliyun.com/t/16903", "published": "2024-12-25T13:27:28+08:00", "id": "https://xz.aliyun.com/t/16903", "summary": { "@type": "html", "#text": "fastapi 框架中的无回显利用" } }, { "title": "Linux渗透实战之Trickster", "link": "https://xz.aliyun.com/t/16902", "published": "2024-12-25T11:49:15+08:00", "id": "https://xz.aliyun.com/t/16902", "summary": { "@type": "html", "#text": "Linux渗透实战之Trickster" } }, { "title": "HELLOCTF反序列化靶场全解", "link": "https://xz.aliyun.com/t/16901", "published": "2024-12-25T10:21:49+08:00", "id": "https://xz.aliyun.com/t/16901", "summary": { "@type": "html", "#text": "HELLOCTF反序列化靶场全解" } }, { "title": "Tomcat CVE-2024-50379 / CVE-2024-56337 条件竞争漏洞分析", "link": "https://xz.aliyun.com/t/16900", "published": "2024-12-25T09:41:05+08:00", "id": "https://xz.aliyun.com/t/16900", "summary": { "@type": "html", "#text": "Tomcat CVE-2024-50379 / CVE-2024-56337 条件竞争漏洞分析" } }, { "title": "AFL源码学习(一)", "link": "https://xz.aliyun.com/t/16896", "published": "2024-12-24T21:58:11+08:00", "id": "https://xz.aliyun.com/t/16896", "summary": { "@type": "html", "#text": "AFL源码学习(一)" } }, { "title": "基于科来的哥斯拉流量分析", "link": "https://xz.aliyun.com/t/16895", "published": "2024-12-24T17:04:59+08:00", "id": "https://xz.aliyun.com/t/16895", "summary": { "@type": "html", "#text": "基于科来的哥斯拉流量分析" } }, { "title": "Java安全之加载shellcode_bypass杀软", "link": "https://xz.aliyun.com/t/16894", "published": "2024-12-24T16:57:00+08:00", "id": "https://xz.aliyun.com/t/16894", "summary": { "@type": "html", "#text": "Java安全之加载shellcode_bypass杀软" } }, { "title": "pwn的堆中如何使用off by one 和off by null的详细解析以及每一步的调试过程", "link": "https://xz.aliyun.com/t/16893", "published": "2024-12-24T15:41:09+08:00", "id": "https://xz.aliyun.com/t/16893", "summary": { "@type": "html", "#text": "pwn的堆中如何使用off by one 和off by null的详细解析以及每一步的调试过程" } }, { "title": "Linux渗透实战之Instant", "link": "https://xz.aliyun.com/t/16889", "published": "2024-12-23T20:01:20+08:00", "id": "https://xz.aliyun.com/t/16889", "summary": { "@type": "html", "#text": "Linux渗透实战之Instant" } }, { "title": "vulnhub靶机billu_b0x精讲", "link": "https://xz.aliyun.com/t/16888", "published": "2024-12-23T18:33:18+08:00", "id": "https://xz.aliyun.com/t/16888", "summary": { "@type": "html", "#text": "vulnhub靶机billu_b0x精讲" } }, { "title": "企业上云的新攻击面分析", "link": "https://xz.aliyun.com/t/16887", "published": "2024-12-23T17:43:33+08:00", "id": "https://xz.aliyun.com/t/16887", "summary": { "@type": "html", "#text": "企业上云的新攻击面分析" } }, { "title": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集", "link": "https://xz.aliyun.com/t/16886", "published": "2024-12-23T17:29:43+08:00", "id": "https://xz.aliyun.com/t/16886", "summary": { "@type": "html", "#text": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集" } }, { "title": "ECH,新时代的域前置", "link": "https://xz.aliyun.com/t/16884", "published": "2024-12-23T16:17:20+08:00", "id": "https://xz.aliyun.com/t/16884", "summary": { "@type": "html", "#text": "ECH,新时代的域前置" } }, { "title": "CSS Injection 从入门到精通", "link": "https://xz.aliyun.com/t/16879", "published": "2024-12-22T22:06:24+08:00", "id": "https://xz.aliyun.com/t/16879", "summary": { "@type": "html", "#text": "CSS Injection 从入门到精通" } }, { "title": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解", "link": "https://xz.aliyun.com/t/16878", "published": "2024-12-22T20:46:30+08:00", "id": "https://xz.aliyun.com/t/16878", "summary": { "@type": "html", "#text": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解" } }, { "title": "LitCTF2024--Crypto-wp", "link": "https://xz.aliyun.com/t/16875", "published": "2024-12-22T16:19:45+08:00", "id": "https://xz.aliyun.com/t/16875", "summary": { "@type": "html", "#text": "LitCTF2024--Crypto-wp" } }, { "title": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)", "link": "https://xz.aliyun.com/t/16874", "published": "2024-12-22T16:15:09+08:00", "id": "https://xz.aliyun.com/t/16874", "summary": { "@type": "html", "#text": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)" } }, { "title": "Linux渗透实战之HTB-Heal", "link": "https://xz.aliyun.com/t/16873", "published": "2024-12-22T15:13:56+08:00", "id": "https://xz.aliyun.com/t/16873", "summary": { "@type": "html", "#text": "Linux渗透实战之HTB-Heal" } }, { "title": "春秋云境-多维挑战-CloudNet-WP", "link": "https://xz.aliyun.com/t/16872", "published": "2024-12-22T03:40:12+08:00", "id": "https://xz.aliyun.com/t/16872", "summary": { "@type": "html", "#text": "春秋云境-多维挑战-CloudNet-WP" } }, { "title": "另辟蹊径的bypass方式", "link": "https://xz.aliyun.com/t/16871", "published": "2024-12-22T00:16:30+08:00", "id": "https://xz.aliyun.com/t/16871", "summary": { "@type": "html", "#text": "另辟蹊径的bypass方式" } }, { "title": "国城杯线下web出题思路分享", "link": "https://xz.aliyun.com/t/16870", "published": "2024-12-21T23:05:12+08:00", "id": "https://xz.aliyun.com/t/16870", "summary": { "@type": "html", "#text": "国城杯线下web出题思路分享" } }, { "title": "国城杯线下决赛master_ast题解", "link": "https://xz.aliyun.com/t/16869", "published": "2024-12-21T21:44:07+08:00", "id": "https://xz.aliyun.com/t/16869", "summary": { "@type": "html", "#text": "国城杯线下决赛master_ast题解" } }, { "title": "暴力通关,PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解", "link": "https://xz.aliyun.com/t/16867", "published": "2024-12-21T20:50:08+08:00", "id": "https://xz.aliyun.com/t/16867", "summary": { "@type": "html", "#text": "暴力通关,PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解" } }, { "title": "DASCTF 2024最后一战|寒夜破晓,冬至终章(部分wp)", "link": "https://xz.aliyun.com/t/16866", "published": "2024-12-21T20:16:12+08:00", "id": "https://xz.aliyun.com/t/16866", "summary": { "@type": "html", "#text": "DASCTF 2024最后一战|寒夜破晓,冬至终章(部分wp)" } }, { "title": "2024 DASCTF const_python详解", "link": "https://xz.aliyun.com/t/16864", "published": "2024-12-21T19:51:16+08:00", "id": "https://xz.aliyun.com/t/16864", "summary": { "@type": "html", "#text": "2024 DASCTF const_python详解" } }, { "title": "Zeropz-楚慧杯L组WP", "link": "https://xz.aliyun.com/t/16863", "published": "2024-12-21T19:44:53+08:00", "id": "https://xz.aliyun.com/t/16863", "summary": { "@type": "html", "#text": "Zeropz-楚慧杯L组WP" } }, { "title": "Dirty Pagetable 学习 & 例题", "link": "https://xz.aliyun.com/t/16862", "published": "2024-12-21T19:23:38+08:00", "id": "https://xz.aliyun.com/t/16862", "summary": { "@type": "html", "#text": "Dirty Pagetable 学习 & 例题" } }, { "title": "针对单一系统渗透测试", "link": "https://xz.aliyun.com/t/16861", "published": "2024-12-21T19:21:15+08:00", "id": "https://xz.aliyun.com/t/16861", "summary": { "@type": "html", "#text": "针对单一系统渗透测试" } }, { "title": "Cross cache Attack技术细节分析", "link": "https://xz.aliyun.com/t/16860", "published": "2024-12-21T19:19:11+08:00", "id": "https://xz.aliyun.com/t/16860", "summary": { "@type": "html", "#text": "Cross cache Attack技术细节分析" } }, { "title": "某某语音auth值生成分析", "link": "https://xz.aliyun.com/t/16859", "published": "2024-12-21T17:59:50+08:00", "id": "https://xz.aliyun.com/t/16859", "summary": { "@type": "html", "#text": "某某语音auth值生成分析" } }, { "title": "蓝队—反钓鱼的策略提供", "link": "https://xz.aliyun.com/t/16858", "published": "2024-12-21T17:12:06+08:00", "id": "https://xz.aliyun.com/t/16858", "summary": { "@type": "html", "#text": "蓝队—反钓鱼的策略提供" } }, { "title": "windows内核进程遍历常见方式", "link": "https://xz.aliyun.com/t/16857", "published": "2024-12-21T16:38:04+08:00", "id": "https://xz.aliyun.com/t/16857", "summary": { "@type": "html", "#text": "windows内核进程遍历常见方式" } }, { "title": "ez_zhuawa出题记录", "link": "https://xz.aliyun.com/t/16856", "published": "2024-12-21T15:44:09+08:00", "id": "https://xz.aliyun.com/t/16856", "summary": { "@type": "html", "#text": "ez_zhuawa出题记录" } }, { "title": "Windows内核回调", "link": "https://xz.aliyun.com/t/16855", "published": "2024-12-21T15:17:48+08:00", "id": "https://xz.aliyun.com/t/16855", "summary": { "@type": "html", "#text": "Windows内核回调" } }, { "title": "Linux渗透实战之不一样的XSS", "link": "https://xz.aliyun.com/t/16853", "published": "2024-12-21T10:53:08+08:00", "id": "https://xz.aliyun.com/t/16853", "summary": { "@type": "html", "#text": "Linux渗透实战之不一样的XSS" } }, { "title": "基于优化的大模型越狱技术分析与实战", "link": "https://xz.aliyun.com/t/16852", "published": "2024-12-20T21:17:55+08:00", "id": "https://xz.aliyun.com/t/16852", "summary": { "@type": "html", "#text": "基于优化的大模型越狱技术分析与实战" } }, { "title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE", "link": "https://xz.aliyun.com/t/16850", "published": "2024-12-20T18:55:42+08:00", "id": "https://xz.aliyun.com/t/16850", "summary": { "@type": "html", "#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE" } }, { "title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解", "link": "https://xz.aliyun.com/t/16849", "published": "2024-12-20T17:24:00+08:00", "id": "https://xz.aliyun.com/t/16849", "summary": { "@type": "html", "#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解" } }, { "title": "代码审计-某物联网系统RCE", "link": "https://xz.aliyun.com/t/16848", "published": "2024-12-20T17:19:40+08:00", "id": "https://xz.aliyun.com/t/16848", "summary": { "@type": "html", "#text": "代码审计-某物联网系统RCE" } }, { "title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP", "link": "https://xz.aliyun.com/t/16847", "published": "2024-12-20T17:10:07+08:00", "id": "https://xz.aliyun.com/t/16847", "summary": { "@type": "html", "#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP" } }, { "title": "某系统审计权限绕过-CVE-2024-9554", "link": "https://xz.aliyun.com/t/16845", "published": "2024-12-20T16:53:05+08:00", "id": "https://xz.aliyun.com/t/16845", "summary": { "@type": "html", "#text": "某系统审计权限绕过-CVE-2024-9554" } }, { "title": "某系统代码审计到getshell", "link": "https://xz.aliyun.com/t/16841", "published": "2024-12-20T16:08:09+08:00", "id": "https://xz.aliyun.com/t/16841", "summary": { "@type": "html", "#text": "某系统代码审计到getshell" } }, { "title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto", "link": "https://xz.aliyun.com/t/16846", "published": "2024-12-20T14:30:16+08:00", "id": "https://xz.aliyun.com/t/16846", "summary": { "@type": "html", "#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto" } }, { "title": "银狐黑产组织最新免杀样本详细分析", "link": "https://xz.aliyun.com/t/16837", "published": "2024-12-20T08:17:20+08:00", "id": "https://xz.aliyun.com/t/16837", "summary": { "@type": "html", "#text": "银狐黑产组织最新免杀样本详细分析" } }, { "title": "初识AFL:工具安装与基本用法", "link": "https://xz.aliyun.com/t/16836", "published": "2024-12-20T03:07:30+08:00", "id": "https://xz.aliyun.com/t/16836", "summary": { "@type": "html", "#text": "初识AFL:工具安装与基本用法" } }, { "title": "某渗透中代码审计到内网遨游", "link": "https://xz.aliyun.com/t/16835", "published": "2024-12-19T21:53:53+08:00", "id": "https://xz.aliyun.com/t/16835", "summary": { "@type": "html", "#text": "某渗透中代码审计到内网遨游" } }, { "title": "Pointer Overflow CTF - 2024 Web全write up", "link": "https://xz.aliyun.com/t/16834", "published": "2024-12-19T20:58:58+08:00", "id": "https://xz.aliyun.com/t/16834", "summary": { "@type": "html", "#text": "Pointer Overflow CTF - 2024 Web全write up" } }, { "title": "浅析实战攻防中的信息收集", "link": "https://xz.aliyun.com/t/16832", "published": "2024-12-19T16:32:00+08:00", "id": "https://xz.aliyun.com/t/16832", "summary": { "@type": "html", "#text": "浅析实战攻防中的信息收集" } }, { "title": "Spring FatJar写文件到RCE分析", "link": "https://xz.aliyun.com/t/16831", "published": "2024-12-19T16:04:00+08:00", "id": "https://xz.aliyun.com/t/16831", "summary": { "@type": "html", "#text": "Spring FatJar写文件到RCE分析" } }, { "title": "应急响应记录之水坑挂马事件分析与恢复", "link": "https://xz.aliyun.com/t/16829", "published": "2024-12-19T14:27:41+08:00", "id": "https://xz.aliyun.com/t/16829", "summary": { "@type": "html", "#text": "应急响应记录之水坑挂马事件分析与恢复" } }, { "title": "万字长文窥探信息收集真正的艺术", "link": "https://xz.aliyun.com/t/16828", "published": "2024-12-19T13:57:53+08:00", "id": "https://xz.aliyun.com/t/16828", "summary": { "@type": "html", "#text": "万字长文窥探信息收集真正的艺术" } }, { "title": "记一次5000万资产的渗透测试", "link": "https://xz.aliyun.com/t/16827", "published": "2024-12-19T12:34:52+08:00", "id": "https://xz.aliyun.com/t/16827", "summary": { "@type": "html", "#text": "记一次5000万资产的渗透测试" } }, { "title": "一次 house of force 练习:HTB pwn - Fancy names", "link": "https://xz.aliyun.com/t/16825", "published": "2024-12-19T11:41:53+08:00", "id": "https://xz.aliyun.com/t/16825", "summary": { "@type": "html", "#text": "一次 house of force 练习:HTB pwn - Fancy names" } }, { "title": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞", "link": "https://xz.aliyun.com/t/16824", "published": "2024-12-19T11:13:41+08:00", "id": "https://xz.aliyun.com/t/16824", "summary": { "@type": "html", "#text": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞" } }, { "title": "面向GPTs的提示词注入攻击分析", "link": "https://xz.aliyun.com/t/16816", "published": "2024-12-18T23:23:30+08:00", "id": "https://xz.aliyun.com/t/16816", "summary": { "@type": "html", "#text": "面向GPTs的提示词注入攻击分析" } }, { "title": "PE文件代码注入", "link": "https://xz.aliyun.com/t/16815", "published": "2024-12-18T23:11:47+08:00", "id": "https://xz.aliyun.com/t/16815", "summary": { "@type": "html", "#text": "PE文件代码注入" } }, { "title": "域渗透实战之HTB-Certified", "link": "https://xz.aliyun.com/t/16813", "published": "2024-12-18T20:59:47+08:00", "id": "https://xz.aliyun.com/t/16813", "summary": { "@type": "html", "#text": "域渗透实战之HTB-Certified" } }, { "title": "2025 ciscn novel1详细解析", "link": "https://xz.aliyun.com/t/16811", "published": "2024-12-18T19:16:12+08:00", "id": "https://xz.aliyun.com/t/16811", "summary": { "@type": "html", "#text": "2025 ciscn novel1详细解析" } }, { "title": "先知安全沙龙(上海站) - 后渗透阶段主机关键信息自动化狩猎的实现与应用", "link": "https://xz.aliyun.com/t/16823", "published": "2024-12-18T16:39:00+08:00", "id": "https://xz.aliyun.com/t/16823", "summary": { "@type": "html", "#text": "先知安全沙龙(上海站) - 后渗透阶段主机关键信息自动化狩猎的实现与应用" } }, { "title": "先知安全沙龙(上海站) - 红队武器开发之基于合法服务的隐蔽C2", "link": "https://xz.aliyun.com/t/16821", "published": "2024-12-18T16:38:00+08:00", "id": "https://xz.aliyun.com/t/16821", "summary": { "@type": "html", "#text": "先知安全沙龙(上海站) - 红队武器开发之基于合法服务的隐蔽C2" } }, { "title": "先知安全沙龙(上海站) - Linux沙箱技术(权限机制、资源隔离与安全防御)", "link": "https://xz.aliyun.com/t/16820", "published": "2024-12-18T16:37:00+08:00", "id": "https://xz.aliyun.com/t/16820", "summary": { "@type": "html", "#text": "先知安全沙龙(上海站) - Linux沙箱技术(权限机制、资源隔离与安全防御)" } }, { "title": "先知安全沙龙(上海站) - 终端安全对抗及防护", "link": "https://xz.aliyun.com/t/16819", "published": "2024-12-18T16:36:00+08:00", "id": "https://xz.aliyun.com/t/16819", "summary": { "@type": "html", "#text": "先知安全沙龙(上海站) - 终端安全对抗及防护" } }, { "title": "先知安全沙龙(上海站) - 大模型基础设施安全攻防", "link": "https://xz.aliyun.com/t/16818", "published": "2024-12-18T16:35:00+08:00", "id": "https://xz.aliyun.com/t/16818", "summary": { "@type": "html", "#text": "先知安全沙龙(上海站) - 大模型基础设施安全攻防" } }, { "title": "Sharp4RemoveLog:一款通过调用wevtutil进程实现痕迹清理的工具", "link": "https://xz.aliyun.com/t/16809", "published": "2024-12-18T16:07:07+08:00", "id": "https://xz.aliyun.com/t/16809", "summary": { "@type": "html", "#text": "Sharp4RemoveLog:一款通过调用wevtutil进程实现痕迹清理的工具" } }, { "title": "Guns后台任意文件上传漏洞分析", "link": "https://xz.aliyun.com/t/16808", "published": "2024-12-18T15:37:32+08:00", "id": "https://xz.aliyun.com/t/16808", "summary": { "@type": "html", "#text": "Guns后台任意文件上传漏洞分析" } }, { "title": "红队权限维持策略——实用版(r3-r0)", "link": "https://xz.aliyun.com/t/16806", "published": "2024-12-17T23:25:10+08:00", "id": "https://xz.aliyun.com/t/16806", "summary": { "@type": "html", "#text": "红队权限维持策略——实用版(r3-r0)" } }, { "title": "最近做的一些有意思的ctf赛题详细分析", "link": "https://xz.aliyun.com/t/16805", "published": "2024-12-17T21:53:01+08:00", "id": "https://xz.aliyun.com/t/16805", "summary": { "@type": "html", "#text": "最近做的一些有意思的ctf赛题详细分析" } }, { "title": "CTF一些有意思考点+例题详细分析系列", "link": "https://xz.aliyun.com/t/16804", "published": "2024-12-17T21:09:18+08:00", "id": "https://xz.aliyun.com/t/16804", "summary": { "@type": "html", "#text": "CTF一些有意思考点+例题详细分析系列" } }, { "title": "从hello-web入手反混淆和disable_function绕过", "link": "https://xz.aliyun.com/t/16802", "published": "2024-12-17T20:35:00+08:00", "id": "https://xz.aliyun.com/t/16802", "summary": { "@type": "html", "#text": "从hello-web入手反混淆和disable_function绕过" } }, { "title": "2024国城杯线上signal出题文档", "link": "https://xz.aliyun.com/t/16801", "published": "2024-12-17T19:55:08+08:00", "id": "https://xz.aliyun.com/t/16801", "summary": { "@type": "html", "#text": "2024国城杯线上signal出题文档" } }, { "title": "深入Pyd逆向", "link": "https://xz.aliyun.com/t/16800", "published": "2024-12-17T15:47:44+08:00", "id": "https://xz.aliyun.com/t/16800", "summary": { "@type": "html", "#text": "深入Pyd逆向" } }, { "title": "CVE-2022-0874漏洞复现——Linux内核splice系统调用未正确初始化管道缓存漏洞分析(文末附EXP代码)", "link": "https://xz.aliyun.com/t/16798", "published": "2024-12-17T13:59:06+08:00", "id": "https://xz.aliyun.com/t/16798", "summary": { "@type": "html", "#text": "CVE-2022-0874漏洞复现——Linux内核splice系统调用未正确初始化管道缓存漏洞分析(文末附EXP代码)" } }, { "title": "DocSys代码审计", "link": "https://xz.aliyun.com/t/16797", "published": "2024-12-17T13:57:15+08:00", "id": "https://xz.aliyun.com/t/16797", "summary": { "@type": "html", "#text": "DocSys代码审计" } }, { "title": "oppo a53 5g unlocktool 强解bl锁,magisk工具root [小白避坑篇]", "link": "https://xz.aliyun.com/t/16796", "published": "2024-12-17T13:55:52+08:00", "id": "https://xz.aliyun.com/t/16796", "summary": { "@type": "html", "#text": "oppo a53 5g unlocktool 强解bl锁,magisk工具root [小白避坑篇]" } }, { "title": "LitCTF2024--Misc全wp", "link": "https://xz.aliyun.com/t/16795", "published": "2024-12-17T12:36:41+08:00", "id": "https://xz.aliyun.com/t/16795", "summary": { "@type": "html", "#text": "LitCTF2024--Misc全wp" } }, { "title": "HTB-University CTF 2024 Binary Badlands 的 Forensics 部分WP", "link": "https://xz.aliyun.com/t/16794", "published": "2024-12-17T09:55:02+08:00", "id": "https://xz.aliyun.com/t/16794", "summary": { "@type": "html", "#text": "HTB-University CTF 2024 Binary Badlands 的 Forensics 部分WP" } }, { "title": "浅析Ruby类污染及其在Sinatra框架下的利用", "link": "https://xz.aliyun.com/t/16792", "published": "2024-12-16T23:26:40+08:00", "id": "https://xz.aliyun.com/t/16792", "summary": { "@type": "html", "#text": "浅析Ruby类污染及其在Sinatra框架下的利用" } }, { "title": "Pipe管道利用研究分享", "link": "https://xz.aliyun.com/t/16790", "published": "2024-12-16T20:30:00+08:00", "id": "https://xz.aliyun.com/t/16790", "summary": { "@type": "html", "#text": "Pipe管道利用研究分享" } }, { "title": "对ssti无回显的新版内存马学习", "link": "https://xz.aliyun.com/t/16787", "published": "2024-12-16T15:37:55+08:00", "id": "https://xz.aliyun.com/t/16787", "summary": { "@type": "html", "#text": "对ssti无回显的新版内存马学习" } }, { "title": "域渗透实战之HTB-Vintage", "link": "https://xz.aliyun.com/t/16785", "published": "2024-12-16T13:39:10+08:00", "id": "https://xz.aliyun.com/t/16785", "summary": { "@type": "html", "#text": "域渗透实战之HTB-Vintage" } }, { "title": "实战演示 BurpSuite 插件 SignMe 安装和使用,有签名的接口也可以爆破了", "link": "https://xz.aliyun.com/t/16780", "published": "2024-12-16T12:08:51+08:00", "id": "https://xz.aliyun.com/t/16780", "summary": { "@type": "html", "#text": "实战演示 BurpSuite 插件 SignMe 安装和使用,有签名的接口也可以爆破了" } }, { "title": "Apache Common Jelly Remote Code Execution", "link": "https://xz.aliyun.com/t/16779", "published": "2024-12-16T10:15:19+08:00", "id": "https://xz.aliyun.com/t/16779", "summary": { "@type": "html", "#text": "Apache Common Jelly Remote Code Execution" } }, { "title": "第十八届信息安全大赛 && 第二届长城杯 0解PWN题--server解法", "link": "https://xz.aliyun.com/t/16778", "published": "2024-12-16T10:01:00+08:00", "id": "https://xz.aliyun.com/t/16778", "summary": { "@type": "html", "#text": "第十八届信息安全大赛 && 第二届长城杯 0解PWN题--server解法" } }, { "title": "免杀基础-ppid伪造", "link": "https://xz.aliyun.com/t/16777", "published": "2024-12-16T10:00:14+08:00", "id": "https://xz.aliyun.com/t/16777", "summary": { "@type": "html", "#text": "免杀基础-ppid伪造" } }, { "title": "高效IO攻击利用学习之House of apple2超详解", "link": "https://xz.aliyun.com/t/16775", "published": "2024-12-16T00:37:35+08:00", "id": "https://xz.aliyun.com/t/16775", "summary": { "@type": "html", "#text": "高效IO攻击利用学习之House of apple2超详解" } }, { "title": "第十八届信息安全大赛 && 第二届长城杯 - Crypto详解", "link": "https://xz.aliyun.com/t/16773", "published": "2024-12-15T22:42:00+08:00", "id": "https://xz.aliyun.com/t/16773", "summary": { "@type": "html", "#text": "第十八届信息安全大赛 && 第二届长城杯 - Crypto详解" } }, { "title": "m0leCon Beginner CTF2024部分wp", "link": "https://xz.aliyun.com/t/16772", "published": "2024-12-15T21:31:48+08:00", "id": "https://xz.aliyun.com/t/16772", "summary": { "@type": "html", "#text": "m0leCon Beginner CTF2024部分wp" } }, { "title": "Ucum-java XXE漏洞分析(CVE-2024-55887)", "link": "https://xz.aliyun.com/t/16771", "published": "2024-12-15T21:04:00+08:00", "id": "https://xz.aliyun.com/t/16771", "summary": { "@type": "html", "#text": "Ucum-java XXE漏洞分析(CVE-2024-55887)" } }, { "title": "第十八届信息安全大赛 && 第二届长城杯 - re", "link": "https://xz.aliyun.com/t/16766", "published": "2024-12-15T18:21:26+08:00", "id": "https://xz.aliyun.com/t/16766", "summary": { "@type": "html", "#text": "第十八届信息安全大赛 && 第二届长城杯 - re" } }, { "title": "第十八届信息安全大赛 && 第二届长城杯 - zeroshell1~5,WinFT_1~2,sc05_1", "link": "https://xz.aliyun.com/t/16759", "published": "2024-12-15T17:26:01+08:00", "id": "https://xz.aliyun.com/t/16759", "summary": { "@type": "html", "#text": "第十八届信息安全大赛 && 第二届长城杯 - zeroshell1~5,WinFT_1~2,sc05_1" } }, { "title": "第二届“长城杯”铁人三项赛 (防护赛)初赛WriteUP", "link": "https://xz.aliyun.com/t/16789", "published": "2024-12-15T17:26:01+08:00", "id": "https://xz.aliyun.com/t/16789", "summary": { "@type": "html", "#text": "第二届“长城杯”铁人三项赛 (防护赛)初赛WriteUP" } }, { "title": "第十八届信息安全大赛 && 第二届长城杯 - web&re wp", "link": "https://xz.aliyun.com/t/16755", "published": "2024-12-15T17:14:30+08:00", "id": "https://xz.aliyun.com/t/16755", "summary": { "@type": "html", "#text": "第十八届信息安全大赛 && 第二届长城杯 - web&re wp" } }, { "title": "第十八届信息安全大赛 && 第二届长城杯 - pwn", "link": "https://xz.aliyun.com/t/16751", "published": "2024-12-15T17:05:55+08:00", "id": "https://xz.aliyun.com/t/16751", "summary": { "@type": "html", "#text": "第十八届信息安全大赛 && 第二届长城杯 - pwn" } }, { "title": "第十八届信息安全大赛 && 第二届长城杯 - WEB WP", "link": "https://xz.aliyun.com/t/16750", "published": "2024-12-15T17:02:06+08:00", "id": "https://xz.aliyun.com/t/16750", "summary": { "@type": "html", "#text": "第十八届信息安全大赛 && 第二届长城杯 - WEB WP" } }, { "title": "HITCTF pipe_snake详解", "link": "https://xz.aliyun.com/t/16748", "published": "2024-12-15T09:25:49+08:00", "id": "https://xz.aliyun.com/t/16748", "summary": { "@type": "html", "#text": "HITCTF pipe_snake详解" } }, { "title": "记一次客户系统的测试--多种经典类型漏洞", "link": "https://xz.aliyun.com/t/16747", "published": "2024-12-14T23:33:38+08:00", "id": "https://xz.aliyun.com/t/16747", "summary": { "@type": "html", "#text": "记一次客户系统的测试--多种经典类型漏洞" } }, { "title": "记一次渗透到审计", "link": "https://xz.aliyun.com/t/16746", "published": "2024-12-14T21:23:00+08:00", "id": "https://xz.aliyun.com/t/16746", "summary": { "@type": "html", "#text": "记一次渗透到审计" } }, { "title": "某次大学的渗透测试经历", "link": "https://xz.aliyun.com/t/16745", "published": "2024-12-14T16:51:12+08:00", "id": "https://xz.aliyun.com/t/16745", "summary": { "@type": "html", "#text": "某次大学的渗透测试经历" } } ]