[ { "title": "代码审计 - MCMS v5.4.1 0day挖掘", "link": "https://xz.aliyun.com/t/16630", "published": "2024-12-08T15:33:10+08:00", "id": "https://xz.aliyun.com/t/16630", "summary": { "@type": "html", "#text": "代码审计 - MCMS v5.4.1 0day挖掘" } }, { "title": "从HECTF ezjava 入手 Vaadin 调用链挖掘", "link": "https://xz.aliyun.com/t/16627", "published": "2024-12-08T13:06:14+08:00", "id": "https://xz.aliyun.com/t/16627", "summary": { "@type": "html", "#text": "从HECTF ezjava 入手 Vaadin 调用链挖掘" } }, { "title": "x86汇编与编写shellcode", "link": "https://xz.aliyun.com/t/16626", "published": "2024-12-08T11:49:46+08:00", "id": "https://xz.aliyun.com/t/16626", "summary": { "@type": "html", "#text": "x86汇编与编写shellcode" } }, { "title": "PolarCTF-2024冬季赛 (WEB)", "link": "https://xz.aliyun.com/t/16624", "published": "2024-12-08T10:49:52+08:00", "id": "https://xz.aliyun.com/t/16624", "summary": { "@type": "html", "#text": "PolarCTF-2024冬季赛 (WEB)" } }, { "title": "PE 文件结构剖析:手工压缩与注入实战", "link": "https://xz.aliyun.com/t/16622", "published": "2024-12-08T02:05:35+08:00", "id": "https://xz.aliyun.com/t/16622", "summary": { "@type": "html", "#text": "PE 文件结构剖析:手工压缩与注入实战" } }, { "title": "qwb-final-dataease代码审计", "link": "https://xz.aliyun.com/t/16620", "published": "2024-12-07T22:56:00+08:00", "id": "https://xz.aliyun.com/t/16620", "summary": { "@type": "html", "#text": "qwb-final-dataease代码审计" } }, { "title": "2024 国城杯 WriteUp", "link": "https://xz.aliyun.com/t/16615", "published": "2024-12-07T19:16:17+08:00", "id": "https://xz.aliyun.com/t/16615", "summary": { "@type": "html", "#text": "2024 国城杯 WriteUp" } }, { "title": "2024 国城杯取证 Just_F0r3n51Cs", "link": "https://xz.aliyun.com/t/16612", "published": "2024-12-07T17:25:45+08:00", "id": "https://xz.aliyun.com/t/16612", "summary": { "@type": "html", "#text": "2024 国城杯取证 Just_F0r3n51Cs" } }, { "title": "如何HOST碰撞挖掘隐蔽资产", "link": "https://xz.aliyun.com/t/16611", "published": "2024-12-07T17:10:22+08:00", "id": "https://xz.aliyun.com/t/16611", "summary": { "@type": "html", "#text": "如何HOST碰撞挖掘隐蔽资产" } }, { "title": "2024国城杯初赛 re部分wp", "link": "https://xz.aliyun.com/t/16610", "published": "2024-12-07T17:10:19+08:00", "id": "https://xz.aliyun.com/t/16610", "summary": { "@type": "html", "#text": "2024国城杯初赛 re部分wp" } }, { "title": "分析探究Java原生链反序列化绕过高版本fastjson打Spring马", "link": "https://xz.aliyun.com/t/16608", "published": "2024-12-07T16:46:56+08:00", "id": "https://xz.aliyun.com/t/16608", "summary": { "@type": "html", "#text": "分析探究Java原生链反序列化绕过高版本fastjson打Spring马" } }, { "title": "记一道CC6-TemplatesImpl链和Jackson原链打Spring内存马的利用", "link": "https://xz.aliyun.com/t/16601", "published": "2024-12-07T16:45:23+08:00", "id": "https://xz.aliyun.com/t/16601", "summary": { "@type": "html", "#text": "记一道CC6-TemplatesImpl链和Jackson原链打Spring内存马的利用" } }, { "title": "强网杯S8决赛RW赛道", "link": "https://xz.aliyun.com/t/16607", "published": "2024-12-07T16:39:52+08:00", "id": "https://xz.aliyun.com/t/16607", "summary": { "@type": "html", "#text": "强网杯S8决赛RW赛道" } }, { "title": "2024国城杯pwn详细全解", "link": "https://xz.aliyun.com/t/16606", "published": "2024-12-07T16:27:51+08:00", "id": "https://xz.aliyun.com/t/16606", "summary": { "@type": "html", "#text": "2024国城杯pwn详细全解" } }, { "title": "2024国城杯线上Crypto-WP", "link": "https://xz.aliyun.com/t/16605", "published": "2024-12-07T16:10:19+08:00", "id": "https://xz.aliyun.com/t/16605", "summary": { "@type": "html", "#text": "2024国城杯线上Crypto-WP" } }, { "title": "强网S8决赛JsonPcikle Safe模式下的RCE与绕过分析研究", "link": "https://xz.aliyun.com/t/16604", "published": "2024-12-07T16:07:00+08:00", "id": "https://xz.aliyun.com/t/16604", "summary": { "@type": "html", "#text": "强网S8决赛JsonPcikle Safe模式下的RCE与绕过分析研究" } }, { "title": "Pyramid 框架SSTI分析RCE", "link": "https://xz.aliyun.com/t/16600", "published": "2024-12-07T13:37:25+08:00", "id": "https://xz.aliyun.com/t/16600", "summary": { "@type": "html", "#text": "Pyramid 框架SSTI分析RCE" } }, { "title": "apk修改实践:绕过强制更新弹窗", "link": "https://xz.aliyun.com/t/16599", "published": "2024-12-07T11:02:35+08:00", "id": "https://xz.aliyun.com/t/16599", "summary": { "@type": "html", "#text": "apk修改实践:绕过强制更新弹窗" } }, { "title": "浅析异常线程检测逻辑(unbacked)", "link": "https://xz.aliyun.com/t/16598", "published": "2024-12-07T10:30:27+08:00", "id": "https://xz.aliyun.com/t/16598", "summary": { "@type": "html", "#text": "浅析异常线程检测逻辑(unbacked)" } }, { "title": "boofuzz 中的 Request 和 Path 源码分析", "link": "https://xz.aliyun.com/t/16594", "published": "2024-12-07T02:06:10+08:00", "id": "https://xz.aliyun.com/t/16594", "summary": { "@type": "html", "#text": "boofuzz 中的 Request 和 Path 源码分析" } }, { "title": "云函数实现代理绕过IP封锁", "link": "https://xz.aliyun.com/t/16589", "published": "2024-12-06T22:46:00+08:00", "id": "https://xz.aliyun.com/t/16589", "summary": { "@type": "html", "#text": "云函数实现代理绕过IP封锁" } }, { "title": "CVE-2024-4181 run-llama/llama_index-SSE Command Injection分析", "link": "https://xz.aliyun.com/t/16588", "published": "2024-12-06T22:34:00+08:00", "id": "https://xz.aliyun.com/t/16588", "summary": { "@type": "html", "#text": "CVE-2024-4181 run-llama/llama_index-SSE Command Injection分析" } }, { "title": "若依一把梭哈工具源码分析", "link": "https://xz.aliyun.com/t/16586", "published": "2024-12-06T22:31:35+08:00", "id": "https://xz.aliyun.com/t/16586", "summary": { "@type": "html", "#text": "若依一把梭哈工具源码分析" } }, { "title": "CVE-2024-3408 D-tale bypassRCE分析", "link": "https://xz.aliyun.com/t/16587", "published": "2024-12-06T22:31:00+08:00", "id": "https://xz.aliyun.com/t/16587", "summary": { "@type": "html", "#text": "CVE-2024-3408 D-tale bypassRCE分析" } }, { "title": "S8强网杯 ez_login详解", "link": "https://xz.aliyun.com/t/16582", "published": "2024-12-06T20:08:01+08:00", "id": "https://xz.aliyun.com/t/16582", "summary": { "@type": "html", "#text": "S8强网杯 ez_login详解" } }, { "title": "S8强网杯Final-thinkshopplus", "link": "https://xz.aliyun.com/t/16581", "published": "2024-12-06T19:01:00+08:00", "id": "https://xz.aliyun.com/t/16581", "summary": { "@type": "html", "#text": "S8强网杯Final-thinkshopplus" } }, { "title": "gRPC&Go: XCTF联赛DubheCTF2024 - ggbond 详细题解", "link": "https://xz.aliyun.com/t/16580", "published": "2024-12-06T17:51:46+08:00", "id": "https://xz.aliyun.com/t/16580", "summary": { "@type": "html", "#text": "gRPC&Go: XCTF联赛DubheCTF2024 - ggbond 详细题解" } }, { "title": "免杀基础-shellcode开发", "link": "https://xz.aliyun.com/t/16579", "published": "2024-12-06T15:19:56+08:00", "id": "https://xz.aliyun.com/t/16579", "summary": { "@type": "html", "#text": "免杀基础-shellcode开发" } }, { "title": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(二)", "link": "https://xz.aliyun.com/t/16577", "published": "2024-12-06T14:10:30+08:00", "id": "https://xz.aliyun.com/t/16577", "summary": { "@type": "html", "#text": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(二)" } }, { "title": "JFinal CMS 5.1.0 命令执行漏洞分析(CVE-2024-53477)", "link": "https://xz.aliyun.com/t/16575", "published": "2024-12-06T13:27:00+08:00", "id": "https://xz.aliyun.com/t/16575", "summary": { "@type": "html", "#text": "JFinal CMS 5.1.0 命令执行漏洞分析(CVE-2024-53477)" } }, { "title": "Sharp4Killdefender:通过修改注册表关闭Windows Defender", "link": "https://xz.aliyun.com/t/16574", "published": "2024-12-06T13:00:24+08:00", "id": "https://xz.aliyun.com/t/16574", "summary": { "@type": "html", "#text": "Sharp4Killdefender:通过修改注册表关闭Windows Defender" } }, { "title": "从一道java题体验 scxml漏洞", "link": "https://xz.aliyun.com/t/16572", "published": "2024-12-06T12:13:03+08:00", "id": "https://xz.aliyun.com/t/16572", "summary": { "@type": "html", "#text": "从一道java题体验 scxml漏洞" } }, { "title": "一次Telegram窃取程序的深入解析:从技术细节到定位攻击者账户的完整流程", "link": "https://xz.aliyun.com/t/16570", "published": "2024-12-06T12:01:42+08:00", "id": "https://xz.aliyun.com/t/16570", "summary": { "@type": "html", "#text": "一次Telegram窃取程序的深入解析:从技术细节到定位攻击者账户的完整流程" } }, { "title": "CVE-2018-1270 spring-messaging RCE 深入分析", "link": "https://xz.aliyun.com/t/16569", "published": "2024-12-06T11:44:58+08:00", "id": "https://xz.aliyun.com/t/16569", "summary": { "@type": "html", "#text": "CVE-2018-1270 spring-messaging RCE 深入分析" } }, { "title": "DTStack Taier 1.4.0 listNames sql注入分析(CVE-2024-41579)", "link": "https://xz.aliyun.com/t/16568", "published": "2024-12-06T11:08:37+08:00", "id": "https://xz.aliyun.com/t/16568", "summary": { "@type": "html", "#text": "DTStack Taier 1.4.0 listNames sql注入分析(CVE-2024-41579)" } }, { "title": "基于environ变量的堆题攻击栈空间", "link": "https://xz.aliyun.com/t/16566", "published": "2024-12-05T22:29:29+08:00", "id": "https://xz.aliyun.com/t/16566", "summary": { "@type": "html", "#text": "基于environ变量的堆题攻击栈空间" } }, { "title": "burpsuite数据包自动加解密插件,autoDecoder详细安装+使用", "link": "https://xz.aliyun.com/t/16564", "published": "2024-12-05T16:57:14+08:00", "id": "https://xz.aliyun.com/t/16564", "summary": { "@type": "html", "#text": "burpsuite数据包自动加解密插件,autoDecoder详细安装+使用" } }, { "title": "一次红队恶意程序分析溯源", "link": "https://xz.aliyun.com/t/16563", "published": "2024-12-05T15:39:11+08:00", "id": "https://xz.aliyun.com/t/16563", "summary": { "@type": "html", "#text": "一次红队恶意程序分析溯源" } }, { "title": "深入异构 PWN:PowerPC&ARM&MIPS", "link": "https://xz.aliyun.com/t/16562", "published": "2024-12-05T14:23:42+08:00", "id": "https://xz.aliyun.com/t/16562", "summary": { "@type": "html", "#text": "深入异构 PWN:PowerPC&ARM&MIPS" } }, { "title": "llvm pass 初探", "link": "https://xz.aliyun.com/t/16558", "published": "2024-12-05T12:04:00+08:00", "id": "https://xz.aliyun.com/t/16558", "summary": { "@type": "html", "#text": "llvm pass 初探" } }, { "title": "从源码的角度学习 boofuzz 函数的使用", "link": "https://xz.aliyun.com/t/16554", "published": "2024-12-05T01:05:47+08:00", "id": "https://xz.aliyun.com/t/16554", "summary": { "@type": "html", "#text": "从源码的角度学习 boofuzz 函数的使用" } }, { "title": "分享最近攻防演练HVV漏洞复盘", "link": "https://xz.aliyun.com/t/16553", "published": "2024-12-04T21:11:09+08:00", "id": "https://xz.aliyun.com/t/16553", "summary": { "@type": "html", "#text": "分享最近攻防演练HVV漏洞复盘" } }, { "title": "伪装成ToDesk安装程序加载后门盗取数字货币", "link": "https://xz.aliyun.com/t/16552", "published": "2024-12-04T20:00:59+08:00", "id": "https://xz.aliyun.com/t/16552", "summary": { "@type": "html", "#text": "伪装成ToDesk安装程序加载后门盗取数字货币" } }, { "title": "Android逆向实战——以某APP跳过广告为例", "link": "https://xz.aliyun.com/t/16550", "published": "2024-12-04T17:38:00+08:00", "id": "https://xz.aliyun.com/t/16550", "summary": { "@type": "html", "#text": "Android逆向实战——以某APP跳过广告为例" } }, { "title": "webpwn的一些总结", "link": "https://xz.aliyun.com/t/16549", "published": "2024-12-04T17:20:50+08:00", "id": "https://xz.aliyun.com/t/16549", "summary": { "@type": "html", "#text": "webpwn的一些总结" } }, { "title": "Fastjson反序列化漏洞深度解析与利用和修复", "link": "https://xz.aliyun.com/t/16547", "published": "2024-12-04T15:18:05+08:00", "id": "https://xz.aliyun.com/t/16547", "summary": { "@type": "html", "#text": "Fastjson反序列化漏洞深度解析与利用和修复" } }, { "title": "2024金盾信安杯线上题目wp", "link": "https://xz.aliyun.com/t/16546", "published": "2024-12-04T15:08:41+08:00", "id": "https://xz.aliyun.com/t/16546", "summary": { "@type": "html", "#text": "2024金盾信安杯线上题目wp" } }, { "title": "高版本Fastjson反序列化Xtring新链和EventListenerList绕过", "link": "https://xz.aliyun.com/t/16540", "published": "2024-12-04T13:59:43+08:00", "id": "https://xz.aliyun.com/t/16540", "summary": { "@type": "html", "#text": "高版本Fastjson反序列化Xtring新链和EventListenerList绕过" } }, { "title": "域渗透入门靶机之HTB-Cicada", "link": "https://xz.aliyun.com/t/16539", "published": "2024-12-04T13:10:46+08:00", "id": "https://xz.aliyun.com/t/16539", "summary": { "@type": "html", "#text": "域渗透入门靶机之HTB-Cicada" } }, { "title": "java加载动态链接库绕过一些限制的思考", "link": "https://xz.aliyun.com/t/16538", "published": "2024-12-04T11:12:08+08:00", "id": "https://xz.aliyun.com/t/16538", "summary": { "@type": "html", "#text": "java加载动态链接库绕过一些限制的思考" } }, { "title": "从零构建:我的漏洞扫描器之旅", "link": "https://xz.aliyun.com/t/16537", "published": "2024-12-04T10:38:46+08:00", "id": "https://xz.aliyun.com/t/16537", "summary": { "@type": "html", "#text": "从零构建:我的漏洞扫描器之旅" } }, { "title": "CS代码审计配合Jdbc反序列化漏洞的利用", "link": "https://xz.aliyun.com/t/16536", "published": "2024-12-03T23:58:20+08:00", "id": "https://xz.aliyun.com/t/16536", "summary": { "@type": "html", "#text": "CS代码审计配合Jdbc反序列化漏洞的利用" } }, { "title": "从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复", "link": "https://xz.aliyun.com/t/16535", "published": "2024-12-03T23:57:40+08:00", "id": "https://xz.aliyun.com/t/16535", "summary": { "@type": "html", "#text": "从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复" } }, { "title": "某云音乐为例-反调试绕过,栈回溯,web算法逆向", "link": "https://xz.aliyun.com/t/16534", "published": "2024-12-03T23:50:24+08:00", "id": "https://xz.aliyun.com/t/16534", "summary": { "@type": "html", "#text": "某云音乐为例-反调试绕过,栈回溯,web算法逆向" } }, { "title": "2024睿抗网络安全初赛0解题——nopassword详解", "link": "https://xz.aliyun.com/t/16533", "published": "2024-12-03T22:29:02+08:00", "id": "https://xz.aliyun.com/t/16533", "summary": { "@type": "html", "#text": "2024睿抗网络安全初赛0解题——nopassword详解" } }, { "title": "某省移动网络安全技能竞赛决赛 个人赛第一名wp", "link": "https://xz.aliyun.com/t/16532", "published": "2024-12-03T21:45:11+08:00", "id": "https://xz.aliyun.com/t/16532", "summary": { "@type": "html", "#text": "某省移动网络安全技能竞赛决赛 个人赛第一名wp" } }, { "title": "Apache NiFi 高版本命令执行利用", "link": "https://xz.aliyun.com/t/16531", "published": "2024-12-03T20:44:14+08:00", "id": "https://xz.aliyun.com/t/16531", "summary": { "@type": "html", "#text": "Apache NiFi 高版本命令执行利用" } }, { "title": "WuCup 第一届“吾杯”网络安全技能大赛 WriteUp", "link": "https://xz.aliyun.com/t/16529", "published": "2024-12-03T17:34:27+08:00", "id": "https://xz.aliyun.com/t/16529", "summary": { "@type": "html", "#text": "WuCup 第一届“吾杯”网络安全技能大赛 WriteUp" } }, { "title": "记一次Go SSTI打SSRF到任意文件读", "link": "https://xz.aliyun.com/t/16527", "published": "2024-12-03T16:52:38+08:00", "id": "https://xz.aliyun.com/t/16527", "summary": { "@type": "html", "#text": "记一次Go SSTI打SSRF到任意文件读" } }, { "title": "极客大挑战 web week3&week4", "link": "https://xz.aliyun.com/t/16526", "published": "2024-12-03T16:48:02+08:00", "id": "https://xz.aliyun.com/t/16526", "summary": { "@type": "html", "#text": "极客大挑战 web week3&week4" } }, { "title": "jeepay v2.4.0反射型xss+存储型xss分析", "link": "https://xz.aliyun.com/t/16524", "published": "2024-12-03T15:40:58+08:00", "id": "https://xz.aliyun.com/t/16524", "summary": { "@type": "html", "#text": "jeepay v2.4.0反射型xss+存储型xss分析" } }, { "title": "JDBC Attack漫谈", "link": "https://xz.aliyun.com/t/16523", "published": "2024-12-03T14:51:00+08:00", "id": "https://xz.aliyun.com/t/16523", "summary": { "@type": "html", "#text": "JDBC Attack漫谈" } }, { "title": "2024鹏城杯线下赛复现", "link": "https://xz.aliyun.com/t/16522", "published": "2024-12-03T14:42:00+08:00", "id": "https://xz.aliyun.com/t/16522", "summary": { "@type": "html", "#text": "2024鹏城杯线下赛复现" } }, { "title": "MemoryModule的远程反射dll加载与一些没有实现的想法", "link": "https://xz.aliyun.com/t/16521", "published": "2024-12-03T11:58:34+08:00", "id": "https://xz.aliyun.com/t/16521", "summary": { "@type": "html", "#text": "MemoryModule的远程反射dll加载与一些没有实现的想法" } }, { "title": "禅道18.x-20.x版本漏洞挖掘思路分析", "link": "https://xz.aliyun.com/t/16520", "published": "2024-12-03T11:29:24+08:00", "id": "https://xz.aliyun.com/t/16520", "summary": { "@type": "html", "#text": "禅道18.x-20.x版本漏洞挖掘思路分析" } }, { "title": "THM靶场-Lookup-通关WriteUp", "link": "https://xz.aliyun.com/t/16517", "published": "2024-12-03T00:58:39+08:00", "id": "https://xz.aliyun.com/t/16517", "summary": { "@type": "html", "#text": "THM靶场-Lookup-通关WriteUp" } }, { "title": "哥斯拉源码解读+如何绕过waf检测", "link": "https://xz.aliyun.com/t/16515", "published": "2024-12-02T22:23:11+08:00", "id": "https://xz.aliyun.com/t/16515", "summary": { "@type": "html", "#text": "哥斯拉源码解读+如何绕过waf检测" } }, { "title": "反沙盒?一文足以", "link": "https://xz.aliyun.com/t/16514", "published": "2024-12-02T22:21:58+08:00", "id": "https://xz.aliyun.com/t/16514", "summary": { "@type": "html", "#text": "反沙盒?一文足以" } }, { "title": "unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例", "link": "https://xz.aliyun.com/t/16513", "published": "2024-12-02T21:16:53+08:00", "id": "https://xz.aliyun.com/t/16513", "summary": { "@type": "html", "#text": "unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例" } }, { "title": "IoT 安全从零到掌握:超详尽入门指南(实战篇)", "link": "https://xz.aliyun.com/t/16511", "published": "2024-12-02T20:23:35+08:00", "id": "https://xz.aliyun.com/t/16511", "summary": { "@type": "html", "#text": "IoT 安全从零到掌握:超详尽入门指南(实战篇)" } }, { "title": "记一次溯源真实案例", "link": "https://xz.aliyun.com/t/16510", "published": "2024-12-02T19:29:36+08:00", "id": "https://xz.aliyun.com/t/16510", "summary": { "@type": "html", "#text": "记一次溯源真实案例" } }, { "title": "IoT 安全从零到掌握:超详尽入门指南(基础篇)", "link": "https://xz.aliyun.com/t/16512", "published": "2024-12-02T18:17:18+08:00", "id": "https://xz.aliyun.com/t/16512", "summary": { "@type": "html", "#text": "IoT 安全从零到掌握:超详尽入门指南(基础篇)" } }, { "title": "2024 武数杯 RHG", "link": "https://xz.aliyun.com/t/16475", "published": "2024-12-02T16:17:00+08:00", "id": "https://xz.aliyun.com/t/16475", "summary": { "@type": "html", "#text": "2024 武数杯 RHG" } }, { "title": "2024年第一届吾杯解题writeup", "link": "https://xz.aliyun.com/t/16503", "published": "2024-12-01T23:40:00+08:00", "id": "https://xz.aliyun.com/t/16503", "summary": { "@type": "html", "#text": "2024年第一届吾杯解题writeup" } }, { "title": "记一次RAT的感染过程详细分析", "link": "https://xz.aliyun.com/t/16502", "published": "2024-12-01T23:10:00+08:00", "id": "https://xz.aliyun.com/t/16502", "summary": { "@type": "html", "#text": "记一次RAT的感染过程详细分析" } }, { "title": "2024古剑山初赛WP", "link": "https://xz.aliyun.com/t/16501", "published": "2024-12-01T20:34:07+08:00", "id": "https://xz.aliyun.com/t/16501", "summary": { "@type": "html", "#text": "2024古剑山初赛WP" } }, { "title": "2024吾杯网络安全技能大赛ctf-web方向", "link": "https://xz.aliyun.com/t/16500", "published": "2024-12-01T19:49:39+08:00", "id": "https://xz.aliyun.com/t/16500", "summary": { "@type": "html", "#text": "2024吾杯网络安全技能大赛ctf-web方向" } }, { "title": "记某次金融小程序数据加密及签名逆向", "link": "https://xz.aliyun.com/t/16497", "published": "2024-12-01T17:20:00+08:00", "id": "https://xz.aliyun.com/t/16497", "summary": { "@type": "html", "#text": "记某次金融小程序数据加密及签名逆向" } }, { "title": "2024网鼎杯初赛和半决赛部分题解---PWN", "link": "https://xz.aliyun.com/t/16495", "published": "2024-12-01T16:43:53+08:00", "id": "https://xz.aliyun.com/t/16495", "summary": { "@type": "html", "#text": "2024网鼎杯初赛和半决赛部分题解---PWN" } }, { "title": "2024 强网拟态决赛web 部分wp", "link": "https://xz.aliyun.com/t/16489", "published": "2024-12-01T14:49:39+08:00", "id": "https://xz.aliyun.com/t/16489", "summary": { "@type": "html", "#text": "2024 强网拟态决赛web 部分wp" } }, { "title": "动态逃逸杀软的艺术", "link": "https://xz.aliyun.com/t/16486", "published": "2024-12-01T10:12:00+08:00", "id": "https://xz.aliyun.com/t/16486", "summary": { "@type": "html", "#text": "动态逃逸杀软的艺术" } }, { "title": "样本分析-DarkComet远控木马", "link": "https://xz.aliyun.com/t/16485", "published": "2024-11-30T23:44:00+08:00", "id": "https://xz.aliyun.com/t/16485", "summary": { "@type": "html", "#text": "样本分析-DarkComet远控木马" } }, { "title": "某省移动竞赛决赛个人赛 部分wp", "link": "https://xz.aliyun.com/t/16484", "published": "2024-11-30T23:13:25+08:00", "id": "https://xz.aliyun.com/t/16484", "summary": { "@type": "html", "#text": "某省移动竞赛决赛个人赛 部分wp" } }, { "title": "NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠", "link": "https://xz.aliyun.com/t/16483", "published": "2024-11-30T21:33:34+08:00", "id": "https://xz.aliyun.com/t/16483", "summary": { "@type": "html", "#text": "NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠" } }, { "title": "2024“中华武数杯” 全国网络攻防精英赛", "link": "https://xz.aliyun.com/t/16482", "published": "2024-11-30T19:10:43+08:00", "id": "https://xz.aliyun.com/t/16482", "summary": { "@type": "html", "#text": "2024“中华武数杯” 全国网络攻防精英赛" } }, { "title": "2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto", "link": "https://xz.aliyun.com/t/16480", "published": "2024-11-30T18:55:48+08:00", "id": "https://xz.aliyun.com/t/16480", "summary": { "@type": "html", "#text": "2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto" } }, { "title": "2024 金盾杯 wp", "link": "https://xz.aliyun.com/t/16478", "published": "2024-11-30T18:13:31+08:00", "id": "https://xz.aliyun.com/t/16478", "summary": { "@type": "html", "#text": "2024 金盾杯 wp" } }, { "title": "2024古剑山Pwn方向全部题解", "link": "https://xz.aliyun.com/t/16474", "published": "2024-11-30T15:48:05+08:00", "id": "https://xz.aliyun.com/t/16474", "summary": { "@type": "html", "#text": "2024古剑山Pwn方向全部题解" } }, { "title": "江苏移动“建材赋能”线下个人决赛crypto三道0解题", "link": "https://xz.aliyun.com/t/16473", "published": "2024-11-30T14:12:46+08:00", "id": "https://xz.aliyun.com/t/16473", "summary": { "@type": "html", "#text": "江苏移动“建材赋能”线下个人决赛crypto三道0解题" } }, { "title": "2024古剑山 pwn 详解", "link": "https://xz.aliyun.com/t/16471", "published": "2024-11-30T13:52:46+08:00", "id": "https://xz.aliyun.com/t/16471", "summary": { "@type": "html", "#text": "2024古剑山 pwn 详解" } }, { "title": "提示词注入攻击", "link": "https://xz.aliyun.com/t/16470", "published": "2024-11-30T13:42:51+08:00", "id": "https://xz.aliyun.com/t/16470", "summary": { "@type": "html", "#text": "提示词注入攻击" } }, { "title": "2024 古剑山web&pwn&re&misc wp", "link": "https://xz.aliyun.com/t/16469", "published": "2024-11-30T13:06:00+08:00", "id": "https://xz.aliyun.com/t/16469", "summary": { "@type": "html", "#text": "2024 古剑山web&pwn&re&misc wp" } }, { "title": "codeql实战练习-micro_service_seclab", "link": "https://xz.aliyun.com/t/16468", "published": "2024-11-30T12:31:46+08:00", "id": "https://xz.aliyun.com/t/16468", "summary": { "@type": "html", "#text": "codeql实战练习-micro_service_seclab" } }, { "title": "某某热点app登录sign值逆向分析", "link": "https://xz.aliyun.com/t/16466", "published": "2024-11-30T11:09:28+08:00", "id": "https://xz.aliyun.com/t/16466", "summary": { "@type": "html", "#text": "某某热点app登录sign值逆向分析" } }, { "title": "样本分析 基于 rust 的恶意软件 SSLoad", "link": "https://xz.aliyun.com/t/16465", "published": "2024-11-30T02:54:12+08:00", "id": "https://xz.aliyun.com/t/16465", "summary": { "@type": "html", "#text": "样本分析 基于 rust 的恶意软件 SSLoad" } }, { "title": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(一)", "link": "https://xz.aliyun.com/t/16464", "published": "2024-11-30T01:03:18+08:00", "id": "https://xz.aliyun.com/t/16464", "summary": { "@type": "html", "#text": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(一)" } }, { "title": "某web应用远程代码执行漏洞-反序列化分析", "link": "https://xz.aliyun.com/t/16463", "published": "2024-11-30T00:14:34+08:00", "id": "https://xz.aliyun.com/t/16463", "summary": { "@type": "html", "#text": "某web应用远程代码执行漏洞-反序列化分析" } }, { "title": "SpringMVC的URI解析和权限绕过", "link": "https://xz.aliyun.com/t/16462", "published": "2024-11-29T21:48:43+08:00", "id": "https://xz.aliyun.com/t/16462", "summary": { "@type": "html", "#text": "SpringMVC的URI解析和权限绕过" } }, { "title": "基于深度学习(TextCNN&XGBoost stacking融合)对恶意软件的检测算法设计与实现", "link": "https://xz.aliyun.com/t/16461", "published": "2024-11-29T21:02:11+08:00", "id": "https://xz.aliyun.com/t/16461", "summary": { "@type": "html", "#text": "基于深度学习(TextCNN&XGBoost stacking融合)对恶意软件的检测算法设计与实现" } }, { "title": "银狐黑产最新加载器利用破解版VPN为诱饵进行传播", "link": "https://xz.aliyun.com/t/16459", "published": "2024-11-29T19:51:21+08:00", "id": "https://xz.aliyun.com/t/16459", "summary": { "@type": "html", "#text": "银狐黑产最新加载器利用破解版VPN为诱饵进行传播" } } ]