[ { "title": "记一次RAT的感染过程详细分析", "link": "https://xz.aliyun.com/t/16502", "published": "2024-12-01T23:10:00+08:00", "id": "https://xz.aliyun.com/t/16502", "summary": { "@type": "html", "#text": "记一次RAT的感染过程详细分析" } }, { "title": "条件竞争glibc堆的详细讲解", "link": "https://xz.aliyun.com/t/16498", "published": "2024-12-01T18:24:00+08:00", "id": "https://xz.aliyun.com/t/16498", "summary": { "@type": "html", "#text": "条件竞争glibc堆的详细讲解" } }, { "title": "记某次金融小程序数据加密及签名逆向", "link": "https://xz.aliyun.com/t/16497", "published": "2024-12-01T17:20:00+08:00", "id": "https://xz.aliyun.com/t/16497", "summary": { "@type": "html", "#text": "记某次金融小程序数据加密及签名逆向" } }, { "title": "动态逃逸杀软的艺术", "link": "https://xz.aliyun.com/t/16486", "published": "2024-12-01T10:12:00+08:00", "id": "https://xz.aliyun.com/t/16486", "summary": { "@type": "html", "#text": "动态逃逸杀软的艺术" } }, { "title": "样本分析-DarkComet远控木马", "link": "https://xz.aliyun.com/t/16485", "published": "2024-11-30T23:44:00+08:00", "id": "https://xz.aliyun.com/t/16485", "summary": { "@type": "html", "#text": "样本分析-DarkComet远控木马" } }, { "title": "从DAS暑期挑战赛的一道题来理解largebinattack的攻击流程", "link": "https://xz.aliyun.com/t/16422", "published": "2024-11-27T18:27:00+08:00", "id": "https://xz.aliyun.com/t/16422", "summary": { "@type": "html", "#text": "从DAS暑期挑战赛的一道题来理解largebinattack的攻击流程" } }, { "title": "JAVA安全之JMX攻防研究分析", "link": "https://xz.aliyun.com/t/16417", "published": "2024-11-27T14:21:00+08:00", "id": "https://xz.aliyun.com/t/16417", "summary": { "@type": "html", "#text": "JAVA安全之JMX攻防研究分析" } }, { "title": "Apache HertzBeat 漏洞复现三则", "link": "https://xz.aliyun.com/t/16404", "published": "2024-11-26T16:22:00+08:00", "id": "https://xz.aliyun.com/t/16404", "summary": { "@type": "html", "#text": "Apache HertzBeat 漏洞复现三则" } }, { "title": "IOT安全的入门经典——DIR-815漏洞复现", "link": "https://xz.aliyun.com/t/16399", "published": "2024-11-26T10:04:00+08:00", "id": "https://xz.aliyun.com/t/16399", "summary": { "@type": "html", "#text": "IOT安全的入门经典——DIR-815漏洞复现" } }, { "title": "Patchwork(白象)APT组织Protego远控木马攻击场景复现", "link": "https://xz.aliyun.com/t/16392", "published": "2024-11-25T22:38:00+08:00", "id": "https://xz.aliyun.com/t/16392", "summary": { "@type": "html", "#text": "Patchwork(白象)APT组织Protego远控木马攻击场景复现" } }, { "title": "Windows综合渗透_DTcms_远控gotohttp软件在渗透中利用", "link": "https://xz.aliyun.com/t/16384", "published": "2024-11-25T17:48:00+08:00", "id": "https://xz.aliyun.com/t/16384", "summary": { "@type": "html", "#text": "Windows综合渗透_DTcms_远控gotohttp软件在渗透中利用" } }, { "title": "jetty 内存马构造分析", "link": "https://xz.aliyun.com/t/16382", "published": "2024-11-25T16:52:30+08:00", "id": "https://xz.aliyun.com/t/16382", "summary": { "@type": "html", "#text": "jetty 内存马构造分析" } }, { "title": "免杀基础-IAT隐藏", "link": "https://xz.aliyun.com/t/16376", "published": "2024-11-25T14:51:46+08:00", "id": "https://xz.aliyun.com/t/16376", "summary": { "@type": "html", "#text": "免杀基础-IAT隐藏" } }, { "title": "CNSSCTF WEB详细解析WP", "link": "https://xz.aliyun.com/t/16375", "published": "2024-11-25T11:27:51+08:00", "id": "https://xz.aliyun.com/t/16375", "summary": { "@type": "html", "#text": "CNSSCTF WEB详细解析WP" } }, { "title": "渗透测试&红队之信息收集", "link": "https://xz.aliyun.com/t/16373", "published": "2024-11-24T23:59:00+08:00", "id": "https://xz.aliyun.com/t/16373", "summary": { "@type": "html", "#text": "渗透测试&红队之信息收集" } }, { "title": "[2024网鼎杯半决赛]pwn-cardmaster", "link": "https://xz.aliyun.com/t/16371", "published": "2024-11-24T20:50:41+08:00", "id": "https://xz.aliyun.com/t/16371", "summary": { "@type": "html", "#text": "[2024网鼎杯半决赛]pwn-cardmaster" } }, { "title": "网鼎杯-半决赛-青龙组-逆向安全", "link": "https://xz.aliyun.com/t/16370", "published": "2024-11-24T19:39:44+08:00", "id": "https://xz.aliyun.com/t/16370", "summary": { "@type": "html", "#text": "网鼎杯-半决赛-青龙组-逆向安全" } }, { "title": "2024深育杯 Pwn部分题解", "link": "https://xz.aliyun.com/t/16368", "published": "2024-11-24T16:38:34+08:00", "id": "https://xz.aliyun.com/t/16368", "summary": { "@type": "html", "#text": "2024深育杯 Pwn部分题解" } }, { "title": "Java JAR包反编译与动态调试指南", "link": "https://xz.aliyun.com/t/16367", "published": "2024-11-24T12:06:12+08:00", "id": "https://xz.aliyun.com/t/16367", "summary": { "@type": "html", "#text": "Java JAR包反编译与动态调试指南" } }, { "title": "2024 蜀道山 crypto-wp", "link": "https://xz.aliyun.com/t/16365", "published": "2024-11-23T23:37:02+08:00", "id": "https://xz.aliyun.com/t/16365", "summary": { "@type": "html", "#text": "2024 蜀道山 crypto-wp" } }, { "title": "Windows10/11 内置组件 dll劫持", "link": "https://xz.aliyun.com/t/16364", "published": "2024-11-23T23:34:01+08:00", "id": "https://xz.aliyun.com/t/16364", "summary": { "@type": "html", "#text": "Windows10/11 内置组件 dll劫持" } }, { "title": "2024网鼎杯半决赛(青龙组Crypto唯一解)——RSA加密分析", "link": "https://xz.aliyun.com/t/16360", "published": "2024-11-23T20:59:34+08:00", "id": "https://xz.aliyun.com/t/16360", "summary": { "@type": "html", "#text": "2024网鼎杯半决赛(青龙组Crypto唯一解)——RSA加密分析" } }, { "title": "利用某组件dll劫持实现自启动", "link": "https://xz.aliyun.com/t/16359", "published": "2024-11-23T20:40:00+08:00", "id": "https://xz.aliyun.com/t/16359", "summary": { "@type": "html", "#text": "利用某组件dll劫持实现自启动" } }, { "title": "FakeTOA的复现|利用搜索引擎复现一个新的漏洞", "link": "https://xz.aliyun.com/t/16357", "published": "2024-11-23T17:18:12+08:00", "id": "https://xz.aliyun.com/t/16357", "summary": { "@type": "html", "#text": "FakeTOA的复现|利用搜索引擎复现一个新的漏洞" } }, { "title": "强网拟态2024决赛-Crypto-notive", "link": "https://xz.aliyun.com/t/16356", "published": "2024-11-23T16:23:43+08:00", "id": "https://xz.aliyun.com/t/16356", "summary": { "@type": "html", "#text": "强网拟态2024决赛-Crypto-notive" } }, { "title": "PE文件解析", "link": "https://xz.aliyun.com/t/16355", "published": "2024-11-23T14:08:51+08:00", "id": "https://xz.aliyun.com/t/16355", "summary": { "@type": "html", "#text": "PE文件解析" } }, { "title": "细说 wordpress插件 Profile-Builder - CVE-2024-6695分析", "link": "https://xz.aliyun.com/t/16354", "published": "2024-11-23T01:10:19+08:00", "id": "https://xz.aliyun.com/t/16354", "summary": { "@type": "html", "#text": "细说 wordpress插件 Profile-Builder - CVE-2024-6695分析" } }, { "title": "免杀基础-进程遍历的方式", "link": "https://xz.aliyun.com/t/16353", "published": "2024-11-22T23:05:04+08:00", "id": "https://xz.aliyun.com/t/16353", "summary": { "@type": "html", "#text": "免杀基础-进程遍历的方式" } }, { "title": "社工钓鱼手法总结", "link": "https://xz.aliyun.com/t/16352", "published": "2024-11-22T20:39:00+08:00", "id": "https://xz.aliyun.com/t/16352", "summary": { "@type": "html", "#text": "社工钓鱼手法总结" } }, { "title": "Java安全:基础漏洞审计实战", "link": "https://xz.aliyun.com/t/16351", "published": "2024-11-22T15:40:52+08:00", "id": "https://xz.aliyun.com/t/16351", "summary": { "@type": "html", "#text": "Java安全:基础漏洞审计实战" } }, { "title": "SeaCMS admin_files.php CVE-2024-42599分析", "link": "https://xz.aliyun.com/t/16350", "published": "2024-11-22T13:43:52+08:00", "id": "https://xz.aliyun.com/t/16350", "summary": { "@type": "html", "#text": "SeaCMS admin_files.php CVE-2024-42599分析" } }, { "title": "蜜罐技术在核心系统中的融合应用:指纹伪装与攻击威慑", "link": "https://xz.aliyun.com/t/16349", "published": "2024-11-22T13:42:48+08:00", "id": "https://xz.aliyun.com/t/16349", "summary": { "@type": "html", "#text": "蜜罐技术在核心系统中的融合应用:指纹伪装与攻击威慑" } }, { "title": "JAVA安全之Groovy命令注入刨析", "link": "https://xz.aliyun.com/t/16348", "published": "2024-11-22T13:15:00+08:00", "id": "https://xz.aliyun.com/t/16348", "summary": { "@type": "html", "#text": "JAVA安全之Groovy命令注入刨析" } }, { "title": "DMC Airin Blog Plugin 反序列化 CVE-2024-52413分析", "link": "https://xz.aliyun.com/t/16347", "published": "2024-11-22T12:41:05+08:00", "id": "https://xz.aliyun.com/t/16347", "summary": { "@type": "html", "#text": "DMC Airin Blog Plugin 反序列化 CVE-2024-52413分析" } }, { "title": "Apache HertzBeat <1.6.0 SnakeYaml反序列化漏洞(CVE-2024-42323)", "link": "https://xz.aliyun.com/t/16345", "published": "2024-11-22T12:26:00+08:00", "id": "https://xz.aliyun.com/t/16345", "summary": { "@type": "html", "#text": "Apache HertzBeat <1.6.0 SnakeYaml反序列化漏洞(CVE-2024-42323)" } }, { "title": "深入解析Windows内核I/O系统:调试驱动与终止进程", "link": "https://xz.aliyun.com/t/16344", "published": "2024-11-22T09:33:52+08:00", "id": "https://xz.aliyun.com/t/16344", "summary": { "@type": "html", "#text": "深入解析Windows内核I/O系统:调试驱动与终止进程" } }, { "title": "NewStarCTF 2024 Reverse Week1&Week2复现", "link": "https://xz.aliyun.com/t/16341", "published": "2024-11-21T23:45:33+08:00", "id": "https://xz.aliyun.com/t/16341", "summary": { "@type": "html", "#text": "NewStarCTF 2024 Reverse Week1&Week2复现" } }, { "title": "内网渗透权限提升&Kerberos渗透攻击详细使用", "link": "https://xz.aliyun.com/t/16340", "published": "2024-11-21T23:05:31+08:00", "id": "https://xz.aliyun.com/t/16340", "summary": { "@type": "html", "#text": "内网渗透权限提升&Kerberos渗透攻击详细使用" } }, { "title": "kernel从小白到大神(五)-dirty_pipe", "link": "https://xz.aliyun.com/t/16339", "published": "2024-11-21T22:58:41+08:00", "id": "https://xz.aliyun.com/t/16339", "summary": { "@type": "html", "#text": "kernel从小白到大神(五)-dirty_pipe" } }, { "title": "kernel从小白到大神(四)", "link": "https://xz.aliyun.com/t/16338", "published": "2024-11-21T22:50:44+08:00", "id": "https://xz.aliyun.com/t/16338", "summary": { "@type": "html", "#text": "kernel从小白到大神(四)" } }, { "title": "pdb在eval中的妙用", "link": "https://xz.aliyun.com/t/16337", "published": "2024-11-21T22:25:44+08:00", "id": "https://xz.aliyun.com/t/16337", "summary": { "@type": "html", "#text": "pdb在eval中的妙用" } }, { "title": "2024 SCTF Simpleshop 出题笔记以及对Thinkphp8任意命令执行的改造", "link": "https://xz.aliyun.com/t/16336", "published": "2024-11-21T21:45:26+08:00", "id": "https://xz.aliyun.com/t/16336", "summary": { "@type": "html", "#text": "2024 SCTF Simpleshop 出题笔记以及对Thinkphp8任意命令执行的改造" } }, { "title": "2024 极客大挑战reverse部分题解", "link": "https://xz.aliyun.com/t/16335", "published": "2024-11-21T21:12:39+08:00", "id": "https://xz.aliyun.com/t/16335", "summary": { "@type": "html", "#text": "2024 极客大挑战reverse部分题解" } }, { "title": "2024年数证杯服务器取证分析", "link": "https://xz.aliyun.com/t/16334", "published": "2024-11-21T20:24:37+08:00", "id": "https://xz.aliyun.com/t/16334", "summary": { "@type": "html", "#text": "2024年数证杯服务器取证分析" } }, { "title": "intigriti CTF 2024 部分WEB 复现", "link": "https://xz.aliyun.com/t/16332", "published": "2024-11-21T19:13:53+08:00", "id": "https://xz.aliyun.com/t/16332", "summary": { "@type": "html", "#text": "intigriti CTF 2024 部分WEB 复现" } }, { "title": "sql注入报错分享(mssql+mysql)", "link": "https://xz.aliyun.com/t/16329", "published": "2024-11-21T16:22:35+08:00", "id": "https://xz.aliyun.com/t/16329", "summary": { "@type": "html", "#text": "sql注入报错分享(mssql+mysql)" } }, { "title": "Nacos2.4.3新版漏洞利用方式总结", "link": "https://xz.aliyun.com/t/16328", "published": "2024-11-21T15:11:49+08:00", "id": "https://xz.aliyun.com/t/16328", "summary": { "@type": "html", "#text": "Nacos2.4.3新版漏洞利用方式总结" } }, { "title": "2024极客大挑战WEB week1&week2", "link": "https://xz.aliyun.com/t/16000", "published": "2024-11-20T23:52:00+08:00", "id": "https://xz.aliyun.com/t/16000", "summary": { "@type": "html", "#text": "2024极客大挑战WEB week1&week2" } }, { "title": "flask请求头回显的学习和探究如何进行错误页面污染回显", "link": "https://xz.aliyun.com/t/16325", "published": "2024-11-20T23:48:03+08:00", "id": "https://xz.aliyun.com/t/16325", "summary": { "@type": "html", "#text": "flask请求头回显的学习和探究如何进行错误页面污染回显" } }, { "title": "记一次从 sql 到 xml 的 java 题", "link": "https://xz.aliyun.com/t/16324", "published": "2024-11-20T22:31:31+08:00", "id": "https://xz.aliyun.com/t/16324", "summary": { "@type": "html", "#text": "记一次从 sql 到 xml 的 java 题" } }, { "title": "先知安全沙龙(北京站) - 滥用 ADWS 协议枚举 Active Directory", "link": "https://xz.aliyun.com/t/16378", "published": "2024-11-20T07:24:00+08:00", "id": "https://xz.aliyun.com/t/16378", "summary": { "@type": "html", "#text": "先知安全沙龙(北京站) - 滥用 ADWS 协议枚举 Active Directory" } }, { "title": "先知安全沙龙(北京站) - 浅谈Web快速打点", "link": "https://xz.aliyun.com/t/16379", "published": "2024-11-20T07:23:00+08:00", "id": "https://xz.aliyun.com/t/16379", "summary": { "@type": "html", "#text": "先知安全沙龙(北京站) - 浅谈Web快速打点" } }, { "title": "先知安全沙龙(杭州站) - Citrix 云桌面场景的模糊测试实践", "link": "https://xz.aliyun.com/t/16377", "published": "2024-11-20T07:22:00+08:00", "id": "https://xz.aliyun.com/t/16377", "summary": { "@type": "html", "#text": "先知安全沙龙(杭州站) - Citrix 云桌面场景的模糊测试实践" } }, { "title": "先知安全沙龙(北京站) - 安全研究员在红蓝对抗中的自我修养", "link": "https://xz.aliyun.com/t/16381", "published": "2024-11-20T07:21:00+08:00", "id": "https://xz.aliyun.com/t/16381", "summary": { "@type": "html", "#text": "先知安全沙龙(北京站) - 安全研究员在红蓝对抗中的自我修养" } }, { "title": "针对一个疑似红队样本的详细分析", "link": "https://xz.aliyun.com/t/16318", "published": "2024-11-20T07:20:41+08:00", "id": "https://xz.aliyun.com/t/16318", "summary": { "@type": "html", "#text": "针对一个疑似红队样本的详细分析" } }, { "title": "从一道pwn题深入理解vm逆向", "link": "https://xz.aliyun.com/t/16317", "published": "2024-11-20T00:01:19+08:00", "id": "https://xz.aliyun.com/t/16317", "summary": { "@type": "html", "#text": "从一道pwn题深入理解vm逆向" } }, { "title": "2024极客大挑战misc方向WP", "link": "https://xz.aliyun.com/t/16316", "published": "2024-11-19T22:26:17+08:00", "id": "https://xz.aliyun.com/t/16316", "summary": { "@type": "html", "#text": "2024极客大挑战misc方向WP" } }, { "title": "安卓app抓包总结", "link": "https://xz.aliyun.com/t/16315", "published": "2024-11-19T21:11:49+08:00", "id": "https://xz.aliyun.com/t/16315", "summary": { "@type": "html", "#text": "安卓app抓包总结" } }, { "title": "2024“蜀道山” RE 部分题解", "link": "https://xz.aliyun.com/t/16314", "published": "2024-11-19T21:06:46+08:00", "id": "https://xz.aliyun.com/t/16314", "summary": { "@type": "html", "#text": "2024“蜀道山” RE 部分题解" } }, { "title": "细说CVE-2024-10924", "link": "https://xz.aliyun.com/t/16312", "published": "2024-11-19T18:08:29+08:00", "id": "https://xz.aliyun.com/t/16312", "summary": { "@type": "html", "#text": "细说CVE-2024-10924" } }, { "title": "爬虫项目:高效ChromeDriver驱动的爱站信息精准获取与利用工具", "link": "https://xz.aliyun.com/t/16309", "published": "2024-11-19T15:31:47+08:00", "id": "https://xz.aliyun.com/t/16309", "summary": { "@type": "html", "#text": "爬虫项目:高效ChromeDriver驱动的爱站信息精准获取与利用工具" } }, { "title": "2024 数证杯流量分析WP", "link": "https://xz.aliyun.com/t/16306", "published": "2024-11-19T11:29:53+08:00", "id": "https://xz.aliyun.com/t/16306", "summary": { "@type": "html", "#text": "2024 数证杯流量分析WP" } }, { "title": "第三届“华为杯”研究生网络安全决赛AWDP详细全解", "link": "https://xz.aliyun.com/t/16305", "published": "2024-11-19T09:42:05+08:00", "id": "https://xz.aliyun.com/t/16305", "summary": { "@type": "html", "#text": "第三届“华为杯”研究生网络安全决赛AWDP详细全解" } }, { "title": "2024 极客大挑战re week1 wp", "link": "https://xz.aliyun.com/t/16304", "published": "2024-11-19T00:25:24+08:00", "id": "https://xz.aliyun.com/t/16304", "summary": { "@type": "html", "#text": "2024 极客大挑战re week1 wp" } }, { "title": "0xgame2024逆向week4复现", "link": "https://xz.aliyun.com/t/16303", "published": "2024-11-19T00:18:26+08:00", "id": "https://xz.aliyun.com/t/16303", "summary": { "@type": "html", "#text": "0xgame2024逆向week4复现" } }, { "title": "第十五届极客大挑战CTFPlusweb方向week1,week2全解-三叶草安全技术小组", "link": "https://xz.aliyun.com/t/16300", "published": "2024-11-18T21:12:08+08:00", "id": "https://xz.aliyun.com/t/16300", "summary": { "@type": "html", "#text": "第十五届极客大挑战CTFPlusweb方向week1,week2全解-三叶草安全技术小组" } }, { "title": "2024第十五届极客大挑战 Pwn部分题解", "link": "https://xz.aliyun.com/t/16299", "published": "2024-11-18T21:08:31+08:00", "id": "https://xz.aliyun.com/t/16299", "summary": { "@type": "html", "#text": "2024第十五届极客大挑战 Pwn部分题解" } }, { "title": "2024极客大挑战-CRYPTO-部分WP", "link": "https://xz.aliyun.com/t/16297", "published": "2024-11-18T20:10:40+08:00", "id": "https://xz.aliyun.com/t/16297", "summary": { "@type": "html", "#text": "2024极客大挑战-CRYPTO-部分WP" } }, { "title": "初探Harmony逆向之so文件逆向分析篇", "link": "https://xz.aliyun.com/t/16295", "published": "2024-11-18T17:16:12+08:00", "id": "https://xz.aliyun.com/t/16295", "summary": { "@type": "html", "#text": "初探Harmony逆向之so文件逆向分析篇" } }, { "title": "2024“蜀道山”高校联合公益赛web全解&&部分misc", "link": "https://xz.aliyun.com/t/16294", "published": "2024-11-18T12:56:21+08:00", "id": "https://xz.aliyun.com/t/16294", "summary": { "@type": "html", "#text": "2024“蜀道山”高校联合公益赛web全解&&部分misc" } }, { "title": "关于重启main函数学习分享", "link": "https://xz.aliyun.com/t/16293", "published": "2024-11-18T11:21:43+08:00", "id": "https://xz.aliyun.com/t/16293", "summary": { "@type": "html", "#text": "关于重启main函数学习分享" } }, { "title": "关于bindiff在逆向中的一些妙用", "link": "https://xz.aliyun.com/t/16291", "published": "2024-11-17T23:14:30+08:00", "id": "https://xz.aliyun.com/t/16291", "summary": { "@type": "html", "#text": "关于bindiff在逆向中的一些妙用" } }, { "title": "以OrcaC2为例简单分析C2框架部分功能的实现", "link": "https://xz.aliyun.com/t/16290", "published": "2024-11-17T18:21:38+08:00", "id": "https://xz.aliyun.com/t/16290", "summary": { "@type": "html", "#text": "以OrcaC2为例简单分析C2框架部分功能的实现" } }, { "title": "堆学习之unlink", "link": "https://xz.aliyun.com/t/16287", "published": "2024-11-16T21:49:21+08:00", "id": "https://xz.aliyun.com/t/16287", "summary": { "@type": "html", "#text": "堆学习之unlink" } }, { "title": "vmpwn入门1", "link": "https://xz.aliyun.com/t/16285", "published": "2024-11-16T18:48:02+08:00", "id": "https://xz.aliyun.com/t/16285", "summary": { "@type": "html", "#text": "vmpwn入门1" } }, { "title": "Java-Sec代码审计漏洞篇(二)", "link": "https://xz.aliyun.com/t/16284", "published": "2024-11-16T10:55:04+08:00", "id": "https://xz.aliyun.com/t/16284", "summary": { "@type": "html", "#text": "Java-Sec代码审计漏洞篇(二)" } }, { "title": "[鹏城杯 2024] 零解pwn题VM详细图解", "link": "https://xz.aliyun.com/t/16282", "published": "2024-11-15T22:55:05+08:00", "id": "https://xz.aliyun.com/t/16282", "summary": { "@type": "html", "#text": "[鹏城杯 2024] 零解pwn题VM详细图解" } }, { "title": "2024数证杯计算机部分题解", "link": "https://xz.aliyun.com/t/16326", "published": "2024-11-15T22:12:00+08:00", "id": "https://xz.aliyun.com/t/16326", "summary": { "@type": "html", "#text": "2024数证杯计算机部分题解" } }, { "title": "近源渗透|HID ATTACK从0到1", "link": "https://xz.aliyun.com/t/16279", "published": "2024-11-15T21:25:43+08:00", "id": "https://xz.aliyun.com/t/16279", "summary": { "@type": "html", "#text": "近源渗透|HID ATTACK从0到1" } }, { "title": "2024 ISCTF逆向方向部分wp", "link": "https://xz.aliyun.com/t/16277", "published": "2024-11-15T17:44:39+08:00", "id": "https://xz.aliyun.com/t/16277", "summary": { "@type": "html", "#text": "2024 ISCTF逆向方向部分wp" } }, { "title": "基础免杀 从.rsrc加载shellcode上线", "link": "https://xz.aliyun.com/t/16276", "published": "2024-11-15T16:54:52+08:00", "id": "https://xz.aliyun.com/t/16276", "summary": { "@type": "html", "#text": "基础免杀 从.rsrc加载shellcode上线" } }, { "title": "spring +fastjson 的 rce", "link": "https://xz.aliyun.com/t/16275", "published": "2024-11-15T16:24:26+08:00", "id": "https://xz.aliyun.com/t/16275", "summary": { "@type": "html", "#text": "spring +fastjson 的 rce" } }, { "title": "深入解析Windows内核I/O系统:内核模式与用户模式的通信实现", "link": "https://xz.aliyun.com/t/16273", "published": "2024-11-15T11:44:28+08:00", "id": "https://xz.aliyun.com/t/16273", "summary": { "@type": "html", "#text": "深入解析Windows内核I/O系统:内核模式与用户模式的通信实现" } }, { "title": "2024 ISCTF-Crypto-WP", "link": "https://xz.aliyun.com/t/16272", "published": "2024-11-15T00:19:52+08:00", "id": "https://xz.aliyun.com/t/16272", "summary": { "@type": "html", "#text": "2024 ISCTF-Crypto-WP" } }, { "title": "2024-强网杯-pickle_jail分析", "link": "https://xz.aliyun.com/t/16267", "published": "2024-11-14T19:45:50+08:00", "id": "https://xz.aliyun.com/t/16267", "summary": { "@type": "html", "#text": "2024-强网杯-pickle_jail分析" } }, { "title": "2024 DSBCTF_单身杯 crypto", "link": "https://xz.aliyun.com/t/16266", "published": "2024-11-14T19:11:57+08:00", "id": "https://xz.aliyun.com/t/16266", "summary": { "@type": "html", "#text": "2024 DSBCTF_单身杯 crypto" } }, { "title": "Apache ZooKeeper Admin Server IPAuthenticationProvider 认证绕过漏洞分析 (CVE-2024-51504)", "link": "https://xz.aliyun.com/t/16264", "published": "2024-11-14T17:54:36+08:00", "id": "https://xz.aliyun.com/t/16264", "summary": { "@type": "html", "#text": "Apache ZooKeeper Admin Server IPAuthenticationProvider 认证绕过漏洞分析 (CVE-2024-51504)" } }, { "title": "2024 ISCTF ezjava详解", "link": "https://xz.aliyun.com/t/16289", "published": "2024-11-14T17:03:00+08:00", "id": "https://xz.aliyun.com/t/16289", "summary": { "@type": "html", "#text": "2024 ISCTF ezjava详解" } }, { "title": "关于伪随机数学习分享", "link": "https://xz.aliyun.com/t/16262", "published": "2024-11-14T15:52:15+08:00", "id": "https://xz.aliyun.com/t/16262", "summary": { "@type": "html", "#text": "关于伪随机数学习分享" } }, { "title": "分享项目中的众测/渗透测试站点登录口的SRC漏洞挖掘技巧", "link": "https://xz.aliyun.com/t/16259", "published": "2024-11-14T13:06:12+08:00", "id": "https://xz.aliyun.com/t/16259", "summary": { "@type": "html", "#text": "分享项目中的众测/渗透测试站点登录口的SRC漏洞挖掘技巧" } }, { "title": "2024 ISCTF web详解", "link": "https://xz.aliyun.com/t/16258", "published": "2024-11-14T12:54:17+08:00", "id": "https://xz.aliyun.com/t/16258", "summary": { "@type": "html", "#text": "2024 ISCTF web详解" } }, { "title": "2024 DSBCTF ezzz_ssti 详解", "link": "https://xz.aliyun.com/t/16292", "published": "2024-11-14T10:45:00+08:00", "id": "https://xz.aliyun.com/t/16292", "summary": { "@type": "html", "#text": "2024 DSBCTF ezzz_ssti 详解" } }, { "title": "泛微e-office 11.0 RCE", "link": "https://xz.aliyun.com/t/16257", "published": "2024-11-14T10:27:09+08:00", "id": "https://xz.aliyun.com/t/16257", "summary": { "@type": "html", "#text": "泛微e-office 11.0 RCE" } }, { "title": "记鹏程杯joyVBS -VBS代码混淆初探", "link": "https://xz.aliyun.com/t/16256", "published": "2024-11-14T09:29:25+08:00", "id": "https://xz.aliyun.com/t/16256", "summary": { "@type": "html", "#text": "记鹏程杯joyVBS -VBS代码混淆初探" } }, { "title": "最新Patchwork(白象)APT组织Protego远控木马分析", "link": "https://xz.aliyun.com/t/16255", "published": "2024-11-14T09:11:00+08:00", "id": "https://xz.aliyun.com/t/16255", "summary": { "@type": "html", "#text": "最新Patchwork(白象)APT组织Protego远控木马分析" } }, { "title": "tcache攻击之tcache-poisoning", "link": "https://xz.aliyun.com/t/16254", "published": "2024-11-14T07:43:53+08:00", "id": "https://xz.aliyun.com/t/16254", "summary": { "@type": "html", "#text": "tcache攻击之tcache-poisoning" } }, { "title": "2024 hkcertctf web 部分wp", "link": "https://xz.aliyun.com/t/16252", "published": "2024-11-13T23:33:32+08:00", "id": "https://xz.aliyun.com/t/16252", "summary": { "@type": "html", "#text": "2024 hkcertctf web 部分wp" } }, { "title": "2024 ISCC-week2-RE", "link": "https://xz.aliyun.com/t/16251", "published": "2024-11-13T22:41:41+08:00", "id": "https://xz.aliyun.com/t/16251", "summary": { "@type": "html", "#text": "2024 ISCC-week2-RE" } }, { "title": "从样本分析中学习病毒隐蔽启动过程", "link": "https://xz.aliyun.com/t/16250", "published": "2024-11-13T17:17:00+08:00", "id": "https://xz.aliyun.com/t/16250", "summary": { "@type": "html", "#text": "从样本分析中学习病毒隐蔽启动过程" } }, { "title": "智能纪元:AI大模型驱动的红队攻击技术 (二)", "link": "https://xz.aliyun.com/t/16248", "published": "2024-11-13T14:19:49+08:00", "id": "https://xz.aliyun.com/t/16248", "summary": { "@type": "html", "#text": "智能纪元:AI大模型驱动的红队攻击技术 (二)" } } ]