PyBot/JSON/xianzhi.json
2024-12-25 22:57:42 +08:00

1002 lines
35 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"title": "JAVA安全之SpEL表达式执行",
"link": "https://xz.aliyun.com/t/16905",
"published": "2024-12-25T14:36:47+08:00",
"id": "https://xz.aliyun.com/t/16905",
"summary": {
"@type": "html",
"#text": "JAVA安全之SpEL表达式执行"
}
},
{
"title": "从源码角度分析hessian特别的原因",
"link": "https://xz.aliyun.com/t/16904",
"published": "2024-12-25T13:46:49+08:00",
"id": "https://xz.aliyun.com/t/16904",
"summary": {
"@type": "html",
"#text": "从源码角度分析hessian特别的原因"
}
},
{
"title": "fastapi 框架中的无回显利用",
"link": "https://xz.aliyun.com/t/16903",
"published": "2024-12-25T13:27:28+08:00",
"id": "https://xz.aliyun.com/t/16903",
"summary": {
"@type": "html",
"#text": "fastapi 框架中的无回显利用"
}
},
{
"title": "Linux渗透实战之Trickster",
"link": "https://xz.aliyun.com/t/16902",
"published": "2024-12-25T11:49:15+08:00",
"id": "https://xz.aliyun.com/t/16902",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之Trickster"
}
},
{
"title": "HELLOCTF反序列化靶场全解",
"link": "https://xz.aliyun.com/t/16901",
"published": "2024-12-25T10:21:49+08:00",
"id": "https://xz.aliyun.com/t/16901",
"summary": {
"@type": "html",
"#text": "HELLOCTF反序列化靶场全解"
}
},
{
"title": "Tomcat CVE-2024-50379 / CVE-2024-56337 条件竞争漏洞分析",
"link": "https://xz.aliyun.com/t/16900",
"published": "2024-12-25T09:41:05+08:00",
"id": "https://xz.aliyun.com/t/16900",
"summary": {
"@type": "html",
"#text": "Tomcat CVE-2024-50379 / CVE-2024-56337 条件竞争漏洞分析"
}
},
{
"title": "AFL源码学习(一)",
"link": "https://xz.aliyun.com/t/16896",
"published": "2024-12-24T21:58:11+08:00",
"id": "https://xz.aliyun.com/t/16896",
"summary": {
"@type": "html",
"#text": "AFL源码学习(一)"
}
},
{
"title": "基于科来的哥斯拉流量分析",
"link": "https://xz.aliyun.com/t/16895",
"published": "2024-12-24T17:04:59+08:00",
"id": "https://xz.aliyun.com/t/16895",
"summary": {
"@type": "html",
"#text": "基于科来的哥斯拉流量分析"
}
},
{
"title": "Java安全之加载shellcode_bypass杀软",
"link": "https://xz.aliyun.com/t/16894",
"published": "2024-12-24T16:57:00+08:00",
"id": "https://xz.aliyun.com/t/16894",
"summary": {
"@type": "html",
"#text": "Java安全之加载shellcode_bypass杀软"
}
},
{
"title": "pwn的堆中如何使用off by one 和off by null的详细解析以及每一步的调试过程",
"link": "https://xz.aliyun.com/t/16893",
"published": "2024-12-24T15:41:09+08:00",
"id": "https://xz.aliyun.com/t/16893",
"summary": {
"@type": "html",
"#text": "pwn的堆中如何使用off by one 和off by null的详细解析以及每一步的调试过程"
}
},
{
"title": "Linux渗透实战之Instant",
"link": "https://xz.aliyun.com/t/16889",
"published": "2024-12-23T20:01:20+08:00",
"id": "https://xz.aliyun.com/t/16889",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之Instant"
}
},
{
"title": "vulnhub靶机billu_b0x精讲",
"link": "https://xz.aliyun.com/t/16888",
"published": "2024-12-23T18:33:18+08:00",
"id": "https://xz.aliyun.com/t/16888",
"summary": {
"@type": "html",
"#text": "vulnhub靶机billu_b0x精讲"
}
},
{
"title": "企业上云的新攻击面分析",
"link": "https://xz.aliyun.com/t/16887",
"published": "2024-12-23T17:43:33+08:00",
"id": "https://xz.aliyun.com/t/16887",
"summary": {
"@type": "html",
"#text": "企业上云的新攻击面分析"
}
},
{
"title": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集",
"link": "https://xz.aliyun.com/t/16886",
"published": "2024-12-23T17:29:43+08:00",
"id": "https://xz.aliyun.com/t/16886",
"summary": {
"@type": "html",
"#text": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集"
}
},
{
"title": "ECH新时代的域前置",
"link": "https://xz.aliyun.com/t/16884",
"published": "2024-12-23T16:17:20+08:00",
"id": "https://xz.aliyun.com/t/16884",
"summary": {
"@type": "html",
"#text": "ECH新时代的域前置"
}
},
{
"title": "CSS Injection 从入门到精通",
"link": "https://xz.aliyun.com/t/16879",
"published": "2024-12-22T22:06:24+08:00",
"id": "https://xz.aliyun.com/t/16879",
"summary": {
"@type": "html",
"#text": "CSS Injection 从入门到精通"
}
},
{
"title": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解",
"link": "https://xz.aliyun.com/t/16878",
"published": "2024-12-22T20:46:30+08:00",
"id": "https://xz.aliyun.com/t/16878",
"summary": {
"@type": "html",
"#text": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解"
}
},
{
"title": "LitCTF2024--Crypto-wp",
"link": "https://xz.aliyun.com/t/16875",
"published": "2024-12-22T16:19:45+08:00",
"id": "https://xz.aliyun.com/t/16875",
"summary": {
"@type": "html",
"#text": "LitCTF2024--Crypto-wp"
}
},
{
"title": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)",
"link": "https://xz.aliyun.com/t/16874",
"published": "2024-12-22T16:15:09+08:00",
"id": "https://xz.aliyun.com/t/16874",
"summary": {
"@type": "html",
"#text": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)"
}
},
{
"title": "Linux渗透实战之HTB-Heal",
"link": "https://xz.aliyun.com/t/16873",
"published": "2024-12-22T15:13:56+08:00",
"id": "https://xz.aliyun.com/t/16873",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之HTB-Heal"
}
},
{
"title": "春秋云境-多维挑战-CloudNet-WP",
"link": "https://xz.aliyun.com/t/16872",
"published": "2024-12-22T03:40:12+08:00",
"id": "https://xz.aliyun.com/t/16872",
"summary": {
"@type": "html",
"#text": "春秋云境-多维挑战-CloudNet-WP"
}
},
{
"title": "另辟蹊径的bypass方式",
"link": "https://xz.aliyun.com/t/16871",
"published": "2024-12-22T00:16:30+08:00",
"id": "https://xz.aliyun.com/t/16871",
"summary": {
"@type": "html",
"#text": "另辟蹊径的bypass方式"
}
},
{
"title": "国城杯线下web出题思路分享",
"link": "https://xz.aliyun.com/t/16870",
"published": "2024-12-21T23:05:12+08:00",
"id": "https://xz.aliyun.com/t/16870",
"summary": {
"@type": "html",
"#text": "国城杯线下web出题思路分享"
}
},
{
"title": "国城杯线下决赛master_ast题解",
"link": "https://xz.aliyun.com/t/16869",
"published": "2024-12-21T21:44:07+08:00",
"id": "https://xz.aliyun.com/t/16869",
"summary": {
"@type": "html",
"#text": "国城杯线下决赛master_ast题解"
}
},
{
"title": "暴力通关PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解",
"link": "https://xz.aliyun.com/t/16867",
"published": "2024-12-21T20:50:08+08:00",
"id": "https://xz.aliyun.com/t/16867",
"summary": {
"@type": "html",
"#text": "暴力通关PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解"
}
},
{
"title": "DASCTF 2024最后一战寒夜破晓冬至终章(部分wp)",
"link": "https://xz.aliyun.com/t/16866",
"published": "2024-12-21T20:16:12+08:00",
"id": "https://xz.aliyun.com/t/16866",
"summary": {
"@type": "html",
"#text": "DASCTF 2024最后一战寒夜破晓冬至终章(部分wp)"
}
},
{
"title": "2024 DASCTF const_python详解",
"link": "https://xz.aliyun.com/t/16864",
"published": "2024-12-21T19:51:16+08:00",
"id": "https://xz.aliyun.com/t/16864",
"summary": {
"@type": "html",
"#text": "2024 DASCTF const_python详解"
}
},
{
"title": "Zeropz-楚慧杯L组WP",
"link": "https://xz.aliyun.com/t/16863",
"published": "2024-12-21T19:44:53+08:00",
"id": "https://xz.aliyun.com/t/16863",
"summary": {
"@type": "html",
"#text": "Zeropz-楚慧杯L组WP"
}
},
{
"title": "Dirty Pagetable 学习 & 例题",
"link": "https://xz.aliyun.com/t/16862",
"published": "2024-12-21T19:23:38+08:00",
"id": "https://xz.aliyun.com/t/16862",
"summary": {
"@type": "html",
"#text": "Dirty Pagetable 学习 & 例题"
}
},
{
"title": "针对单一系统渗透测试",
"link": "https://xz.aliyun.com/t/16861",
"published": "2024-12-21T19:21:15+08:00",
"id": "https://xz.aliyun.com/t/16861",
"summary": {
"@type": "html",
"#text": "针对单一系统渗透测试"
}
},
{
"title": "Cross cache Attack技术细节分析",
"link": "https://xz.aliyun.com/t/16860",
"published": "2024-12-21T19:19:11+08:00",
"id": "https://xz.aliyun.com/t/16860",
"summary": {
"@type": "html",
"#text": "Cross cache Attack技术细节分析"
}
},
{
"title": "某某语音auth值生成分析",
"link": "https://xz.aliyun.com/t/16859",
"published": "2024-12-21T17:59:50+08:00",
"id": "https://xz.aliyun.com/t/16859",
"summary": {
"@type": "html",
"#text": "某某语音auth值生成分析"
}
},
{
"title": "蓝队—反钓鱼的策略提供",
"link": "https://xz.aliyun.com/t/16858",
"published": "2024-12-21T17:12:06+08:00",
"id": "https://xz.aliyun.com/t/16858",
"summary": {
"@type": "html",
"#text": "蓝队—反钓鱼的策略提供"
}
},
{
"title": "windows内核进程遍历常见方式",
"link": "https://xz.aliyun.com/t/16857",
"published": "2024-12-21T16:38:04+08:00",
"id": "https://xz.aliyun.com/t/16857",
"summary": {
"@type": "html",
"#text": "windows内核进程遍历常见方式"
}
},
{
"title": "ez_zhuawa出题记录",
"link": "https://xz.aliyun.com/t/16856",
"published": "2024-12-21T15:44:09+08:00",
"id": "https://xz.aliyun.com/t/16856",
"summary": {
"@type": "html",
"#text": "ez_zhuawa出题记录"
}
},
{
"title": "Windows内核回调",
"link": "https://xz.aliyun.com/t/16855",
"published": "2024-12-21T15:17:48+08:00",
"id": "https://xz.aliyun.com/t/16855",
"summary": {
"@type": "html",
"#text": "Windows内核回调"
}
},
{
"title": "Linux渗透实战之不一样的XSS",
"link": "https://xz.aliyun.com/t/16853",
"published": "2024-12-21T10:53:08+08:00",
"id": "https://xz.aliyun.com/t/16853",
"summary": {
"@type": "html",
"#text": "Linux渗透实战之不一样的XSS"
}
},
{
"title": "基于优化的大模型越狱技术分析与实战",
"link": "https://xz.aliyun.com/t/16852",
"published": "2024-12-20T21:17:55+08:00",
"id": "https://xz.aliyun.com/t/16852",
"summary": {
"@type": "html",
"#text": "基于优化的大模型越狱技术分析与实战"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE",
"link": "https://xz.aliyun.com/t/16850",
"published": "2024-12-20T18:55:42+08:00",
"id": "https://xz.aliyun.com/t/16850",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解",
"link": "https://xz.aliyun.com/t/16849",
"published": "2024-12-20T17:24:00+08:00",
"id": "https://xz.aliyun.com/t/16849",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解"
}
},
{
"title": "代码审计-某物联网系统RCE",
"link": "https://xz.aliyun.com/t/16848",
"published": "2024-12-20T17:19:40+08:00",
"id": "https://xz.aliyun.com/t/16848",
"summary": {
"@type": "html",
"#text": "代码审计-某物联网系统RCE"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP",
"link": "https://xz.aliyun.com/t/16847",
"published": "2024-12-20T17:10:07+08:00",
"id": "https://xz.aliyun.com/t/16847",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP"
}
},
{
"title": "某系统审计权限绕过-CVE-2024-9554",
"link": "https://xz.aliyun.com/t/16845",
"published": "2024-12-20T16:53:05+08:00",
"id": "https://xz.aliyun.com/t/16845",
"summary": {
"@type": "html",
"#text": "某系统审计权限绕过-CVE-2024-9554"
}
},
{
"title": "某系统代码审计到getshell",
"link": "https://xz.aliyun.com/t/16841",
"published": "2024-12-20T16:08:09+08:00",
"id": "https://xz.aliyun.com/t/16841",
"summary": {
"@type": "html",
"#text": "某系统代码审计到getshell"
}
},
{
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto",
"link": "https://xz.aliyun.com/t/16846",
"published": "2024-12-20T14:30:16+08:00",
"id": "https://xz.aliyun.com/t/16846",
"summary": {
"@type": "html",
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto"
}
},
{
"title": "银狐黑产组织最新免杀样本详细分析",
"link": "https://xz.aliyun.com/t/16837",
"published": "2024-12-20T08:17:20+08:00",
"id": "https://xz.aliyun.com/t/16837",
"summary": {
"@type": "html",
"#text": "银狐黑产组织最新免杀样本详细分析"
}
},
{
"title": "初识AFL工具安装与基本用法",
"link": "https://xz.aliyun.com/t/16836",
"published": "2024-12-20T03:07:30+08:00",
"id": "https://xz.aliyun.com/t/16836",
"summary": {
"@type": "html",
"#text": "初识AFL工具安装与基本用法"
}
},
{
"title": "某渗透中代码审计到内网遨游",
"link": "https://xz.aliyun.com/t/16835",
"published": "2024-12-19T21:53:53+08:00",
"id": "https://xz.aliyun.com/t/16835",
"summary": {
"@type": "html",
"#text": "某渗透中代码审计到内网遨游"
}
},
{
"title": "Pointer Overflow CTF - 2024 Web全write up",
"link": "https://xz.aliyun.com/t/16834",
"published": "2024-12-19T20:58:58+08:00",
"id": "https://xz.aliyun.com/t/16834",
"summary": {
"@type": "html",
"#text": "Pointer Overflow CTF - 2024 Web全write up"
}
},
{
"title": "浅析实战攻防中的信息收集",
"link": "https://xz.aliyun.com/t/16832",
"published": "2024-12-19T16:32:00+08:00",
"id": "https://xz.aliyun.com/t/16832",
"summary": {
"@type": "html",
"#text": "浅析实战攻防中的信息收集"
}
},
{
"title": "Spring FatJar写文件到RCE分析",
"link": "https://xz.aliyun.com/t/16831",
"published": "2024-12-19T16:04:00+08:00",
"id": "https://xz.aliyun.com/t/16831",
"summary": {
"@type": "html",
"#text": "Spring FatJar写文件到RCE分析"
}
},
{
"title": "应急响应记录之水坑挂马事件分析与恢复",
"link": "https://xz.aliyun.com/t/16829",
"published": "2024-12-19T14:27:41+08:00",
"id": "https://xz.aliyun.com/t/16829",
"summary": {
"@type": "html",
"#text": "应急响应记录之水坑挂马事件分析与恢复"
}
},
{
"title": "万字长文窥探信息收集真正的艺术",
"link": "https://xz.aliyun.com/t/16828",
"published": "2024-12-19T13:57:53+08:00",
"id": "https://xz.aliyun.com/t/16828",
"summary": {
"@type": "html",
"#text": "万字长文窥探信息收集真正的艺术"
}
},
{
"title": "记一次5000万资产的渗透测试",
"link": "https://xz.aliyun.com/t/16827",
"published": "2024-12-19T12:34:52+08:00",
"id": "https://xz.aliyun.com/t/16827",
"summary": {
"@type": "html",
"#text": "记一次5000万资产的渗透测试"
}
},
{
"title": "一次 house of force 练习HTB pwn - Fancy names",
"link": "https://xz.aliyun.com/t/16825",
"published": "2024-12-19T11:41:53+08:00",
"id": "https://xz.aliyun.com/t/16825",
"summary": {
"@type": "html",
"#text": "一次 house of force 练习HTB pwn - Fancy names"
}
},
{
"title": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞",
"link": "https://xz.aliyun.com/t/16824",
"published": "2024-12-19T11:13:41+08:00",
"id": "https://xz.aliyun.com/t/16824",
"summary": {
"@type": "html",
"#text": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞"
}
},
{
"title": "面向GPTs的提示词注入攻击分析",
"link": "https://xz.aliyun.com/t/16816",
"published": "2024-12-18T23:23:30+08:00",
"id": "https://xz.aliyun.com/t/16816",
"summary": {
"@type": "html",
"#text": "面向GPTs的提示词注入攻击分析"
}
},
{
"title": "PE文件代码注入",
"link": "https://xz.aliyun.com/t/16815",
"published": "2024-12-18T23:11:47+08:00",
"id": "https://xz.aliyun.com/t/16815",
"summary": {
"@type": "html",
"#text": "PE文件代码注入"
}
},
{
"title": "域渗透实战之HTB-Certified",
"link": "https://xz.aliyun.com/t/16813",
"published": "2024-12-18T20:59:47+08:00",
"id": "https://xz.aliyun.com/t/16813",
"summary": {
"@type": "html",
"#text": "域渗透实战之HTB-Certified"
}
},
{
"title": "2025 ciscn novel1详细解析",
"link": "https://xz.aliyun.com/t/16811",
"published": "2024-12-18T19:16:12+08:00",
"id": "https://xz.aliyun.com/t/16811",
"summary": {
"@type": "html",
"#text": "2025 ciscn novel1详细解析"
}
},
{
"title": "先知安全沙龙(上海站) - 后渗透阶段主机关键信息自动化狩猎的实现与应用",
"link": "https://xz.aliyun.com/t/16823",
"published": "2024-12-18T16:39:00+08:00",
"id": "https://xz.aliyun.com/t/16823",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - 后渗透阶段主机关键信息自动化狩猎的实现与应用"
}
},
{
"title": "先知安全沙龙(上海站) - 红队武器开发之基于合法服务的隐蔽C2",
"link": "https://xz.aliyun.com/t/16821",
"published": "2024-12-18T16:38:00+08:00",
"id": "https://xz.aliyun.com/t/16821",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - 红队武器开发之基于合法服务的隐蔽C2"
}
},
{
"title": "先知安全沙龙(上海站) - Linux沙箱技术(权限机制、资源隔离与安全防御)",
"link": "https://xz.aliyun.com/t/16820",
"published": "2024-12-18T16:37:00+08:00",
"id": "https://xz.aliyun.com/t/16820",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - Linux沙箱技术(权限机制、资源隔离与安全防御)"
}
},
{
"title": "先知安全沙龙(上海站) - 终端安全对抗及防护",
"link": "https://xz.aliyun.com/t/16819",
"published": "2024-12-18T16:36:00+08:00",
"id": "https://xz.aliyun.com/t/16819",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - 终端安全对抗及防护"
}
},
{
"title": "先知安全沙龙(上海站) - 大模型基础设施安全攻防",
"link": "https://xz.aliyun.com/t/16818",
"published": "2024-12-18T16:35:00+08:00",
"id": "https://xz.aliyun.com/t/16818",
"summary": {
"@type": "html",
"#text": "先知安全沙龙(上海站) - 大模型基础设施安全攻防"
}
},
{
"title": "Sharp4RemoveLog一款通过调用wevtutil进程实现痕迹清理的工具",
"link": "https://xz.aliyun.com/t/16809",
"published": "2024-12-18T16:07:07+08:00",
"id": "https://xz.aliyun.com/t/16809",
"summary": {
"@type": "html",
"#text": "Sharp4RemoveLog一款通过调用wevtutil进程实现痕迹清理的工具"
}
},
{
"title": "Guns后台任意文件上传漏洞分析",
"link": "https://xz.aliyun.com/t/16808",
"published": "2024-12-18T15:37:32+08:00",
"id": "https://xz.aliyun.com/t/16808",
"summary": {
"@type": "html",
"#text": "Guns后台任意文件上传漏洞分析"
}
},
{
"title": "红队权限维持策略——实用版r3-r0",
"link": "https://xz.aliyun.com/t/16806",
"published": "2024-12-17T23:25:10+08:00",
"id": "https://xz.aliyun.com/t/16806",
"summary": {
"@type": "html",
"#text": "红队权限维持策略——实用版r3-r0"
}
},
{
"title": "最近做的一些有意思的ctf赛题详细分析",
"link": "https://xz.aliyun.com/t/16805",
"published": "2024-12-17T21:53:01+08:00",
"id": "https://xz.aliyun.com/t/16805",
"summary": {
"@type": "html",
"#text": "最近做的一些有意思的ctf赛题详细分析"
}
},
{
"title": "CTF一些有意思考点+例题详细分析系列",
"link": "https://xz.aliyun.com/t/16804",
"published": "2024-12-17T21:09:18+08:00",
"id": "https://xz.aliyun.com/t/16804",
"summary": {
"@type": "html",
"#text": "CTF一些有意思考点+例题详细分析系列"
}
},
{
"title": "从hello-web入手反混淆和disable_function绕过",
"link": "https://xz.aliyun.com/t/16802",
"published": "2024-12-17T20:35:00+08:00",
"id": "https://xz.aliyun.com/t/16802",
"summary": {
"@type": "html",
"#text": "从hello-web入手反混淆和disable_function绕过"
}
},
{
"title": "2024国城杯线上signal出题文档",
"link": "https://xz.aliyun.com/t/16801",
"published": "2024-12-17T19:55:08+08:00",
"id": "https://xz.aliyun.com/t/16801",
"summary": {
"@type": "html",
"#text": "2024国城杯线上signal出题文档"
}
},
{
"title": "深入Pyd逆向",
"link": "https://xz.aliyun.com/t/16800",
"published": "2024-12-17T15:47:44+08:00",
"id": "https://xz.aliyun.com/t/16800",
"summary": {
"@type": "html",
"#text": "深入Pyd逆向"
}
},
{
"title": "CVE-2022-0874漏洞复现——Linux内核splice系统调用未正确初始化管道缓存漏洞分析文末附EXP代码",
"link": "https://xz.aliyun.com/t/16798",
"published": "2024-12-17T13:59:06+08:00",
"id": "https://xz.aliyun.com/t/16798",
"summary": {
"@type": "html",
"#text": "CVE-2022-0874漏洞复现——Linux内核splice系统调用未正确初始化管道缓存漏洞分析文末附EXP代码"
}
},
{
"title": "DocSys代码审计",
"link": "https://xz.aliyun.com/t/16797",
"published": "2024-12-17T13:57:15+08:00",
"id": "https://xz.aliyun.com/t/16797",
"summary": {
"@type": "html",
"#text": "DocSys代码审计"
}
},
{
"title": "oppo a53 5g unlocktool 强解bl锁magisk工具root [小白避坑篇]",
"link": "https://xz.aliyun.com/t/16796",
"published": "2024-12-17T13:55:52+08:00",
"id": "https://xz.aliyun.com/t/16796",
"summary": {
"@type": "html",
"#text": "oppo a53 5g unlocktool 强解bl锁magisk工具root [小白避坑篇]"
}
},
{
"title": "LitCTF2024--Misc全wp",
"link": "https://xz.aliyun.com/t/16795",
"published": "2024-12-17T12:36:41+08:00",
"id": "https://xz.aliyun.com/t/16795",
"summary": {
"@type": "html",
"#text": "LitCTF2024--Misc全wp"
}
},
{
"title": "HTB-University CTF 2024 Binary Badlands 的 Forensics 部分WP",
"link": "https://xz.aliyun.com/t/16794",
"published": "2024-12-17T09:55:02+08:00",
"id": "https://xz.aliyun.com/t/16794",
"summary": {
"@type": "html",
"#text": "HTB-University CTF 2024 Binary Badlands 的 Forensics 部分WP"
}
},
{
"title": "浅析Ruby类污染及其在Sinatra框架下的利用",
"link": "https://xz.aliyun.com/t/16792",
"published": "2024-12-16T23:26:40+08:00",
"id": "https://xz.aliyun.com/t/16792",
"summary": {
"@type": "html",
"#text": "浅析Ruby类污染及其在Sinatra框架下的利用"
}
},
{
"title": "Pipe管道利用研究分享",
"link": "https://xz.aliyun.com/t/16790",
"published": "2024-12-16T20:30:00+08:00",
"id": "https://xz.aliyun.com/t/16790",
"summary": {
"@type": "html",
"#text": "Pipe管道利用研究分享"
}
},
{
"title": "对ssti无回显的新版内存马学习",
"link": "https://xz.aliyun.com/t/16787",
"published": "2024-12-16T15:37:55+08:00",
"id": "https://xz.aliyun.com/t/16787",
"summary": {
"@type": "html",
"#text": "对ssti无回显的新版内存马学习"
}
},
{
"title": "域渗透实战之HTB-Vintage",
"link": "https://xz.aliyun.com/t/16785",
"published": "2024-12-16T13:39:10+08:00",
"id": "https://xz.aliyun.com/t/16785",
"summary": {
"@type": "html",
"#text": "域渗透实战之HTB-Vintage"
}
},
{
"title": "实战演示 BurpSuite 插件 SignMe 安装和使用,有签名的接口也可以爆破了",
"link": "https://xz.aliyun.com/t/16780",
"published": "2024-12-16T12:08:51+08:00",
"id": "https://xz.aliyun.com/t/16780",
"summary": {
"@type": "html",
"#text": "实战演示 BurpSuite 插件 SignMe 安装和使用,有签名的接口也可以爆破了"
}
},
{
"title": "Apache Common Jelly Remote Code Execution",
"link": "https://xz.aliyun.com/t/16779",
"published": "2024-12-16T10:15:19+08:00",
"id": "https://xz.aliyun.com/t/16779",
"summary": {
"@type": "html",
"#text": "Apache Common Jelly Remote Code Execution"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 0解PWN题--server解法",
"link": "https://xz.aliyun.com/t/16778",
"published": "2024-12-16T10:01:00+08:00",
"id": "https://xz.aliyun.com/t/16778",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 0解PWN题--server解法"
}
},
{
"title": "免杀基础-ppid伪造",
"link": "https://xz.aliyun.com/t/16777",
"published": "2024-12-16T10:00:14+08:00",
"id": "https://xz.aliyun.com/t/16777",
"summary": {
"@type": "html",
"#text": "免杀基础-ppid伪造"
}
},
{
"title": "高效IO攻击利用学习之House of apple2超详解",
"link": "https://xz.aliyun.com/t/16775",
"published": "2024-12-16T00:37:35+08:00",
"id": "https://xz.aliyun.com/t/16775",
"summary": {
"@type": "html",
"#text": "高效IO攻击利用学习之House of apple2超详解"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - Crypto详解",
"link": "https://xz.aliyun.com/t/16773",
"published": "2024-12-15T22:42:00+08:00",
"id": "https://xz.aliyun.com/t/16773",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - Crypto详解"
}
},
{
"title": "m0leCon Beginner CTF2024部分wp",
"link": "https://xz.aliyun.com/t/16772",
"published": "2024-12-15T21:31:48+08:00",
"id": "https://xz.aliyun.com/t/16772",
"summary": {
"@type": "html",
"#text": "m0leCon Beginner CTF2024部分wp"
}
},
{
"title": "Ucum-java XXE漏洞分析(CVE-2024-55887)",
"link": "https://xz.aliyun.com/t/16771",
"published": "2024-12-15T21:04:00+08:00",
"id": "https://xz.aliyun.com/t/16771",
"summary": {
"@type": "html",
"#text": "Ucum-java XXE漏洞分析(CVE-2024-55887)"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - re",
"link": "https://xz.aliyun.com/t/16766",
"published": "2024-12-15T18:21:26+08:00",
"id": "https://xz.aliyun.com/t/16766",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - re"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - zeroshell1~5WinFT_1~2sc05_1",
"link": "https://xz.aliyun.com/t/16759",
"published": "2024-12-15T17:26:01+08:00",
"id": "https://xz.aliyun.com/t/16759",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - zeroshell1~5WinFT_1~2sc05_1"
}
},
{
"title": "第二届“长城杯”铁人三项赛 (防护赛)初赛WriteUP",
"link": "https://xz.aliyun.com/t/16789",
"published": "2024-12-15T17:26:01+08:00",
"id": "https://xz.aliyun.com/t/16789",
"summary": {
"@type": "html",
"#text": "第二届“长城杯”铁人三项赛 (防护赛)初赛WriteUP"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - web&re wp",
"link": "https://xz.aliyun.com/t/16755",
"published": "2024-12-15T17:14:30+08:00",
"id": "https://xz.aliyun.com/t/16755",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - web&re wp"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - pwn",
"link": "https://xz.aliyun.com/t/16751",
"published": "2024-12-15T17:05:55+08:00",
"id": "https://xz.aliyun.com/t/16751",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - pwn"
}
},
{
"title": "第十八届信息安全大赛 && 第二届长城杯 - WEB WP",
"link": "https://xz.aliyun.com/t/16750",
"published": "2024-12-15T17:02:06+08:00",
"id": "https://xz.aliyun.com/t/16750",
"summary": {
"@type": "html",
"#text": "第十八届信息安全大赛 && 第二届长城杯 - WEB WP"
}
},
{
"title": "HITCTF pipe_snake详解",
"link": "https://xz.aliyun.com/t/16748",
"published": "2024-12-15T09:25:49+08:00",
"id": "https://xz.aliyun.com/t/16748",
"summary": {
"@type": "html",
"#text": "HITCTF pipe_snake详解"
}
},
{
"title": "记一次客户系统的测试--多种经典类型漏洞",
"link": "https://xz.aliyun.com/t/16747",
"published": "2024-12-14T23:33:38+08:00",
"id": "https://xz.aliyun.com/t/16747",
"summary": {
"@type": "html",
"#text": "记一次客户系统的测试--多种经典类型漏洞"
}
},
{
"title": "记一次渗透到审计",
"link": "https://xz.aliyun.com/t/16746",
"published": "2024-12-14T21:23:00+08:00",
"id": "https://xz.aliyun.com/t/16746",
"summary": {
"@type": "html",
"#text": "记一次渗透到审计"
}
},
{
"title": "某次大学的渗透测试经历",
"link": "https://xz.aliyun.com/t/16745",
"published": "2024-12-14T16:51:12+08:00",
"id": "https://xz.aliyun.com/t/16745",
"summary": {
"@type": "html",
"#text": "某次大学的渗透测试经历"
}
}
]