1002 lines
35 KiB
JSON
1002 lines
35 KiB
JSON
[
|
||
{
|
||
"title": "JAVA安全之SpEL表达式执行",
|
||
"link": "https://xz.aliyun.com/t/16905",
|
||
"published": "2024-12-25T14:36:47+08:00",
|
||
"id": "https://xz.aliyun.com/t/16905",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "JAVA安全之SpEL表达式执行"
|
||
}
|
||
},
|
||
{
|
||
"title": "从源码角度分析hessian特别的原因",
|
||
"link": "https://xz.aliyun.com/t/16904",
|
||
"published": "2024-12-25T13:46:49+08:00",
|
||
"id": "https://xz.aliyun.com/t/16904",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从源码角度分析hessian特别的原因"
|
||
}
|
||
},
|
||
{
|
||
"title": "fastapi 框架中的无回显利用",
|
||
"link": "https://xz.aliyun.com/t/16903",
|
||
"published": "2024-12-25T13:27:28+08:00",
|
||
"id": "https://xz.aliyun.com/t/16903",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "fastapi 框架中的无回显利用"
|
||
}
|
||
},
|
||
{
|
||
"title": "Linux渗透实战之Trickster",
|
||
"link": "https://xz.aliyun.com/t/16902",
|
||
"published": "2024-12-25T11:49:15+08:00",
|
||
"id": "https://xz.aliyun.com/t/16902",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Linux渗透实战之Trickster"
|
||
}
|
||
},
|
||
{
|
||
"title": "HELLOCTF反序列化靶场全解",
|
||
"link": "https://xz.aliyun.com/t/16901",
|
||
"published": "2024-12-25T10:21:49+08:00",
|
||
"id": "https://xz.aliyun.com/t/16901",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "HELLOCTF反序列化靶场全解"
|
||
}
|
||
},
|
||
{
|
||
"title": "Tomcat CVE-2024-50379 / CVE-2024-56337 条件竞争漏洞分析",
|
||
"link": "https://xz.aliyun.com/t/16900",
|
||
"published": "2024-12-25T09:41:05+08:00",
|
||
"id": "https://xz.aliyun.com/t/16900",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Tomcat CVE-2024-50379 / CVE-2024-56337 条件竞争漏洞分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "AFL源码学习(一)",
|
||
"link": "https://xz.aliyun.com/t/16896",
|
||
"published": "2024-12-24T21:58:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16896",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "AFL源码学习(一)"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于科来的哥斯拉流量分析",
|
||
"link": "https://xz.aliyun.com/t/16895",
|
||
"published": "2024-12-24T17:04:59+08:00",
|
||
"id": "https://xz.aliyun.com/t/16895",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于科来的哥斯拉流量分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "Java安全之加载shellcode_bypass杀软",
|
||
"link": "https://xz.aliyun.com/t/16894",
|
||
"published": "2024-12-24T16:57:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16894",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Java安全之加载shellcode_bypass杀软"
|
||
}
|
||
},
|
||
{
|
||
"title": "pwn的堆中如何使用off by one 和off by null的详细解析以及每一步的调试过程",
|
||
"link": "https://xz.aliyun.com/t/16893",
|
||
"published": "2024-12-24T15:41:09+08:00",
|
||
"id": "https://xz.aliyun.com/t/16893",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "pwn的堆中如何使用off by one 和off by null的详细解析以及每一步的调试过程"
|
||
}
|
||
},
|
||
{
|
||
"title": "Linux渗透实战之Instant",
|
||
"link": "https://xz.aliyun.com/t/16889",
|
||
"published": "2024-12-23T20:01:20+08:00",
|
||
"id": "https://xz.aliyun.com/t/16889",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Linux渗透实战之Instant"
|
||
}
|
||
},
|
||
{
|
||
"title": "vulnhub靶机billu_b0x精讲",
|
||
"link": "https://xz.aliyun.com/t/16888",
|
||
"published": "2024-12-23T18:33:18+08:00",
|
||
"id": "https://xz.aliyun.com/t/16888",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "vulnhub靶机billu_b0x精讲"
|
||
}
|
||
},
|
||
{
|
||
"title": "企业上云的新攻击面分析",
|
||
"link": "https://xz.aliyun.com/t/16887",
|
||
"published": "2024-12-23T17:43:33+08:00",
|
||
"id": "https://xz.aliyun.com/t/16887",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "企业上云的新攻击面分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集",
|
||
"link": "https://xz.aliyun.com/t/16886",
|
||
"published": "2024-12-23T17:29:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16886",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "分享Fastjson反序列化漏洞原理+漏洞复现+实战案例+POC收集"
|
||
}
|
||
},
|
||
{
|
||
"title": "ECH,新时代的域前置",
|
||
"link": "https://xz.aliyun.com/t/16884",
|
||
"published": "2024-12-23T16:17:20+08:00",
|
||
"id": "https://xz.aliyun.com/t/16884",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "ECH,新时代的域前置"
|
||
}
|
||
},
|
||
{
|
||
"title": "CSS Injection 从入门到精通",
|
||
"link": "https://xz.aliyun.com/t/16879",
|
||
"published": "2024-12-22T22:06:24+08:00",
|
||
"id": "https://xz.aliyun.com/t/16879",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CSS Injection 从入门到精通"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解",
|
||
"link": "https://xz.aliyun.com/t/16878",
|
||
"published": "2024-12-22T20:46:30+08:00",
|
||
"id": "https://xz.aliyun.com/t/16878",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 CISCN & 第二届长城杯铁人三项赛 0解Web BookManager 题解"
|
||
}
|
||
},
|
||
{
|
||
"title": "LitCTF2024--Crypto-wp",
|
||
"link": "https://xz.aliyun.com/t/16875",
|
||
"published": "2024-12-22T16:19:45+08:00",
|
||
"id": "https://xz.aliyun.com/t/16875",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "LitCTF2024--Crypto-wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)",
|
||
"link": "https://xz.aliyun.com/t/16874",
|
||
"published": "2024-12-22T16:15:09+08:00",
|
||
"id": "https://xz.aliyun.com/t/16874",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "kioptix level 3靶机getshell及提权(按oscp考证要求使用)"
|
||
}
|
||
},
|
||
{
|
||
"title": "Linux渗透实战之HTB-Heal",
|
||
"link": "https://xz.aliyun.com/t/16873",
|
||
"published": "2024-12-22T15:13:56+08:00",
|
||
"id": "https://xz.aliyun.com/t/16873",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Linux渗透实战之HTB-Heal"
|
||
}
|
||
},
|
||
{
|
||
"title": "春秋云境-多维挑战-CloudNet-WP",
|
||
"link": "https://xz.aliyun.com/t/16872",
|
||
"published": "2024-12-22T03:40:12+08:00",
|
||
"id": "https://xz.aliyun.com/t/16872",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "春秋云境-多维挑战-CloudNet-WP"
|
||
}
|
||
},
|
||
{
|
||
"title": "另辟蹊径的bypass方式",
|
||
"link": "https://xz.aliyun.com/t/16871",
|
||
"published": "2024-12-22T00:16:30+08:00",
|
||
"id": "https://xz.aliyun.com/t/16871",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "另辟蹊径的bypass方式"
|
||
}
|
||
},
|
||
{
|
||
"title": "国城杯线下web出题思路分享",
|
||
"link": "https://xz.aliyun.com/t/16870",
|
||
"published": "2024-12-21T23:05:12+08:00",
|
||
"id": "https://xz.aliyun.com/t/16870",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "国城杯线下web出题思路分享"
|
||
}
|
||
},
|
||
{
|
||
"title": "国城杯线下决赛master_ast题解",
|
||
"link": "https://xz.aliyun.com/t/16869",
|
||
"published": "2024-12-21T21:44:07+08:00",
|
||
"id": "https://xz.aliyun.com/t/16869",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "国城杯线下决赛master_ast题解"
|
||
}
|
||
},
|
||
{
|
||
"title": "暴力通关,PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解",
|
||
"link": "https://xz.aliyun.com/t/16867",
|
||
"published": "2024-12-21T20:50:08+08:00",
|
||
"id": "https://xz.aliyun.com/t/16867",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "暴力通关,PyAutoGUI解re游戏题——DASCTF2024最后一战RE部分题解"
|
||
}
|
||
},
|
||
{
|
||
"title": "DASCTF 2024最后一战|寒夜破晓,冬至终章(部分wp)",
|
||
"link": "https://xz.aliyun.com/t/16866",
|
||
"published": "2024-12-21T20:16:12+08:00",
|
||
"id": "https://xz.aliyun.com/t/16866",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "DASCTF 2024最后一战|寒夜破晓,冬至终章(部分wp)"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 DASCTF const_python详解",
|
||
"link": "https://xz.aliyun.com/t/16864",
|
||
"published": "2024-12-21T19:51:16+08:00",
|
||
"id": "https://xz.aliyun.com/t/16864",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 DASCTF const_python详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "Zeropz-楚慧杯L组WP",
|
||
"link": "https://xz.aliyun.com/t/16863",
|
||
"published": "2024-12-21T19:44:53+08:00",
|
||
"id": "https://xz.aliyun.com/t/16863",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Zeropz-楚慧杯L组WP"
|
||
}
|
||
},
|
||
{
|
||
"title": "Dirty Pagetable 学习 & 例题",
|
||
"link": "https://xz.aliyun.com/t/16862",
|
||
"published": "2024-12-21T19:23:38+08:00",
|
||
"id": "https://xz.aliyun.com/t/16862",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Dirty Pagetable 学习 & 例题"
|
||
}
|
||
},
|
||
{
|
||
"title": "针对单一系统渗透测试",
|
||
"link": "https://xz.aliyun.com/t/16861",
|
||
"published": "2024-12-21T19:21:15+08:00",
|
||
"id": "https://xz.aliyun.com/t/16861",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "针对单一系统渗透测试"
|
||
}
|
||
},
|
||
{
|
||
"title": "Cross cache Attack技术细节分析",
|
||
"link": "https://xz.aliyun.com/t/16860",
|
||
"published": "2024-12-21T19:19:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16860",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Cross cache Attack技术细节分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "某某语音auth值生成分析",
|
||
"link": "https://xz.aliyun.com/t/16859",
|
||
"published": "2024-12-21T17:59:50+08:00",
|
||
"id": "https://xz.aliyun.com/t/16859",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某某语音auth值生成分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "蓝队—反钓鱼的策略提供",
|
||
"link": "https://xz.aliyun.com/t/16858",
|
||
"published": "2024-12-21T17:12:06+08:00",
|
||
"id": "https://xz.aliyun.com/t/16858",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "蓝队—反钓鱼的策略提供"
|
||
}
|
||
},
|
||
{
|
||
"title": "windows内核进程遍历常见方式",
|
||
"link": "https://xz.aliyun.com/t/16857",
|
||
"published": "2024-12-21T16:38:04+08:00",
|
||
"id": "https://xz.aliyun.com/t/16857",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "windows内核进程遍历常见方式"
|
||
}
|
||
},
|
||
{
|
||
"title": "ez_zhuawa出题记录",
|
||
"link": "https://xz.aliyun.com/t/16856",
|
||
"published": "2024-12-21T15:44:09+08:00",
|
||
"id": "https://xz.aliyun.com/t/16856",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "ez_zhuawa出题记录"
|
||
}
|
||
},
|
||
{
|
||
"title": "Windows内核回调",
|
||
"link": "https://xz.aliyun.com/t/16855",
|
||
"published": "2024-12-21T15:17:48+08:00",
|
||
"id": "https://xz.aliyun.com/t/16855",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Windows内核回调"
|
||
}
|
||
},
|
||
{
|
||
"title": "Linux渗透实战之不一样的XSS",
|
||
"link": "https://xz.aliyun.com/t/16853",
|
||
"published": "2024-12-21T10:53:08+08:00",
|
||
"id": "https://xz.aliyun.com/t/16853",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Linux渗透实战之不一样的XSS"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于优化的大模型越狱技术分析与实战",
|
||
"link": "https://xz.aliyun.com/t/16852",
|
||
"published": "2024-12-20T21:17:55+08:00",
|
||
"id": "https://xz.aliyun.com/t/16852",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于优化的大模型越狱技术分析与实战"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE",
|
||
"link": "https://xz.aliyun.com/t/16850",
|
||
"published": "2024-12-20T18:55:42+08:00",
|
||
"id": "https://xz.aliyun.com/t/16850",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛-RE"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解",
|
||
"link": "https://xz.aliyun.com/t/16849",
|
||
"published": "2024-12-20T17:24:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16849",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 pwn全解"
|
||
}
|
||
},
|
||
{
|
||
"title": "代码审计-某物联网系统RCE",
|
||
"link": "https://xz.aliyun.com/t/16848",
|
||
"published": "2024-12-20T17:19:40+08:00",
|
||
"id": "https://xz.aliyun.com/t/16848",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "代码审计-某物联网系统RCE"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP",
|
||
"link": "https://xz.aliyun.com/t/16847",
|
||
"published": "2024-12-20T17:10:07+08:00",
|
||
"id": "https://xz.aliyun.com/t/16847",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 WP"
|
||
}
|
||
},
|
||
{
|
||
"title": "某系统审计权限绕过-CVE-2024-9554",
|
||
"link": "https://xz.aliyun.com/t/16845",
|
||
"published": "2024-12-20T16:53:05+08:00",
|
||
"id": "https://xz.aliyun.com/t/16845",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某系统审计权限绕过-CVE-2024-9554"
|
||
}
|
||
},
|
||
{
|
||
"title": "某系统代码审计到getshell",
|
||
"link": "https://xz.aliyun.com/t/16841",
|
||
"published": "2024-12-20T16:08:09+08:00",
|
||
"id": "https://xz.aliyun.com/t/16841",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某系统代码审计到getshell"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto",
|
||
"link": "https://xz.aliyun.com/t/16846",
|
||
"published": "2024-12-20T14:30:16+08:00",
|
||
"id": "https://xz.aliyun.com/t/16846",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024年第九届“楚慧杯”湖北省网络与数据安全实践能力竞赛 web&pwn&Crypto"
|
||
}
|
||
},
|
||
{
|
||
"title": "银狐黑产组织最新免杀样本详细分析",
|
||
"link": "https://xz.aliyun.com/t/16837",
|
||
"published": "2024-12-20T08:17:20+08:00",
|
||
"id": "https://xz.aliyun.com/t/16837",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "银狐黑产组织最新免杀样本详细分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "初识AFL:工具安装与基本用法",
|
||
"link": "https://xz.aliyun.com/t/16836",
|
||
"published": "2024-12-20T03:07:30+08:00",
|
||
"id": "https://xz.aliyun.com/t/16836",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "初识AFL:工具安装与基本用法"
|
||
}
|
||
},
|
||
{
|
||
"title": "某渗透中代码审计到内网遨游",
|
||
"link": "https://xz.aliyun.com/t/16835",
|
||
"published": "2024-12-19T21:53:53+08:00",
|
||
"id": "https://xz.aliyun.com/t/16835",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某渗透中代码审计到内网遨游"
|
||
}
|
||
},
|
||
{
|
||
"title": "Pointer Overflow CTF - 2024 Web全write up",
|
||
"link": "https://xz.aliyun.com/t/16834",
|
||
"published": "2024-12-19T20:58:58+08:00",
|
||
"id": "https://xz.aliyun.com/t/16834",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Pointer Overflow CTF - 2024 Web全write up"
|
||
}
|
||
},
|
||
{
|
||
"title": "浅析实战攻防中的信息收集",
|
||
"link": "https://xz.aliyun.com/t/16832",
|
||
"published": "2024-12-19T16:32:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16832",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "浅析实战攻防中的信息收集"
|
||
}
|
||
},
|
||
{
|
||
"title": "Spring FatJar写文件到RCE分析",
|
||
"link": "https://xz.aliyun.com/t/16831",
|
||
"published": "2024-12-19T16:04:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16831",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Spring FatJar写文件到RCE分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "应急响应记录之水坑挂马事件分析与恢复",
|
||
"link": "https://xz.aliyun.com/t/16829",
|
||
"published": "2024-12-19T14:27:41+08:00",
|
||
"id": "https://xz.aliyun.com/t/16829",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "应急响应记录之水坑挂马事件分析与恢复"
|
||
}
|
||
},
|
||
{
|
||
"title": "万字长文窥探信息收集真正的艺术",
|
||
"link": "https://xz.aliyun.com/t/16828",
|
||
"published": "2024-12-19T13:57:53+08:00",
|
||
"id": "https://xz.aliyun.com/t/16828",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "万字长文窥探信息收集真正的艺术"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次5000万资产的渗透测试",
|
||
"link": "https://xz.aliyun.com/t/16827",
|
||
"published": "2024-12-19T12:34:52+08:00",
|
||
"id": "https://xz.aliyun.com/t/16827",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次5000万资产的渗透测试"
|
||
}
|
||
},
|
||
{
|
||
"title": "一次 house of force 练习:HTB pwn - Fancy names",
|
||
"link": "https://xz.aliyun.com/t/16825",
|
||
"published": "2024-12-19T11:41:53+08:00",
|
||
"id": "https://xz.aliyun.com/t/16825",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "一次 house of force 练习:HTB pwn - Fancy names"
|
||
}
|
||
},
|
||
{
|
||
"title": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞",
|
||
"link": "https://xz.aliyun.com/t/16824",
|
||
"published": "2024-12-19T11:13:41+08:00",
|
||
"id": "https://xz.aliyun.com/t/16824",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "【CVE-2025-50379】利用cursor解读tomcat 条件竞争导致RCE漏洞"
|
||
}
|
||
},
|
||
{
|
||
"title": "面向GPTs的提示词注入攻击分析",
|
||
"link": "https://xz.aliyun.com/t/16816",
|
||
"published": "2024-12-18T23:23:30+08:00",
|
||
"id": "https://xz.aliyun.com/t/16816",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "面向GPTs的提示词注入攻击分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "PE文件代码注入",
|
||
"link": "https://xz.aliyun.com/t/16815",
|
||
"published": "2024-12-18T23:11:47+08:00",
|
||
"id": "https://xz.aliyun.com/t/16815",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "PE文件代码注入"
|
||
}
|
||
},
|
||
{
|
||
"title": "域渗透实战之HTB-Certified",
|
||
"link": "https://xz.aliyun.com/t/16813",
|
||
"published": "2024-12-18T20:59:47+08:00",
|
||
"id": "https://xz.aliyun.com/t/16813",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "域渗透实战之HTB-Certified"
|
||
}
|
||
},
|
||
{
|
||
"title": "2025 ciscn novel1详细解析",
|
||
"link": "https://xz.aliyun.com/t/16811",
|
||
"published": "2024-12-18T19:16:12+08:00",
|
||
"id": "https://xz.aliyun.com/t/16811",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2025 ciscn novel1详细解析"
|
||
}
|
||
},
|
||
{
|
||
"title": "先知安全沙龙(上海站) - 后渗透阶段主机关键信息自动化狩猎的实现与应用",
|
||
"link": "https://xz.aliyun.com/t/16823",
|
||
"published": "2024-12-18T16:39:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16823",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "先知安全沙龙(上海站) - 后渗透阶段主机关键信息自动化狩猎的实现与应用"
|
||
}
|
||
},
|
||
{
|
||
"title": "先知安全沙龙(上海站) - 红队武器开发之基于合法服务的隐蔽C2",
|
||
"link": "https://xz.aliyun.com/t/16821",
|
||
"published": "2024-12-18T16:38:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16821",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "先知安全沙龙(上海站) - 红队武器开发之基于合法服务的隐蔽C2"
|
||
}
|
||
},
|
||
{
|
||
"title": "先知安全沙龙(上海站) - Linux沙箱技术(权限机制、资源隔离与安全防御)",
|
||
"link": "https://xz.aliyun.com/t/16820",
|
||
"published": "2024-12-18T16:37:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16820",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "先知安全沙龙(上海站) - Linux沙箱技术(权限机制、资源隔离与安全防御)"
|
||
}
|
||
},
|
||
{
|
||
"title": "先知安全沙龙(上海站) - 终端安全对抗及防护",
|
||
"link": "https://xz.aliyun.com/t/16819",
|
||
"published": "2024-12-18T16:36:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16819",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "先知安全沙龙(上海站) - 终端安全对抗及防护"
|
||
}
|
||
},
|
||
{
|
||
"title": "先知安全沙龙(上海站) - 大模型基础设施安全攻防",
|
||
"link": "https://xz.aliyun.com/t/16818",
|
||
"published": "2024-12-18T16:35:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16818",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "先知安全沙龙(上海站) - 大模型基础设施安全攻防"
|
||
}
|
||
},
|
||
{
|
||
"title": "Sharp4RemoveLog:一款通过调用wevtutil进程实现痕迹清理的工具",
|
||
"link": "https://xz.aliyun.com/t/16809",
|
||
"published": "2024-12-18T16:07:07+08:00",
|
||
"id": "https://xz.aliyun.com/t/16809",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Sharp4RemoveLog:一款通过调用wevtutil进程实现痕迹清理的工具"
|
||
}
|
||
},
|
||
{
|
||
"title": "Guns后台任意文件上传漏洞分析",
|
||
"link": "https://xz.aliyun.com/t/16808",
|
||
"published": "2024-12-18T15:37:32+08:00",
|
||
"id": "https://xz.aliyun.com/t/16808",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Guns后台任意文件上传漏洞分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "红队权限维持策略——实用版(r3-r0)",
|
||
"link": "https://xz.aliyun.com/t/16806",
|
||
"published": "2024-12-17T23:25:10+08:00",
|
||
"id": "https://xz.aliyun.com/t/16806",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "红队权限维持策略——实用版(r3-r0)"
|
||
}
|
||
},
|
||
{
|
||
"title": "最近做的一些有意思的ctf赛题详细分析",
|
||
"link": "https://xz.aliyun.com/t/16805",
|
||
"published": "2024-12-17T21:53:01+08:00",
|
||
"id": "https://xz.aliyun.com/t/16805",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "最近做的一些有意思的ctf赛题详细分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "CTF一些有意思考点+例题详细分析系列",
|
||
"link": "https://xz.aliyun.com/t/16804",
|
||
"published": "2024-12-17T21:09:18+08:00",
|
||
"id": "https://xz.aliyun.com/t/16804",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CTF一些有意思考点+例题详细分析系列"
|
||
}
|
||
},
|
||
{
|
||
"title": "从hello-web入手反混淆和disable_function绕过",
|
||
"link": "https://xz.aliyun.com/t/16802",
|
||
"published": "2024-12-17T20:35:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16802",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从hello-web入手反混淆和disable_function绕过"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024国城杯线上signal出题文档",
|
||
"link": "https://xz.aliyun.com/t/16801",
|
||
"published": "2024-12-17T19:55:08+08:00",
|
||
"id": "https://xz.aliyun.com/t/16801",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024国城杯线上signal出题文档"
|
||
}
|
||
},
|
||
{
|
||
"title": "深入Pyd逆向",
|
||
"link": "https://xz.aliyun.com/t/16800",
|
||
"published": "2024-12-17T15:47:44+08:00",
|
||
"id": "https://xz.aliyun.com/t/16800",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "深入Pyd逆向"
|
||
}
|
||
},
|
||
{
|
||
"title": "CVE-2022-0874漏洞复现——Linux内核splice系统调用未正确初始化管道缓存漏洞分析(文末附EXP代码)",
|
||
"link": "https://xz.aliyun.com/t/16798",
|
||
"published": "2024-12-17T13:59:06+08:00",
|
||
"id": "https://xz.aliyun.com/t/16798",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CVE-2022-0874漏洞复现——Linux内核splice系统调用未正确初始化管道缓存漏洞分析(文末附EXP代码)"
|
||
}
|
||
},
|
||
{
|
||
"title": "DocSys代码审计",
|
||
"link": "https://xz.aliyun.com/t/16797",
|
||
"published": "2024-12-17T13:57:15+08:00",
|
||
"id": "https://xz.aliyun.com/t/16797",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "DocSys代码审计"
|
||
}
|
||
},
|
||
{
|
||
"title": "oppo a53 5g unlocktool 强解bl锁,magisk工具root [小白避坑篇]",
|
||
"link": "https://xz.aliyun.com/t/16796",
|
||
"published": "2024-12-17T13:55:52+08:00",
|
||
"id": "https://xz.aliyun.com/t/16796",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "oppo a53 5g unlocktool 强解bl锁,magisk工具root [小白避坑篇]"
|
||
}
|
||
},
|
||
{
|
||
"title": "LitCTF2024--Misc全wp",
|
||
"link": "https://xz.aliyun.com/t/16795",
|
||
"published": "2024-12-17T12:36:41+08:00",
|
||
"id": "https://xz.aliyun.com/t/16795",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "LitCTF2024--Misc全wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "HTB-University CTF 2024 Binary Badlands 的 Forensics 部分WP",
|
||
"link": "https://xz.aliyun.com/t/16794",
|
||
"published": "2024-12-17T09:55:02+08:00",
|
||
"id": "https://xz.aliyun.com/t/16794",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "HTB-University CTF 2024 Binary Badlands 的 Forensics 部分WP"
|
||
}
|
||
},
|
||
{
|
||
"title": "浅析Ruby类污染及其在Sinatra框架下的利用",
|
||
"link": "https://xz.aliyun.com/t/16792",
|
||
"published": "2024-12-16T23:26:40+08:00",
|
||
"id": "https://xz.aliyun.com/t/16792",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "浅析Ruby类污染及其在Sinatra框架下的利用"
|
||
}
|
||
},
|
||
{
|
||
"title": "Pipe管道利用研究分享",
|
||
"link": "https://xz.aliyun.com/t/16790",
|
||
"published": "2024-12-16T20:30:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16790",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Pipe管道利用研究分享"
|
||
}
|
||
},
|
||
{
|
||
"title": "对ssti无回显的新版内存马学习",
|
||
"link": "https://xz.aliyun.com/t/16787",
|
||
"published": "2024-12-16T15:37:55+08:00",
|
||
"id": "https://xz.aliyun.com/t/16787",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "对ssti无回显的新版内存马学习"
|
||
}
|
||
},
|
||
{
|
||
"title": "域渗透实战之HTB-Vintage",
|
||
"link": "https://xz.aliyun.com/t/16785",
|
||
"published": "2024-12-16T13:39:10+08:00",
|
||
"id": "https://xz.aliyun.com/t/16785",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "域渗透实战之HTB-Vintage"
|
||
}
|
||
},
|
||
{
|
||
"title": "实战演示 BurpSuite 插件 SignMe 安装和使用,有签名的接口也可以爆破了",
|
||
"link": "https://xz.aliyun.com/t/16780",
|
||
"published": "2024-12-16T12:08:51+08:00",
|
||
"id": "https://xz.aliyun.com/t/16780",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "实战演示 BurpSuite 插件 SignMe 安装和使用,有签名的接口也可以爆破了"
|
||
}
|
||
},
|
||
{
|
||
"title": "Apache Common Jelly Remote Code Execution",
|
||
"link": "https://xz.aliyun.com/t/16779",
|
||
"published": "2024-12-16T10:15:19+08:00",
|
||
"id": "https://xz.aliyun.com/t/16779",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Apache Common Jelly Remote Code Execution"
|
||
}
|
||
},
|
||
{
|
||
"title": "第十八届信息安全大赛 && 第二届长城杯 0解PWN题--server解法",
|
||
"link": "https://xz.aliyun.com/t/16778",
|
||
"published": "2024-12-16T10:01:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16778",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第十八届信息安全大赛 && 第二届长城杯 0解PWN题--server解法"
|
||
}
|
||
},
|
||
{
|
||
"title": "免杀基础-ppid伪造",
|
||
"link": "https://xz.aliyun.com/t/16777",
|
||
"published": "2024-12-16T10:00:14+08:00",
|
||
"id": "https://xz.aliyun.com/t/16777",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "免杀基础-ppid伪造"
|
||
}
|
||
},
|
||
{
|
||
"title": "高效IO攻击利用学习之House of apple2超详解",
|
||
"link": "https://xz.aliyun.com/t/16775",
|
||
"published": "2024-12-16T00:37:35+08:00",
|
||
"id": "https://xz.aliyun.com/t/16775",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "高效IO攻击利用学习之House of apple2超详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "第十八届信息安全大赛 && 第二届长城杯 - Crypto详解",
|
||
"link": "https://xz.aliyun.com/t/16773",
|
||
"published": "2024-12-15T22:42:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16773",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第十八届信息安全大赛 && 第二届长城杯 - Crypto详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "m0leCon Beginner CTF2024部分wp",
|
||
"link": "https://xz.aliyun.com/t/16772",
|
||
"published": "2024-12-15T21:31:48+08:00",
|
||
"id": "https://xz.aliyun.com/t/16772",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "m0leCon Beginner CTF2024部分wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "Ucum-java XXE漏洞分析(CVE-2024-55887)",
|
||
"link": "https://xz.aliyun.com/t/16771",
|
||
"published": "2024-12-15T21:04:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16771",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Ucum-java XXE漏洞分析(CVE-2024-55887)"
|
||
}
|
||
},
|
||
{
|
||
"title": "第十八届信息安全大赛 && 第二届长城杯 - re",
|
||
"link": "https://xz.aliyun.com/t/16766",
|
||
"published": "2024-12-15T18:21:26+08:00",
|
||
"id": "https://xz.aliyun.com/t/16766",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第十八届信息安全大赛 && 第二届长城杯 - re"
|
||
}
|
||
},
|
||
{
|
||
"title": "第十八届信息安全大赛 && 第二届长城杯 - zeroshell1~5,WinFT_1~2,sc05_1",
|
||
"link": "https://xz.aliyun.com/t/16759",
|
||
"published": "2024-12-15T17:26:01+08:00",
|
||
"id": "https://xz.aliyun.com/t/16759",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第十八届信息安全大赛 && 第二届长城杯 - zeroshell1~5,WinFT_1~2,sc05_1"
|
||
}
|
||
},
|
||
{
|
||
"title": "第二届“长城杯”铁人三项赛 (防护赛)初赛WriteUP",
|
||
"link": "https://xz.aliyun.com/t/16789",
|
||
"published": "2024-12-15T17:26:01+08:00",
|
||
"id": "https://xz.aliyun.com/t/16789",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第二届“长城杯”铁人三项赛 (防护赛)初赛WriteUP"
|
||
}
|
||
},
|
||
{
|
||
"title": "第十八届信息安全大赛 && 第二届长城杯 - web&re wp",
|
||
"link": "https://xz.aliyun.com/t/16755",
|
||
"published": "2024-12-15T17:14:30+08:00",
|
||
"id": "https://xz.aliyun.com/t/16755",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第十八届信息安全大赛 && 第二届长城杯 - web&re wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "第十八届信息安全大赛 && 第二届长城杯 - pwn",
|
||
"link": "https://xz.aliyun.com/t/16751",
|
||
"published": "2024-12-15T17:05:55+08:00",
|
||
"id": "https://xz.aliyun.com/t/16751",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第十八届信息安全大赛 && 第二届长城杯 - pwn"
|
||
}
|
||
},
|
||
{
|
||
"title": "第十八届信息安全大赛 && 第二届长城杯 - WEB WP",
|
||
"link": "https://xz.aliyun.com/t/16750",
|
||
"published": "2024-12-15T17:02:06+08:00",
|
||
"id": "https://xz.aliyun.com/t/16750",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第十八届信息安全大赛 && 第二届长城杯 - WEB WP"
|
||
}
|
||
},
|
||
{
|
||
"title": "HITCTF pipe_snake详解",
|
||
"link": "https://xz.aliyun.com/t/16748",
|
||
"published": "2024-12-15T09:25:49+08:00",
|
||
"id": "https://xz.aliyun.com/t/16748",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "HITCTF pipe_snake详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次客户系统的测试--多种经典类型漏洞",
|
||
"link": "https://xz.aliyun.com/t/16747",
|
||
"published": "2024-12-14T23:33:38+08:00",
|
||
"id": "https://xz.aliyun.com/t/16747",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次客户系统的测试--多种经典类型漏洞"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次渗透到审计",
|
||
"link": "https://xz.aliyun.com/t/16746",
|
||
"published": "2024-12-14T21:23:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16746",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次渗透到审计"
|
||
}
|
||
},
|
||
{
|
||
"title": "某次大学的渗透测试经历",
|
||
"link": "https://xz.aliyun.com/t/16745",
|
||
"published": "2024-12-14T16:51:12+08:00",
|
||
"id": "https://xz.aliyun.com/t/16745",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某次大学的渗透测试经历"
|
||
}
|
||
}
|
||
] |