PyBot/JSON/seebug.json

122 lines
9.7 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"title": "Unveiling Dark Internet Service Providers: Bulletproof Hosting\n",
"link": "https://paper.seebug.org/3249/",
"description": "Author: Knownsec 404 team\nDate: Dec 9, 2024\n1. Abstract\nBulletproof hosting services provide the infrastructure for cybercriminal activities, enabling criminals to evade legal constraints and are o...\n",
"pubDate": "Mon, 09 Dec 2024 04:14:00 +0000",
"guid": "https://paper.seebug.org/3249/",
"category": "404 English Paper"
},
{
"title": "基于 InternLM 和 LangChain 搭建私人知识库\n",
"link": "https://paper.seebug.org/3247/",
"description": "作者Jinzhong Xu\n原文链接https://xujinzh.github.io/2024/01/08/ai-Interlm-langchain-RAG/index.html\n本篇介绍基于 InternLM 和 LangChain 搭建私人知识库。\npython!conda create --name internlm_langchain --clone=/root/share/c...\n",
"pubDate": "Thu, 05 Dec 2024 11:34:00 +0000",
"guid": "https://paper.seebug.org/3247/",
"category": "AI安全"
},
{
"title": "书生·浦语大模型使用\n",
"link": "https://paper.seebug.org/3246/",
"description": "作者Jinzhong Xu\n原文链接https://xujinzh.github.io/2024/01/06/ai-internlm-useage/\n本篇介绍书生·浦语大模型的使用包括智能对话、智能体工具调用和图文理解创作等。\n环境配置\npython!conda create --name internlm-chat --clone=/root/share/conda_envs/int...\n",
"pubDate": "Thu, 05 Dec 2024 10:27:00 +0000",
"guid": "https://paper.seebug.org/3246/",
"category": "AI安全"
},
{
"title": "Uncontrolled PCDN: Observation and Case Analysis of the Current State of PCDN Technology\n",
"link": "https://paper.seebug.org/3245/",
"description": "Author: Knownsec 404 Active Defense Team\nDate: November 22, 2024\n中文版https://paper.seebug.org/3242\nBackground Introduction\nIn October 2024, Knownsec 404 Active Defense Team detected abnormal traffi...\n",
"pubDate": "Mon, 02 Dec 2024 06:13:00 +0000",
"guid": "https://paper.seebug.org/3245/",
"category": "情报分析"
},
{
"title": "Android 恶意软件混淆与对抗技术专题\n",
"link": "https://paper.seebug.org/3244/",
"description": "作者启明星辰ADLab\n原文链接https://mp.weixin.qq.com/s/LIAkPLZ_vVOUGjFymdEH-w\n第一章 概 述\n近年来Android恶意软件数量不断攀升其采用的攻击和对抗技术也变得越来越复杂。为了对抗安全分析绕过安全检测窃取敏感数据或破坏系统安全恶意软件利用各种对抗技术来伪装和隐藏其恶意行为和代码逻辑。这些对抗技术中针对资源、文件、字节码指...\n",
"pubDate": "Wed, 27 Nov 2024 08:10:00 +0000",
"guid": "https://paper.seebug.org/3244/",
"category": "移动安全"
},
{
"title": "Prompt 越狱手册\n",
"link": "https://paper.seebug.org/3243/",
"description": "作者:洺熙\n本文为作者投稿Seebug Paper 期待你的分享,凡经采用即有礼品相送! 投稿邮箱paper@seebug.org\n以下皆为作者洺熙个人观点或洺熙认同的看法本文一切也只用于技术交流切勿用于不法目的一切纷争与作者本人无关\n由于书写本文的时候是从0到1开始写的所以根据受益人群的不同可以自行选择对应目录进行观看同步开源至https://github.com/Acm...\n",
"pubDate": "Wed, 27 Nov 2024 03:32:00 +0000",
"guid": "https://paper.seebug.org/3243/",
"category": "AI安全"
},
{
"title": "失控的PCDN观察PCDN技术现状与案例分析\n",
"link": "https://paper.seebug.org/3242/",
"description": "作者知道创宇404积极防御实验室\n日期2024年11月22日\nEnglish Version: https://paper.seebug.org/3245/\n背景介绍\n2024年10月知道创宇404积极防御实验室监测到某客户网站流量异常疑似遭到CC攻击。经过分析本次CC攻击疑似为PCDN厂商为了平衡上下行流量对客户网站视频文件进行的盗刷流量行为。\n在调查分析的过程中我们发现PCD...\n",
"pubDate": "Fri, 22 Nov 2024 12:38:00 +0000",
"guid": "https://paper.seebug.org/3242/",
"category": "情报分析"
},
{
"title": "APT-K-47 武器披露之 Asyncshell 的前世今生\n",
"link": "https://paper.seebug.org/3240/",
"description": "作者知道创宇404高级威胁情报团队\n日期2024年11月22日\nEnglish version: https://paper.seebug.org/3241/\n1. 事件背景\n近期知道创宇404高级威胁情报团队在日常跟踪APT过程中发现了APT-K-47组织利用“朝觐”话题发起的攻击活动攻击者利用CHM文件执行相同目录下的恶意载荷。最终载荷功能比较简单仅支持cmd shell且使...\n",
"pubDate": "Fri, 22 Nov 2024 05:22:00 +0000",
"guid": "https://paper.seebug.org/3240/",
"category": "威胁情报"
},
{
"title": "Unveiling the Past and Present of APT-K-47 Weapon: Asyncshell\n",
"link": "https://paper.seebug.org/3241/",
"description": "AuthorKnownsec 404 Advanced Threat Intelligence team\ndateNovember 22, 2024\n中文版https://paper.seebug.org/3240\n1. Background of the incident\nRecently, in the course of daily APT tracking,the Knowns...\n",
"pubDate": "Fri, 22 Nov 2024 05:10:00 +0000",
"guid": "https://paper.seebug.org/3241/",
"category": "威胁情报"
},
{
"title": "使用 ZoomEye 增强新语法拓线 LockBit 3.0 勒索软件联盟基础设施\n",
"link": "https://paper.seebug.org/3238/",
"description": "作者知道创宇404实验室\n日期2024年11月21日\nEnglish version: https://paper.seebug.org/3239/\n一摘要\nLockBit 3.0 是一种知名的勒索软件由网络犯罪组织通过“勒索软件即服务”RaaS模式运作。LockBit 3.0勒索软件联盟是使用该恶意软件进行攻击的独立黑客,他们以分成方式合作。这些成员利用 LockBit 提供的...\n",
"pubDate": "Thu, 21 Nov 2024 02:19:00 +0000",
"guid": "https://paper.seebug.org/3238/",
"category": "专题报告"
},
{
"title": "Identify Infrastructure Linked To LockBit 3.0 Ransomware Affiliates By ZoomEye Enhanced New Syntax\n",
"link": "https://paper.seebug.org/3239/",
"description": "Author: Knownsec 404 team\nDate: November 20, 2024\n中文版https://paper.seebug.org/3238/\n1. Abstract\nLockBit 3.0 is a well-known ransomware operated through a "Ransomware-as-a-Service" (RaaS) model. Th...\n",
"pubDate": "Tue, 19 Nov 2024 03:20:00 +0000",
"guid": "https://paper.seebug.org/3239/",
"category": "404 English Paper"
},
{
"title": "CVE-2022-20474分析——LazyValue下的Self-changed Bundle\n",
"link": "https://paper.seebug.org/3237/",
"description": "作者Cxxsheng\n本文为作者投稿Seebug Paper 期待你的分享,凡经采用即有礼品相送! 投稿邮箱paper@seebug.org\n前言\n温馨提示阅读本文前应当对Bundle Mismatch相关漏洞有初步了解以下参考资料假如您还没有读过建议先阅读一下\n\nBundle风水——Android序列化与反序列化不匹配漏洞详解经典的入门级别教程。\nAndroid 反序列化...\n",
"pubDate": "Fri, 15 Nov 2024 08:36:00 +0000",
"guid": "https://paper.seebug.org/3237/",
"category": "漏洞分析"
},
{
"title": "LedgerHQ 软件供应链安全事件\n",
"link": "https://paper.seebug.org/3236/",
"description": "作者:维一零\n原文链接https://weiyiling.cn/one/ledgerhq_npmjs_hijack_review\n0x00 前言\n写这篇的文章的原因如下\n1、 去年有及时关注到这起供应链攻击事件,但由于不熟悉区块链安全以及对关键代码的解密困难未能深入分析,就先收藏留存;\n2、 对区块链安全的兴趣日益加深,以及职业发展需求驱动下开始尝试学习储备相关知识技能;\n3、 最近突然...\n",
"pubDate": "Thu, 14 Nov 2024 04:21:00 +0000",
"guid": "https://paper.seebug.org/3236/",
"category": "区块链"
},
{
"title": "N1CTF24 PHP Master Writeup\n",
"link": "https://paper.seebug.org/3235/",
"description": "作者m4p1e\n原文链接https://m4p1e.com/2024/11/12/n1ctf24-php-master/\n0x01 介绍\n在刚刚过去的N1CTF24上我出了一道关于PHP的pwn题其中涉及到的漏洞[1]是真实存在的并且目前依然没有被修复。非常遗憾期待的PHP master并没有出现在这次的比赛中让我们期待下次的PHP rising star xd。在这篇文章中我...\n",
"pubDate": "Thu, 14 Nov 2024 02:12:00 +0000",
"guid": "https://paper.seebug.org/3235/",
"category": "CTF"
},
{
"title": "Vigor3900 固件仿真及漏洞分析(CVE-2024-44844、CVE-2024-44845)\n",
"link": "https://paper.seebug.org/3234/",
"description": "作者fan@知道创宇404实验室\n时间2024年11月13日\n1.前言\n我在日常跟踪漏洞情报的过程中看到 Vigor3900 最新版本固件 1.5.1.6 存在多处后台命令注入漏洞(CVE-2024-44844/CVE-2024-44845)[1]。正好最近看到几个固件仿真小工具,我打算一并试试效果。\n2.产品介绍\nVigor3900 是 DrayTek 推出的一款高性能、多功能的企业...\n",
"pubDate": "Wed, 13 Nov 2024 04:23:00 +0000",
"guid": "https://paper.seebug.org/3234/",
"category": "404专栏"
}
]