1002 lines
35 KiB
JSON
1002 lines
35 KiB
JSON
[
|
||
{
|
||
"title": "强网杯S8决赛RW赛道",
|
||
"link": "https://xz.aliyun.com/t/16607",
|
||
"published": "2024-12-07T16:39:52+08:00",
|
||
"id": "https://xz.aliyun.com/t/16607",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "强网杯S8决赛RW赛道"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024国城杯pwn详细全解",
|
||
"link": "https://xz.aliyun.com/t/16606",
|
||
"published": "2024-12-07T16:27:51+08:00",
|
||
"id": "https://xz.aliyun.com/t/16606",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024国城杯pwn详细全解"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024国城杯线上Crypto-WP",
|
||
"link": "https://xz.aliyun.com/t/16605",
|
||
"published": "2024-12-07T16:10:19+08:00",
|
||
"id": "https://xz.aliyun.com/t/16605",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024国城杯线上Crypto-WP"
|
||
}
|
||
},
|
||
{
|
||
"title": "强网S8决赛JsonPcikle Safe模式下的RCE与绕过分析研究",
|
||
"link": "https://xz.aliyun.com/t/16604",
|
||
"published": "2024-12-07T16:07:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16604",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "强网S8决赛JsonPcikle Safe模式下的RCE与绕过分析研究"
|
||
}
|
||
},
|
||
{
|
||
"title": "Pyramid 框架SSTI分析RCE",
|
||
"link": "https://xz.aliyun.com/t/16600",
|
||
"published": "2024-12-07T13:37:25+08:00",
|
||
"id": "https://xz.aliyun.com/t/16600",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Pyramid 框架SSTI分析RCE"
|
||
}
|
||
},
|
||
{
|
||
"title": "apk修改实践:绕过强制更新弹窗",
|
||
"link": "https://xz.aliyun.com/t/16599",
|
||
"published": "2024-12-07T11:02:35+08:00",
|
||
"id": "https://xz.aliyun.com/t/16599",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "apk修改实践:绕过强制更新弹窗"
|
||
}
|
||
},
|
||
{
|
||
"title": "浅析异常线程检测逻辑(unbacked)",
|
||
"link": "https://xz.aliyun.com/t/16598",
|
||
"published": "2024-12-07T10:30:27+08:00",
|
||
"id": "https://xz.aliyun.com/t/16598",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "浅析异常线程检测逻辑(unbacked)"
|
||
}
|
||
},
|
||
{
|
||
"title": "boofuzz 中的 Request 和 Path 源码分析",
|
||
"link": "https://xz.aliyun.com/t/16594",
|
||
"published": "2024-12-07T02:06:10+08:00",
|
||
"id": "https://xz.aliyun.com/t/16594",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "boofuzz 中的 Request 和 Path 源码分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "云函数实现代理绕过IP封锁",
|
||
"link": "https://xz.aliyun.com/t/16589",
|
||
"published": "2024-12-06T22:46:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16589",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "云函数实现代理绕过IP封锁"
|
||
}
|
||
},
|
||
{
|
||
"title": "CVE-2024-4181 run-llama/llama_index-SSE Command Injection分析",
|
||
"link": "https://xz.aliyun.com/t/16588",
|
||
"published": "2024-12-06T22:34:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16588",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CVE-2024-4181 run-llama/llama_index-SSE Command Injection分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "若依一把梭哈工具源码分析",
|
||
"link": "https://xz.aliyun.com/t/16586",
|
||
"published": "2024-12-06T22:31:35+08:00",
|
||
"id": "https://xz.aliyun.com/t/16586",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "若依一把梭哈工具源码分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "CVE-2024-3408 D-tale bypassRCE分析",
|
||
"link": "https://xz.aliyun.com/t/16587",
|
||
"published": "2024-12-06T22:31:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16587",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CVE-2024-3408 D-tale bypassRCE分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "S8强网杯 ez_login详解",
|
||
"link": "https://xz.aliyun.com/t/16582",
|
||
"published": "2024-12-06T20:08:01+08:00",
|
||
"id": "https://xz.aliyun.com/t/16582",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "S8强网杯 ez_login详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "S8强网杯Final-thinkshopplus",
|
||
"link": "https://xz.aliyun.com/t/16581",
|
||
"published": "2024-12-06T19:01:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16581",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "S8强网杯Final-thinkshopplus"
|
||
}
|
||
},
|
||
{
|
||
"title": "gRPC&Go: XCTF联赛DubheCTF2024 - ggbond 详细题解",
|
||
"link": "https://xz.aliyun.com/t/16580",
|
||
"published": "2024-12-06T17:51:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16580",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "gRPC&Go: XCTF联赛DubheCTF2024 - ggbond 详细题解"
|
||
}
|
||
},
|
||
{
|
||
"title": "免杀基础-shellcode开发",
|
||
"link": "https://xz.aliyun.com/t/16579",
|
||
"published": "2024-12-06T15:19:56+08:00",
|
||
"id": "https://xz.aliyun.com/t/16579",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "免杀基础-shellcode开发"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(二)",
|
||
"link": "https://xz.aliyun.com/t/16577",
|
||
"published": "2024-12-06T14:10:30+08:00",
|
||
"id": "https://xz.aliyun.com/t/16577",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(二)"
|
||
}
|
||
},
|
||
{
|
||
"title": "JFinal CMS 5.1.0 命令执行漏洞分析(CVE-2024-53477)",
|
||
"link": "https://xz.aliyun.com/t/16575",
|
||
"published": "2024-12-06T13:27:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16575",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "JFinal CMS 5.1.0 命令执行漏洞分析(CVE-2024-53477)"
|
||
}
|
||
},
|
||
{
|
||
"title": "Sharp4Killdefender:通过修改注册表关闭Windows Defender",
|
||
"link": "https://xz.aliyun.com/t/16574",
|
||
"published": "2024-12-06T13:00:24+08:00",
|
||
"id": "https://xz.aliyun.com/t/16574",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Sharp4Killdefender:通过修改注册表关闭Windows Defender"
|
||
}
|
||
},
|
||
{
|
||
"title": "从一道java题体验 scxml漏洞",
|
||
"link": "https://xz.aliyun.com/t/16572",
|
||
"published": "2024-12-06T12:13:03+08:00",
|
||
"id": "https://xz.aliyun.com/t/16572",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从一道java题体验 scxml漏洞"
|
||
}
|
||
},
|
||
{
|
||
"title": "一次Telegram窃取程序的深入解析:从技术细节到定位攻击者账户的完整流程",
|
||
"link": "https://xz.aliyun.com/t/16570",
|
||
"published": "2024-12-06T12:01:42+08:00",
|
||
"id": "https://xz.aliyun.com/t/16570",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "一次Telegram窃取程序的深入解析:从技术细节到定位攻击者账户的完整流程"
|
||
}
|
||
},
|
||
{
|
||
"title": "CVE-2018-1270 spring-messaging RCE 深入分析",
|
||
"link": "https://xz.aliyun.com/t/16569",
|
||
"published": "2024-12-06T11:44:58+08:00",
|
||
"id": "https://xz.aliyun.com/t/16569",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CVE-2018-1270 spring-messaging RCE 深入分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "DTStack Taier 1.4.0 listNames sql注入分析(CVE-2024-41579)",
|
||
"link": "https://xz.aliyun.com/t/16568",
|
||
"published": "2024-12-06T11:08:37+08:00",
|
||
"id": "https://xz.aliyun.com/t/16568",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "DTStack Taier 1.4.0 listNames sql注入分析(CVE-2024-41579)"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于environ变量的堆题攻击栈空间",
|
||
"link": "https://xz.aliyun.com/t/16566",
|
||
"published": "2024-12-05T22:29:29+08:00",
|
||
"id": "https://xz.aliyun.com/t/16566",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于environ变量的堆题攻击栈空间"
|
||
}
|
||
},
|
||
{
|
||
"title": "burpsuite数据包自动加解密插件,autoDecoder详细安装+使用",
|
||
"link": "https://xz.aliyun.com/t/16564",
|
||
"published": "2024-12-05T16:57:14+08:00",
|
||
"id": "https://xz.aliyun.com/t/16564",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "burpsuite数据包自动加解密插件,autoDecoder详细安装+使用"
|
||
}
|
||
},
|
||
{
|
||
"title": "一次红队恶意程序分析溯源",
|
||
"link": "https://xz.aliyun.com/t/16563",
|
||
"published": "2024-12-05T15:39:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16563",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "一次红队恶意程序分析溯源"
|
||
}
|
||
},
|
||
{
|
||
"title": "深入异构 PWN:PowerPC&ARM&MIPS",
|
||
"link": "https://xz.aliyun.com/t/16562",
|
||
"published": "2024-12-05T14:23:42+08:00",
|
||
"id": "https://xz.aliyun.com/t/16562",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "深入异构 PWN:PowerPC&ARM&MIPS"
|
||
}
|
||
},
|
||
{
|
||
"title": "llvm pass 初探",
|
||
"link": "https://xz.aliyun.com/t/16558",
|
||
"published": "2024-12-05T12:04:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16558",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "llvm pass 初探"
|
||
}
|
||
},
|
||
{
|
||
"title": "从源码的角度学习 boofuzz 函数的使用",
|
||
"link": "https://xz.aliyun.com/t/16554",
|
||
"published": "2024-12-05T01:05:47+08:00",
|
||
"id": "https://xz.aliyun.com/t/16554",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从源码的角度学习 boofuzz 函数的使用"
|
||
}
|
||
},
|
||
{
|
||
"title": "分享最近攻防演练HVV漏洞复盘",
|
||
"link": "https://xz.aliyun.com/t/16553",
|
||
"published": "2024-12-04T21:11:09+08:00",
|
||
"id": "https://xz.aliyun.com/t/16553",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "分享最近攻防演练HVV漏洞复盘"
|
||
}
|
||
},
|
||
{
|
||
"title": "伪装成ToDesk安装程序加载后门盗取数字货币",
|
||
"link": "https://xz.aliyun.com/t/16552",
|
||
"published": "2024-12-04T20:00:59+08:00",
|
||
"id": "https://xz.aliyun.com/t/16552",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "伪装成ToDesk安装程序加载后门盗取数字货币"
|
||
}
|
||
},
|
||
{
|
||
"title": "Android逆向实战——以某APP跳过广告为例",
|
||
"link": "https://xz.aliyun.com/t/16550",
|
||
"published": "2024-12-04T17:38:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16550",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Android逆向实战——以某APP跳过广告为例"
|
||
}
|
||
},
|
||
{
|
||
"title": "webpwn的一些总结",
|
||
"link": "https://xz.aliyun.com/t/16549",
|
||
"published": "2024-12-04T17:20:50+08:00",
|
||
"id": "https://xz.aliyun.com/t/16549",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "webpwn的一些总结"
|
||
}
|
||
},
|
||
{
|
||
"title": "Fastjson反序列化漏洞深度解析与利用和修复",
|
||
"link": "https://xz.aliyun.com/t/16547",
|
||
"published": "2024-12-04T15:18:05+08:00",
|
||
"id": "https://xz.aliyun.com/t/16547",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Fastjson反序列化漏洞深度解析与利用和修复"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024金盾信安杯线上题目wp",
|
||
"link": "https://xz.aliyun.com/t/16546",
|
||
"published": "2024-12-04T15:08:41+08:00",
|
||
"id": "https://xz.aliyun.com/t/16546",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024金盾信安杯线上题目wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "高版本Fastjson反序列化Xtring新链和EventListenerList绕过",
|
||
"link": "https://xz.aliyun.com/t/16540",
|
||
"published": "2024-12-04T13:59:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16540",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "高版本Fastjson反序列化Xtring新链和EventListenerList绕过"
|
||
}
|
||
},
|
||
{
|
||
"title": "域渗透入门靶机之HTB-Cicada",
|
||
"link": "https://xz.aliyun.com/t/16539",
|
||
"published": "2024-12-04T13:10:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16539",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "域渗透入门靶机之HTB-Cicada"
|
||
}
|
||
},
|
||
{
|
||
"title": "java加载动态链接库绕过一些限制的思考",
|
||
"link": "https://xz.aliyun.com/t/16538",
|
||
"published": "2024-12-04T11:12:08+08:00",
|
||
"id": "https://xz.aliyun.com/t/16538",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "java加载动态链接库绕过一些限制的思考"
|
||
}
|
||
},
|
||
{
|
||
"title": "从零构建:我的漏洞扫描器之旅",
|
||
"link": "https://xz.aliyun.com/t/16537",
|
||
"published": "2024-12-04T10:38:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16537",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从零构建:我的漏洞扫描器之旅"
|
||
}
|
||
},
|
||
{
|
||
"title": "CS代码审计配合Jdbc反序列化漏洞的利用",
|
||
"link": "https://xz.aliyun.com/t/16536",
|
||
"published": "2024-12-03T23:58:20+08:00",
|
||
"id": "https://xz.aliyun.com/t/16536",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CS代码审计配合Jdbc反序列化漏洞的利用"
|
||
}
|
||
},
|
||
{
|
||
"title": "从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复",
|
||
"link": "https://xz.aliyun.com/t/16535",
|
||
"published": "2024-12-03T23:57:40+08:00",
|
||
"id": "https://xz.aliyun.com/t/16535",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复"
|
||
}
|
||
},
|
||
{
|
||
"title": "某云音乐为例-反调试绕过,栈回溯,web算法逆向",
|
||
"link": "https://xz.aliyun.com/t/16534",
|
||
"published": "2024-12-03T23:50:24+08:00",
|
||
"id": "https://xz.aliyun.com/t/16534",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某云音乐为例-反调试绕过,栈回溯,web算法逆向"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024睿抗网络安全初赛0解题——nopassword详解",
|
||
"link": "https://xz.aliyun.com/t/16533",
|
||
"published": "2024-12-03T22:29:02+08:00",
|
||
"id": "https://xz.aliyun.com/t/16533",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024睿抗网络安全初赛0解题——nopassword详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "某省移动网络安全技能竞赛决赛 个人赛第一名wp",
|
||
"link": "https://xz.aliyun.com/t/16532",
|
||
"published": "2024-12-03T21:45:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16532",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某省移动网络安全技能竞赛决赛 个人赛第一名wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "Apache NiFi 高版本命令执行利用",
|
||
"link": "https://xz.aliyun.com/t/16531",
|
||
"published": "2024-12-03T20:44:14+08:00",
|
||
"id": "https://xz.aliyun.com/t/16531",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Apache NiFi 高版本命令执行利用"
|
||
}
|
||
},
|
||
{
|
||
"title": "WuCup 第一届“吾杯”网络安全技能大赛 WriteUp",
|
||
"link": "https://xz.aliyun.com/t/16529",
|
||
"published": "2024-12-03T17:34:27+08:00",
|
||
"id": "https://xz.aliyun.com/t/16529",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "WuCup 第一届“吾杯”网络安全技能大赛 WriteUp"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次Go SSTI打SSRF到任意文件读",
|
||
"link": "https://xz.aliyun.com/t/16527",
|
||
"published": "2024-12-03T16:52:38+08:00",
|
||
"id": "https://xz.aliyun.com/t/16527",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次Go SSTI打SSRF到任意文件读"
|
||
}
|
||
},
|
||
{
|
||
"title": "极客大挑战 web week3&week4",
|
||
"link": "https://xz.aliyun.com/t/16526",
|
||
"published": "2024-12-03T16:48:02+08:00",
|
||
"id": "https://xz.aliyun.com/t/16526",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "极客大挑战 web week3&week4"
|
||
}
|
||
},
|
||
{
|
||
"title": "jeepay v2.4.0反射型xss+存储型xss分析",
|
||
"link": "https://xz.aliyun.com/t/16524",
|
||
"published": "2024-12-03T15:40:58+08:00",
|
||
"id": "https://xz.aliyun.com/t/16524",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "jeepay v2.4.0反射型xss+存储型xss分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "JDBC Attack漫谈",
|
||
"link": "https://xz.aliyun.com/t/16523",
|
||
"published": "2024-12-03T14:51:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16523",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "JDBC Attack漫谈"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024鹏城杯线下赛复现",
|
||
"link": "https://xz.aliyun.com/t/16522",
|
||
"published": "2024-12-03T14:42:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16522",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024鹏城杯线下赛复现"
|
||
}
|
||
},
|
||
{
|
||
"title": "MemoryModule的远程反射dll加载与一些没有实现的想法",
|
||
"link": "https://xz.aliyun.com/t/16521",
|
||
"published": "2024-12-03T11:58:34+08:00",
|
||
"id": "https://xz.aliyun.com/t/16521",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "MemoryModule的远程反射dll加载与一些没有实现的想法"
|
||
}
|
||
},
|
||
{
|
||
"title": "禅道18.x-20.x版本漏洞挖掘思路分析",
|
||
"link": "https://xz.aliyun.com/t/16520",
|
||
"published": "2024-12-03T11:29:24+08:00",
|
||
"id": "https://xz.aliyun.com/t/16520",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "禅道18.x-20.x版本漏洞挖掘思路分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "THM靶场-Lookup-通关WriteUp",
|
||
"link": "https://xz.aliyun.com/t/16517",
|
||
"published": "2024-12-03T00:58:39+08:00",
|
||
"id": "https://xz.aliyun.com/t/16517",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "THM靶场-Lookup-通关WriteUp"
|
||
}
|
||
},
|
||
{
|
||
"title": "哥斯拉源码解读+如何绕过waf检测",
|
||
"link": "https://xz.aliyun.com/t/16515",
|
||
"published": "2024-12-02T22:23:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16515",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "哥斯拉源码解读+如何绕过waf检测"
|
||
}
|
||
},
|
||
{
|
||
"title": "反沙盒?一文足以",
|
||
"link": "https://xz.aliyun.com/t/16514",
|
||
"published": "2024-12-02T22:21:58+08:00",
|
||
"id": "https://xz.aliyun.com/t/16514",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "反沙盒?一文足以"
|
||
}
|
||
},
|
||
{
|
||
"title": "unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例",
|
||
"link": "https://xz.aliyun.com/t/16513",
|
||
"published": "2024-12-02T21:16:53+08:00",
|
||
"id": "https://xz.aliyun.com/t/16513",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例"
|
||
}
|
||
},
|
||
{
|
||
"title": "IoT 安全从零到掌握:超详尽入门指南(实战篇)",
|
||
"link": "https://xz.aliyun.com/t/16511",
|
||
"published": "2024-12-02T20:23:35+08:00",
|
||
"id": "https://xz.aliyun.com/t/16511",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "IoT 安全从零到掌握:超详尽入门指南(实战篇)"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次溯源真实案例",
|
||
"link": "https://xz.aliyun.com/t/16510",
|
||
"published": "2024-12-02T19:29:36+08:00",
|
||
"id": "https://xz.aliyun.com/t/16510",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次溯源真实案例"
|
||
}
|
||
},
|
||
{
|
||
"title": "IoT 安全从零到掌握:超详尽入门指南(基础篇)",
|
||
"link": "https://xz.aliyun.com/t/16512",
|
||
"published": "2024-12-02T18:17:18+08:00",
|
||
"id": "https://xz.aliyun.com/t/16512",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "IoT 安全从零到掌握:超详尽入门指南(基础篇)"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 武数杯 RHG",
|
||
"link": "https://xz.aliyun.com/t/16475",
|
||
"published": "2024-12-02T16:17:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16475",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 武数杯 RHG"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024年第一届吾杯解题writeup",
|
||
"link": "https://xz.aliyun.com/t/16503",
|
||
"published": "2024-12-01T23:40:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16503",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024年第一届吾杯解题writeup"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次RAT的感染过程详细分析",
|
||
"link": "https://xz.aliyun.com/t/16502",
|
||
"published": "2024-12-01T23:10:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16502",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次RAT的感染过程详细分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024古剑山初赛WP",
|
||
"link": "https://xz.aliyun.com/t/16501",
|
||
"published": "2024-12-01T20:34:07+08:00",
|
||
"id": "https://xz.aliyun.com/t/16501",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024古剑山初赛WP"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024吾杯网络安全技能大赛ctf-web方向",
|
||
"link": "https://xz.aliyun.com/t/16500",
|
||
"published": "2024-12-01T19:49:39+08:00",
|
||
"id": "https://xz.aliyun.com/t/16500",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024吾杯网络安全技能大赛ctf-web方向"
|
||
}
|
||
},
|
||
{
|
||
"title": "记某次金融小程序数据加密及签名逆向",
|
||
"link": "https://xz.aliyun.com/t/16497",
|
||
"published": "2024-12-01T17:20:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16497",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记某次金融小程序数据加密及签名逆向"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024网鼎杯初赛和半决赛部分题解---PWN",
|
||
"link": "https://xz.aliyun.com/t/16495",
|
||
"published": "2024-12-01T16:43:53+08:00",
|
||
"id": "https://xz.aliyun.com/t/16495",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024网鼎杯初赛和半决赛部分题解---PWN"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 强网拟态决赛web 部分wp",
|
||
"link": "https://xz.aliyun.com/t/16489",
|
||
"published": "2024-12-01T14:49:39+08:00",
|
||
"id": "https://xz.aliyun.com/t/16489",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 强网拟态决赛web 部分wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "动态逃逸杀软的艺术",
|
||
"link": "https://xz.aliyun.com/t/16486",
|
||
"published": "2024-12-01T10:12:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16486",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "动态逃逸杀软的艺术"
|
||
}
|
||
},
|
||
{
|
||
"title": "样本分析-DarkComet远控木马",
|
||
"link": "https://xz.aliyun.com/t/16485",
|
||
"published": "2024-11-30T23:44:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16485",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "样本分析-DarkComet远控木马"
|
||
}
|
||
},
|
||
{
|
||
"title": "某省移动竞赛决赛个人赛 部分wp",
|
||
"link": "https://xz.aliyun.com/t/16484",
|
||
"published": "2024-11-30T23:13:25+08:00",
|
||
"id": "https://xz.aliyun.com/t/16484",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某省移动竞赛决赛个人赛 部分wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠",
|
||
"link": "https://xz.aliyun.com/t/16483",
|
||
"published": "2024-11-30T21:33:34+08:00",
|
||
"id": "https://xz.aliyun.com/t/16483",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024“中华武数杯” 全国网络攻防精英赛",
|
||
"link": "https://xz.aliyun.com/t/16482",
|
||
"published": "2024-11-30T19:10:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16482",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024“中华武数杯” 全国网络攻防精英赛"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto",
|
||
"link": "https://xz.aliyun.com/t/16480",
|
||
"published": "2024-11-30T18:55:48+08:00",
|
||
"id": "https://xz.aliyun.com/t/16480",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 金盾杯 wp",
|
||
"link": "https://xz.aliyun.com/t/16478",
|
||
"published": "2024-11-30T18:13:31+08:00",
|
||
"id": "https://xz.aliyun.com/t/16478",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 金盾杯 wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024古剑山Pwn方向全部题解",
|
||
"link": "https://xz.aliyun.com/t/16474",
|
||
"published": "2024-11-30T15:48:05+08:00",
|
||
"id": "https://xz.aliyun.com/t/16474",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024古剑山Pwn方向全部题解"
|
||
}
|
||
},
|
||
{
|
||
"title": "江苏移动“建材赋能”线下个人决赛crypto三道0解题",
|
||
"link": "https://xz.aliyun.com/t/16473",
|
||
"published": "2024-11-30T14:12:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16473",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "江苏移动“建材赋能”线下个人决赛crypto三道0解题"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024古剑山 pwn 详解",
|
||
"link": "https://xz.aliyun.com/t/16471",
|
||
"published": "2024-11-30T13:52:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16471",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024古剑山 pwn 详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "提示词注入攻击",
|
||
"link": "https://xz.aliyun.com/t/16470",
|
||
"published": "2024-11-30T13:42:51+08:00",
|
||
"id": "https://xz.aliyun.com/t/16470",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "提示词注入攻击"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 古剑山web&pwn&re&misc wp",
|
||
"link": "https://xz.aliyun.com/t/16469",
|
||
"published": "2024-11-30T13:06:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16469",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 古剑山web&pwn&re&misc wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "codeql实战练习-micro_service_seclab",
|
||
"link": "https://xz.aliyun.com/t/16468",
|
||
"published": "2024-11-30T12:31:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16468",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "codeql实战练习-micro_service_seclab"
|
||
}
|
||
},
|
||
{
|
||
"title": "某某热点app登录sign值逆向分析",
|
||
"link": "https://xz.aliyun.com/t/16466",
|
||
"published": "2024-11-30T11:09:28+08:00",
|
||
"id": "https://xz.aliyun.com/t/16466",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某某热点app登录sign值逆向分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "样本分析 基于 rust 的恶意软件 SSLoad",
|
||
"link": "https://xz.aliyun.com/t/16465",
|
||
"published": "2024-11-30T02:54:12+08:00",
|
||
"id": "https://xz.aliyun.com/t/16465",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "样本分析 基于 rust 的恶意软件 SSLoad"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(一)",
|
||
"link": "https://xz.aliyun.com/t/16464",
|
||
"published": "2024-11-30T01:03:18+08:00",
|
||
"id": "https://xz.aliyun.com/t/16464",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(一)"
|
||
}
|
||
},
|
||
{
|
||
"title": "某web应用远程代码执行漏洞-反序列化分析",
|
||
"link": "https://xz.aliyun.com/t/16463",
|
||
"published": "2024-11-30T00:14:34+08:00",
|
||
"id": "https://xz.aliyun.com/t/16463",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某web应用远程代码执行漏洞-反序列化分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "SpringMVC的URI解析和权限绕过",
|
||
"link": "https://xz.aliyun.com/t/16462",
|
||
"published": "2024-11-29T21:48:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16462",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "SpringMVC的URI解析和权限绕过"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于深度学习(TextCNN&XGBoost stacking融合)对恶意软件的检测算法设计与实现",
|
||
"link": "https://xz.aliyun.com/t/16461",
|
||
"published": "2024-11-29T21:02:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16461",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于深度学习(TextCNN&XGBoost stacking融合)对恶意软件的检测算法设计与实现"
|
||
}
|
||
},
|
||
{
|
||
"title": "银狐黑产最新加载器利用破解版VPN为诱饵进行传播",
|
||
"link": "https://xz.aliyun.com/t/16459",
|
||
"published": "2024-11-29T19:51:21+08:00",
|
||
"id": "https://xz.aliyun.com/t/16459",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "银狐黑产最新加载器利用破解版VPN为诱饵进行传播"
|
||
}
|
||
},
|
||
{
|
||
"title": "\"多引擎\"的资产识别、信息收集工具",
|
||
"link": "https://xz.aliyun.com/t/16450",
|
||
"published": "2024-11-29T09:52:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16450",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "\"多引擎\"的资产识别、信息收集工具"
|
||
}
|
||
},
|
||
{
|
||
"title": "Discuz!x——3.5版本漏洞复现&代码审计",
|
||
"link": "https://xz.aliyun.com/t/16445",
|
||
"published": "2024-11-28T21:55:27+08:00",
|
||
"id": "https://xz.aliyun.com/t/16445",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Discuz!x——3.5版本漏洞复现&代码审计"
|
||
}
|
||
},
|
||
{
|
||
"title": "堆学习之Tcache Stashing Unlink Attacke",
|
||
"link": "https://xz.aliyun.com/t/16444",
|
||
"published": "2024-11-28T21:45:49+08:00",
|
||
"id": "https://xz.aliyun.com/t/16444",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "堆学习之Tcache Stashing Unlink Attacke"
|
||
}
|
||
},
|
||
{
|
||
"title": "脱离C2的自动路由,实战中如何将4以上层内网的穿透,4dnat+新版frp+proxifier使用",
|
||
"link": "https://xz.aliyun.com/t/16443",
|
||
"published": "2024-11-28T20:01:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16443",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "脱离C2的自动路由,实战中如何将4以上层内网的穿透,4dnat+新版frp+proxifier使用"
|
||
}
|
||
},
|
||
{
|
||
"title": "Ubuntu needrestart权限提升漏洞(CVE-2024-48990)漏洞分析",
|
||
"link": "https://xz.aliyun.com/t/16442",
|
||
"published": "2024-11-28T18:19:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16442",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Ubuntu needrestart权限提升漏洞(CVE-2024-48990)漏洞分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "大模型多轮越狱技术分析与实现",
|
||
"link": "https://xz.aliyun.com/t/16441",
|
||
"published": "2024-11-28T17:22:22+08:00",
|
||
"id": "https://xz.aliyun.com/t/16441",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "大模型多轮越狱技术分析与实现"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024NewStarCTF Week5 Pwn方向复现",
|
||
"link": "https://xz.aliyun.com/t/16439",
|
||
"published": "2024-11-28T16:51:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16439",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024NewStarCTF Week5 Pwn方向复现"
|
||
}
|
||
},
|
||
{
|
||
"title": "CVE-2024-22399 - SwingLazyValue利用链构造分析",
|
||
"link": "https://xz.aliyun.com/t/16436",
|
||
"published": "2024-11-28T14:53:03+08:00",
|
||
"id": "https://xz.aliyun.com/t/16436",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CVE-2024-22399 - SwingLazyValue利用链构造分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "第七届浙江省大学生网络与信息安全竞赛决赛 Misc方向全解",
|
||
"link": "https://xz.aliyun.com/t/16435",
|
||
"published": "2024-11-28T14:51:55+08:00",
|
||
"id": "https://xz.aliyun.com/t/16435",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第七届浙江省大学生网络与信息安全竞赛决赛 Misc方向全解"
|
||
}
|
||
},
|
||
{
|
||
"title": "网鼎杯玄武 crypto 0:解析变形的 Shamir 密钥分享机制",
|
||
"link": "https://xz.aliyun.com/t/16433",
|
||
"published": "2024-11-28T13:53:57+08:00",
|
||
"id": "https://xz.aliyun.com/t/16433",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "网鼎杯玄武 crypto 0:解析变形的 Shamir 密钥分享机制"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次SSTI长度限制绕过",
|
||
"link": "https://xz.aliyun.com/t/16432",
|
||
"published": "2024-11-28T11:50:02+08:00",
|
||
"id": "https://xz.aliyun.com/t/16432",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次SSTI长度限制绕过"
|
||
}
|
||
},
|
||
{
|
||
"title": "windows注入 r3级强制结束进程",
|
||
"link": "https://xz.aliyun.com/t/16427",
|
||
"published": "2024-11-27T23:46:31+08:00",
|
||
"id": "https://xz.aliyun.com/t/16427",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "windows注入 r3级强制结束进程"
|
||
}
|
||
}
|
||
] |