PyBot/JSON/xianzhi.json

1002 lines
35 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"title": "强网杯S8决赛RW赛道",
"link": "https://xz.aliyun.com/t/16607",
"published": "2024-12-07T16:39:52+08:00",
"id": "https://xz.aliyun.com/t/16607",
"summary": {
"@type": "html",
"#text": "强网杯S8决赛RW赛道"
}
},
{
"title": "2024国城杯pwn详细全解",
"link": "https://xz.aliyun.com/t/16606",
"published": "2024-12-07T16:27:51+08:00",
"id": "https://xz.aliyun.com/t/16606",
"summary": {
"@type": "html",
"#text": "2024国城杯pwn详细全解"
}
},
{
"title": "2024国城杯线上Crypto-WP",
"link": "https://xz.aliyun.com/t/16605",
"published": "2024-12-07T16:10:19+08:00",
"id": "https://xz.aliyun.com/t/16605",
"summary": {
"@type": "html",
"#text": "2024国城杯线上Crypto-WP"
}
},
{
"title": "强网S8决赛JsonPcikle Safe模式下的RCE与绕过分析研究",
"link": "https://xz.aliyun.com/t/16604",
"published": "2024-12-07T16:07:00+08:00",
"id": "https://xz.aliyun.com/t/16604",
"summary": {
"@type": "html",
"#text": "强网S8决赛JsonPcikle Safe模式下的RCE与绕过分析研究"
}
},
{
"title": "Pyramid 框架SSTI分析RCE",
"link": "https://xz.aliyun.com/t/16600",
"published": "2024-12-07T13:37:25+08:00",
"id": "https://xz.aliyun.com/t/16600",
"summary": {
"@type": "html",
"#text": "Pyramid 框架SSTI分析RCE"
}
},
{
"title": "apk修改实践绕过强制更新弹窗",
"link": "https://xz.aliyun.com/t/16599",
"published": "2024-12-07T11:02:35+08:00",
"id": "https://xz.aliyun.com/t/16599",
"summary": {
"@type": "html",
"#text": "apk修改实践绕过强制更新弹窗"
}
},
{
"title": "浅析异常线程检测逻辑unbacked",
"link": "https://xz.aliyun.com/t/16598",
"published": "2024-12-07T10:30:27+08:00",
"id": "https://xz.aliyun.com/t/16598",
"summary": {
"@type": "html",
"#text": "浅析异常线程检测逻辑unbacked"
}
},
{
"title": "boofuzz 中的 Request 和 Path 源码分析",
"link": "https://xz.aliyun.com/t/16594",
"published": "2024-12-07T02:06:10+08:00",
"id": "https://xz.aliyun.com/t/16594",
"summary": {
"@type": "html",
"#text": "boofuzz 中的 Request 和 Path 源码分析"
}
},
{
"title": "云函数实现代理绕过IP封锁",
"link": "https://xz.aliyun.com/t/16589",
"published": "2024-12-06T22:46:00+08:00",
"id": "https://xz.aliyun.com/t/16589",
"summary": {
"@type": "html",
"#text": "云函数实现代理绕过IP封锁"
}
},
{
"title": "CVE-2024-4181 run-llama/llama_index-SSE Command Injection分析",
"link": "https://xz.aliyun.com/t/16588",
"published": "2024-12-06T22:34:00+08:00",
"id": "https://xz.aliyun.com/t/16588",
"summary": {
"@type": "html",
"#text": "CVE-2024-4181 run-llama/llama_index-SSE Command Injection分析"
}
},
{
"title": "若依一把梭哈工具源码分析",
"link": "https://xz.aliyun.com/t/16586",
"published": "2024-12-06T22:31:35+08:00",
"id": "https://xz.aliyun.com/t/16586",
"summary": {
"@type": "html",
"#text": "若依一把梭哈工具源码分析"
}
},
{
"title": "CVE-2024-3408 D-tale bypassRCE分析",
"link": "https://xz.aliyun.com/t/16587",
"published": "2024-12-06T22:31:00+08:00",
"id": "https://xz.aliyun.com/t/16587",
"summary": {
"@type": "html",
"#text": "CVE-2024-3408 D-tale bypassRCE分析"
}
},
{
"title": "S8强网杯 ez_login详解",
"link": "https://xz.aliyun.com/t/16582",
"published": "2024-12-06T20:08:01+08:00",
"id": "https://xz.aliyun.com/t/16582",
"summary": {
"@type": "html",
"#text": "S8强网杯 ez_login详解"
}
},
{
"title": "S8强网杯Final-thinkshopplus",
"link": "https://xz.aliyun.com/t/16581",
"published": "2024-12-06T19:01:00+08:00",
"id": "https://xz.aliyun.com/t/16581",
"summary": {
"@type": "html",
"#text": "S8强网杯Final-thinkshopplus"
}
},
{
"title": "gRPC&Go: XCTF联赛DubheCTF2024 - ggbond 详细题解",
"link": "https://xz.aliyun.com/t/16580",
"published": "2024-12-06T17:51:46+08:00",
"id": "https://xz.aliyun.com/t/16580",
"summary": {
"@type": "html",
"#text": "gRPC&Go: XCTF联赛DubheCTF2024 - ggbond 详细题解"
}
},
{
"title": "免杀基础-shellcode开发",
"link": "https://xz.aliyun.com/t/16579",
"published": "2024-12-06T15:19:56+08:00",
"id": "https://xz.aliyun.com/t/16579",
"summary": {
"@type": "html",
"#text": "免杀基础-shellcode开发"
}
},
{
"title": "基于JavaSecLab 一款综合Java漏洞平台的学习思考",
"link": "https://xz.aliyun.com/t/16577",
"published": "2024-12-06T14:10:30+08:00",
"id": "https://xz.aliyun.com/t/16577",
"summary": {
"@type": "html",
"#text": "基于JavaSecLab 一款综合Java漏洞平台的学习思考"
}
},
{
"title": "JFinal CMS 5.1.0 命令执行漏洞分析(CVE-2024-53477)",
"link": "https://xz.aliyun.com/t/16575",
"published": "2024-12-06T13:27:00+08:00",
"id": "https://xz.aliyun.com/t/16575",
"summary": {
"@type": "html",
"#text": "JFinal CMS 5.1.0 命令执行漏洞分析(CVE-2024-53477)"
}
},
{
"title": "Sharp4Killdefender通过修改注册表关闭Windows Defender",
"link": "https://xz.aliyun.com/t/16574",
"published": "2024-12-06T13:00:24+08:00",
"id": "https://xz.aliyun.com/t/16574",
"summary": {
"@type": "html",
"#text": "Sharp4Killdefender通过修改注册表关闭Windows Defender"
}
},
{
"title": "从一道java题体验 scxml漏洞",
"link": "https://xz.aliyun.com/t/16572",
"published": "2024-12-06T12:13:03+08:00",
"id": "https://xz.aliyun.com/t/16572",
"summary": {
"@type": "html",
"#text": "从一道java题体验 scxml漏洞"
}
},
{
"title": "一次Telegram窃取程序的深入解析从技术细节到定位攻击者账户的完整流程",
"link": "https://xz.aliyun.com/t/16570",
"published": "2024-12-06T12:01:42+08:00",
"id": "https://xz.aliyun.com/t/16570",
"summary": {
"@type": "html",
"#text": "一次Telegram窃取程序的深入解析从技术细节到定位攻击者账户的完整流程"
}
},
{
"title": "CVE-2018-1270 spring-messaging RCE 深入分析",
"link": "https://xz.aliyun.com/t/16569",
"published": "2024-12-06T11:44:58+08:00",
"id": "https://xz.aliyun.com/t/16569",
"summary": {
"@type": "html",
"#text": "CVE-2018-1270 spring-messaging RCE 深入分析"
}
},
{
"title": "DTStack Taier 1.4.0 listNames sql注入分析(CVE-2024-41579)",
"link": "https://xz.aliyun.com/t/16568",
"published": "2024-12-06T11:08:37+08:00",
"id": "https://xz.aliyun.com/t/16568",
"summary": {
"@type": "html",
"#text": "DTStack Taier 1.4.0 listNames sql注入分析(CVE-2024-41579)"
}
},
{
"title": "基于environ变量的堆题攻击栈空间",
"link": "https://xz.aliyun.com/t/16566",
"published": "2024-12-05T22:29:29+08:00",
"id": "https://xz.aliyun.com/t/16566",
"summary": {
"@type": "html",
"#text": "基于environ变量的堆题攻击栈空间"
}
},
{
"title": "burpsuite数据包自动加解密插件autoDecoder详细安装+使用",
"link": "https://xz.aliyun.com/t/16564",
"published": "2024-12-05T16:57:14+08:00",
"id": "https://xz.aliyun.com/t/16564",
"summary": {
"@type": "html",
"#text": "burpsuite数据包自动加解密插件autoDecoder详细安装+使用"
}
},
{
"title": "一次红队恶意程序分析溯源",
"link": "https://xz.aliyun.com/t/16563",
"published": "2024-12-05T15:39:11+08:00",
"id": "https://xz.aliyun.com/t/16563",
"summary": {
"@type": "html",
"#text": "一次红队恶意程序分析溯源"
}
},
{
"title": "深入异构 PWNPowerPC&ARM&MIPS",
"link": "https://xz.aliyun.com/t/16562",
"published": "2024-12-05T14:23:42+08:00",
"id": "https://xz.aliyun.com/t/16562",
"summary": {
"@type": "html",
"#text": "深入异构 PWNPowerPC&ARM&MIPS"
}
},
{
"title": "llvm pass 初探",
"link": "https://xz.aliyun.com/t/16558",
"published": "2024-12-05T12:04:00+08:00",
"id": "https://xz.aliyun.com/t/16558",
"summary": {
"@type": "html",
"#text": "llvm pass 初探"
}
},
{
"title": "从源码的角度学习 boofuzz 函数的使用",
"link": "https://xz.aliyun.com/t/16554",
"published": "2024-12-05T01:05:47+08:00",
"id": "https://xz.aliyun.com/t/16554",
"summary": {
"@type": "html",
"#text": "从源码的角度学习 boofuzz 函数的使用"
}
},
{
"title": "分享最近攻防演练HVV漏洞复盘",
"link": "https://xz.aliyun.com/t/16553",
"published": "2024-12-04T21:11:09+08:00",
"id": "https://xz.aliyun.com/t/16553",
"summary": {
"@type": "html",
"#text": "分享最近攻防演练HVV漏洞复盘"
}
},
{
"title": "伪装成ToDesk安装程序加载后门盗取数字货币",
"link": "https://xz.aliyun.com/t/16552",
"published": "2024-12-04T20:00:59+08:00",
"id": "https://xz.aliyun.com/t/16552",
"summary": {
"@type": "html",
"#text": "伪装成ToDesk安装程序加载后门盗取数字货币"
}
},
{
"title": "Android逆向实战——以某APP跳过广告为例",
"link": "https://xz.aliyun.com/t/16550",
"published": "2024-12-04T17:38:00+08:00",
"id": "https://xz.aliyun.com/t/16550",
"summary": {
"@type": "html",
"#text": "Android逆向实战——以某APP跳过广告为例"
}
},
{
"title": "webpwn的一些总结",
"link": "https://xz.aliyun.com/t/16549",
"published": "2024-12-04T17:20:50+08:00",
"id": "https://xz.aliyun.com/t/16549",
"summary": {
"@type": "html",
"#text": "webpwn的一些总结"
}
},
{
"title": "Fastjson反序列化漏洞深度解析与利用和修复",
"link": "https://xz.aliyun.com/t/16547",
"published": "2024-12-04T15:18:05+08:00",
"id": "https://xz.aliyun.com/t/16547",
"summary": {
"@type": "html",
"#text": "Fastjson反序列化漏洞深度解析与利用和修复"
}
},
{
"title": "2024金盾信安杯线上题目wp",
"link": "https://xz.aliyun.com/t/16546",
"published": "2024-12-04T15:08:41+08:00",
"id": "https://xz.aliyun.com/t/16546",
"summary": {
"@type": "html",
"#text": "2024金盾信安杯线上题目wp"
}
},
{
"title": "高版本Fastjson反序列化Xtring新链和EventListenerList绕过",
"link": "https://xz.aliyun.com/t/16540",
"published": "2024-12-04T13:59:43+08:00",
"id": "https://xz.aliyun.com/t/16540",
"summary": {
"@type": "html",
"#text": "高版本Fastjson反序列化Xtring新链和EventListenerList绕过"
}
},
{
"title": "域渗透入门靶机之HTB-Cicada",
"link": "https://xz.aliyun.com/t/16539",
"published": "2024-12-04T13:10:46+08:00",
"id": "https://xz.aliyun.com/t/16539",
"summary": {
"@type": "html",
"#text": "域渗透入门靶机之HTB-Cicada"
}
},
{
"title": "java加载动态链接库绕过一些限制的思考",
"link": "https://xz.aliyun.com/t/16538",
"published": "2024-12-04T11:12:08+08:00",
"id": "https://xz.aliyun.com/t/16538",
"summary": {
"@type": "html",
"#text": "java加载动态链接库绕过一些限制的思考"
}
},
{
"title": "从零构建:我的漏洞扫描器之旅",
"link": "https://xz.aliyun.com/t/16537",
"published": "2024-12-04T10:38:46+08:00",
"id": "https://xz.aliyun.com/t/16537",
"summary": {
"@type": "html",
"#text": "从零构建:我的漏洞扫描器之旅"
}
},
{
"title": "CS代码审计配合Jdbc反序列化漏洞的利用",
"link": "https://xz.aliyun.com/t/16536",
"published": "2024-12-03T23:58:20+08:00",
"id": "https://xz.aliyun.com/t/16536",
"summary": {
"@type": "html",
"#text": "CS代码审计配合Jdbc反序列化漏洞的利用"
}
},
{
"title": "从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复",
"link": "https://xz.aliyun.com/t/16535",
"published": "2024-12-03T23:57:40+08:00",
"id": "https://xz.aliyun.com/t/16535",
"summary": {
"@type": "html",
"#text": "从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复"
}
},
{
"title": "某云音乐为例-反调试绕过,栈回溯,web算法逆向",
"link": "https://xz.aliyun.com/t/16534",
"published": "2024-12-03T23:50:24+08:00",
"id": "https://xz.aliyun.com/t/16534",
"summary": {
"@type": "html",
"#text": "某云音乐为例-反调试绕过,栈回溯,web算法逆向"
}
},
{
"title": "2024睿抗网络安全初赛0解题——nopassword详解",
"link": "https://xz.aliyun.com/t/16533",
"published": "2024-12-03T22:29:02+08:00",
"id": "https://xz.aliyun.com/t/16533",
"summary": {
"@type": "html",
"#text": "2024睿抗网络安全初赛0解题——nopassword详解"
}
},
{
"title": "某省移动网络安全技能竞赛决赛 个人赛第一名wp",
"link": "https://xz.aliyun.com/t/16532",
"published": "2024-12-03T21:45:11+08:00",
"id": "https://xz.aliyun.com/t/16532",
"summary": {
"@type": "html",
"#text": "某省移动网络安全技能竞赛决赛 个人赛第一名wp"
}
},
{
"title": "Apache NiFi 高版本命令执行利用",
"link": "https://xz.aliyun.com/t/16531",
"published": "2024-12-03T20:44:14+08:00",
"id": "https://xz.aliyun.com/t/16531",
"summary": {
"@type": "html",
"#text": "Apache NiFi 高版本命令执行利用"
}
},
{
"title": "WuCup 第一届“吾杯”网络安全技能大赛 WriteUp",
"link": "https://xz.aliyun.com/t/16529",
"published": "2024-12-03T17:34:27+08:00",
"id": "https://xz.aliyun.com/t/16529",
"summary": {
"@type": "html",
"#text": "WuCup 第一届“吾杯”网络安全技能大赛 WriteUp"
}
},
{
"title": "记一次Go SSTI打SSRF到任意文件读",
"link": "https://xz.aliyun.com/t/16527",
"published": "2024-12-03T16:52:38+08:00",
"id": "https://xz.aliyun.com/t/16527",
"summary": {
"@type": "html",
"#text": "记一次Go SSTI打SSRF到任意文件读"
}
},
{
"title": "极客大挑战 web week3&week4",
"link": "https://xz.aliyun.com/t/16526",
"published": "2024-12-03T16:48:02+08:00",
"id": "https://xz.aliyun.com/t/16526",
"summary": {
"@type": "html",
"#text": "极客大挑战 web week3&week4"
}
},
{
"title": "jeepay v2.4.0反射型xss+存储型xss分析",
"link": "https://xz.aliyun.com/t/16524",
"published": "2024-12-03T15:40:58+08:00",
"id": "https://xz.aliyun.com/t/16524",
"summary": {
"@type": "html",
"#text": "jeepay v2.4.0反射型xss+存储型xss分析"
}
},
{
"title": "JDBC Attack漫谈",
"link": "https://xz.aliyun.com/t/16523",
"published": "2024-12-03T14:51:00+08:00",
"id": "https://xz.aliyun.com/t/16523",
"summary": {
"@type": "html",
"#text": "JDBC Attack漫谈"
}
},
{
"title": "2024鹏城杯线下赛复现",
"link": "https://xz.aliyun.com/t/16522",
"published": "2024-12-03T14:42:00+08:00",
"id": "https://xz.aliyun.com/t/16522",
"summary": {
"@type": "html",
"#text": "2024鹏城杯线下赛复现"
}
},
{
"title": "MemoryModule的远程反射dll加载与一些没有实现的想法",
"link": "https://xz.aliyun.com/t/16521",
"published": "2024-12-03T11:58:34+08:00",
"id": "https://xz.aliyun.com/t/16521",
"summary": {
"@type": "html",
"#text": "MemoryModule的远程反射dll加载与一些没有实现的想法"
}
},
{
"title": "禅道18.x-20.x版本漏洞挖掘思路分析",
"link": "https://xz.aliyun.com/t/16520",
"published": "2024-12-03T11:29:24+08:00",
"id": "https://xz.aliyun.com/t/16520",
"summary": {
"@type": "html",
"#text": "禅道18.x-20.x版本漏洞挖掘思路分析"
}
},
{
"title": "THM靶场-Lookup-通关WriteUp",
"link": "https://xz.aliyun.com/t/16517",
"published": "2024-12-03T00:58:39+08:00",
"id": "https://xz.aliyun.com/t/16517",
"summary": {
"@type": "html",
"#text": "THM靶场-Lookup-通关WriteUp"
}
},
{
"title": "哥斯拉源码解读+如何绕过waf检测",
"link": "https://xz.aliyun.com/t/16515",
"published": "2024-12-02T22:23:11+08:00",
"id": "https://xz.aliyun.com/t/16515",
"summary": {
"@type": "html",
"#text": "哥斯拉源码解读+如何绕过waf检测"
}
},
{
"title": "反沙盒?一文足以",
"link": "https://xz.aliyun.com/t/16514",
"published": "2024-12-02T22:21:58+08:00",
"id": "https://xz.aliyun.com/t/16514",
"summary": {
"@type": "html",
"#text": "反沙盒?一文足以"
}
},
{
"title": "unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例",
"link": "https://xz.aliyun.com/t/16513",
"published": "2024-12-02T21:16:53+08:00",
"id": "https://xz.aliyun.com/t/16513",
"summary": {
"@type": "html",
"#text": "unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例"
}
},
{
"title": "IoT 安全从零到掌握:超详尽入门指南(实战篇)",
"link": "https://xz.aliyun.com/t/16511",
"published": "2024-12-02T20:23:35+08:00",
"id": "https://xz.aliyun.com/t/16511",
"summary": {
"@type": "html",
"#text": "IoT 安全从零到掌握:超详尽入门指南(实战篇)"
}
},
{
"title": "记一次溯源真实案例",
"link": "https://xz.aliyun.com/t/16510",
"published": "2024-12-02T19:29:36+08:00",
"id": "https://xz.aliyun.com/t/16510",
"summary": {
"@type": "html",
"#text": "记一次溯源真实案例"
}
},
{
"title": "IoT 安全从零到掌握:超详尽入门指南(基础篇)",
"link": "https://xz.aliyun.com/t/16512",
"published": "2024-12-02T18:17:18+08:00",
"id": "https://xz.aliyun.com/t/16512",
"summary": {
"@type": "html",
"#text": "IoT 安全从零到掌握:超详尽入门指南(基础篇)"
}
},
{
"title": "2024 武数杯 RHG",
"link": "https://xz.aliyun.com/t/16475",
"published": "2024-12-02T16:17:00+08:00",
"id": "https://xz.aliyun.com/t/16475",
"summary": {
"@type": "html",
"#text": "2024 武数杯 RHG"
}
},
{
"title": "2024年第一届吾杯解题writeup",
"link": "https://xz.aliyun.com/t/16503",
"published": "2024-12-01T23:40:00+08:00",
"id": "https://xz.aliyun.com/t/16503",
"summary": {
"@type": "html",
"#text": "2024年第一届吾杯解题writeup"
}
},
{
"title": "记一次RAT的感染过程详细分析",
"link": "https://xz.aliyun.com/t/16502",
"published": "2024-12-01T23:10:00+08:00",
"id": "https://xz.aliyun.com/t/16502",
"summary": {
"@type": "html",
"#text": "记一次RAT的感染过程详细分析"
}
},
{
"title": "2024古剑山初赛WP",
"link": "https://xz.aliyun.com/t/16501",
"published": "2024-12-01T20:34:07+08:00",
"id": "https://xz.aliyun.com/t/16501",
"summary": {
"@type": "html",
"#text": "2024古剑山初赛WP"
}
},
{
"title": "2024吾杯网络安全技能大赛ctf-web方向",
"link": "https://xz.aliyun.com/t/16500",
"published": "2024-12-01T19:49:39+08:00",
"id": "https://xz.aliyun.com/t/16500",
"summary": {
"@type": "html",
"#text": "2024吾杯网络安全技能大赛ctf-web方向"
}
},
{
"title": "记某次金融小程序数据加密及签名逆向",
"link": "https://xz.aliyun.com/t/16497",
"published": "2024-12-01T17:20:00+08:00",
"id": "https://xz.aliyun.com/t/16497",
"summary": {
"@type": "html",
"#text": "记某次金融小程序数据加密及签名逆向"
}
},
{
"title": "2024网鼎杯初赛和半决赛部分题解---PWN",
"link": "https://xz.aliyun.com/t/16495",
"published": "2024-12-01T16:43:53+08:00",
"id": "https://xz.aliyun.com/t/16495",
"summary": {
"@type": "html",
"#text": "2024网鼎杯初赛和半决赛部分题解---PWN"
}
},
{
"title": "2024 强网拟态决赛web 部分wp",
"link": "https://xz.aliyun.com/t/16489",
"published": "2024-12-01T14:49:39+08:00",
"id": "https://xz.aliyun.com/t/16489",
"summary": {
"@type": "html",
"#text": "2024 强网拟态决赛web 部分wp"
}
},
{
"title": "动态逃逸杀软的艺术",
"link": "https://xz.aliyun.com/t/16486",
"published": "2024-12-01T10:12:00+08:00",
"id": "https://xz.aliyun.com/t/16486",
"summary": {
"@type": "html",
"#text": "动态逃逸杀软的艺术"
}
},
{
"title": "样本分析-DarkComet远控木马",
"link": "https://xz.aliyun.com/t/16485",
"published": "2024-11-30T23:44:00+08:00",
"id": "https://xz.aliyun.com/t/16485",
"summary": {
"@type": "html",
"#text": "样本分析-DarkComet远控木马"
}
},
{
"title": "某省移动竞赛决赛个人赛 部分wp",
"link": "https://xz.aliyun.com/t/16484",
"published": "2024-11-30T23:13:25+08:00",
"id": "https://xz.aliyun.com/t/16484",
"summary": {
"@type": "html",
"#text": "某省移动竞赛决赛个人赛 部分wp"
}
},
{
"title": "NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠",
"link": "https://xz.aliyun.com/t/16483",
"published": "2024-11-30T21:33:34+08:00",
"id": "https://xz.aliyun.com/t/16483",
"summary": {
"@type": "html",
"#text": "NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠"
}
},
{
"title": "2024“中华武数杯” 全国网络攻防精英赛",
"link": "https://xz.aliyun.com/t/16482",
"published": "2024-11-30T19:10:43+08:00",
"id": "https://xz.aliyun.com/t/16482",
"summary": {
"@type": "html",
"#text": "2024“中华武数杯” 全国网络攻防精英赛"
}
},
{
"title": "2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto",
"link": "https://xz.aliyun.com/t/16480",
"published": "2024-11-30T18:55:48+08:00",
"id": "https://xz.aliyun.com/t/16480",
"summary": {
"@type": "html",
"#text": "2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto"
}
},
{
"title": "2024 金盾杯 wp",
"link": "https://xz.aliyun.com/t/16478",
"published": "2024-11-30T18:13:31+08:00",
"id": "https://xz.aliyun.com/t/16478",
"summary": {
"@type": "html",
"#text": "2024 金盾杯 wp"
}
},
{
"title": "2024古剑山Pwn方向全部题解",
"link": "https://xz.aliyun.com/t/16474",
"published": "2024-11-30T15:48:05+08:00",
"id": "https://xz.aliyun.com/t/16474",
"summary": {
"@type": "html",
"#text": "2024古剑山Pwn方向全部题解"
}
},
{
"title": "江苏移动“建材赋能”线下个人决赛crypto三道0解题",
"link": "https://xz.aliyun.com/t/16473",
"published": "2024-11-30T14:12:46+08:00",
"id": "https://xz.aliyun.com/t/16473",
"summary": {
"@type": "html",
"#text": "江苏移动“建材赋能”线下个人决赛crypto三道0解题"
}
},
{
"title": "2024古剑山 pwn 详解",
"link": "https://xz.aliyun.com/t/16471",
"published": "2024-11-30T13:52:46+08:00",
"id": "https://xz.aliyun.com/t/16471",
"summary": {
"@type": "html",
"#text": "2024古剑山 pwn 详解"
}
},
{
"title": "提示词注入攻击",
"link": "https://xz.aliyun.com/t/16470",
"published": "2024-11-30T13:42:51+08:00",
"id": "https://xz.aliyun.com/t/16470",
"summary": {
"@type": "html",
"#text": "提示词注入攻击"
}
},
{
"title": "2024 古剑山web&pwn&re&misc wp",
"link": "https://xz.aliyun.com/t/16469",
"published": "2024-11-30T13:06:00+08:00",
"id": "https://xz.aliyun.com/t/16469",
"summary": {
"@type": "html",
"#text": "2024 古剑山web&pwn&re&misc wp"
}
},
{
"title": "codeql实战练习-micro_service_seclab",
"link": "https://xz.aliyun.com/t/16468",
"published": "2024-11-30T12:31:46+08:00",
"id": "https://xz.aliyun.com/t/16468",
"summary": {
"@type": "html",
"#text": "codeql实战练习-micro_service_seclab"
}
},
{
"title": "某某热点app登录sign值逆向分析",
"link": "https://xz.aliyun.com/t/16466",
"published": "2024-11-30T11:09:28+08:00",
"id": "https://xz.aliyun.com/t/16466",
"summary": {
"@type": "html",
"#text": "某某热点app登录sign值逆向分析"
}
},
{
"title": "样本分析 基于 rust 的恶意软件 SSLoad",
"link": "https://xz.aliyun.com/t/16465",
"published": "2024-11-30T02:54:12+08:00",
"id": "https://xz.aliyun.com/t/16465",
"summary": {
"@type": "html",
"#text": "样本分析 基于 rust 的恶意软件 SSLoad"
}
},
{
"title": "基于JavaSecLab 一款综合Java漏洞平台的学习思考",
"link": "https://xz.aliyun.com/t/16464",
"published": "2024-11-30T01:03:18+08:00",
"id": "https://xz.aliyun.com/t/16464",
"summary": {
"@type": "html",
"#text": "基于JavaSecLab 一款综合Java漏洞平台的学习思考"
}
},
{
"title": "某web应用远程代码执行漏洞-反序列化分析",
"link": "https://xz.aliyun.com/t/16463",
"published": "2024-11-30T00:14:34+08:00",
"id": "https://xz.aliyun.com/t/16463",
"summary": {
"@type": "html",
"#text": "某web应用远程代码执行漏洞-反序列化分析"
}
},
{
"title": "SpringMVC的URI解析和权限绕过",
"link": "https://xz.aliyun.com/t/16462",
"published": "2024-11-29T21:48:43+08:00",
"id": "https://xz.aliyun.com/t/16462",
"summary": {
"@type": "html",
"#text": "SpringMVC的URI解析和权限绕过"
}
},
{
"title": "基于深度学习TextCNN&XGBoost stacking融合对恶意软件的检测算法设计与实现",
"link": "https://xz.aliyun.com/t/16461",
"published": "2024-11-29T21:02:11+08:00",
"id": "https://xz.aliyun.com/t/16461",
"summary": {
"@type": "html",
"#text": "基于深度学习TextCNN&XGBoost stacking融合对恶意软件的检测算法设计与实现"
}
},
{
"title": "银狐黑产最新加载器利用破解版VPN为诱饵进行传播",
"link": "https://xz.aliyun.com/t/16459",
"published": "2024-11-29T19:51:21+08:00",
"id": "https://xz.aliyun.com/t/16459",
"summary": {
"@type": "html",
"#text": "银狐黑产最新加载器利用破解版VPN为诱饵进行传播"
}
},
{
"title": "\"多引擎\"的资产识别、信息收集工具",
"link": "https://xz.aliyun.com/t/16450",
"published": "2024-11-29T09:52:11+08:00",
"id": "https://xz.aliyun.com/t/16450",
"summary": {
"@type": "html",
"#text": "\"多引擎\"的资产识别、信息收集工具"
}
},
{
"title": "Discuz!x——3.5版本漏洞复现&代码审计",
"link": "https://xz.aliyun.com/t/16445",
"published": "2024-11-28T21:55:27+08:00",
"id": "https://xz.aliyun.com/t/16445",
"summary": {
"@type": "html",
"#text": "Discuz!x——3.5版本漏洞复现&代码审计"
}
},
{
"title": "堆学习之Tcache Stashing Unlink Attacke",
"link": "https://xz.aliyun.com/t/16444",
"published": "2024-11-28T21:45:49+08:00",
"id": "https://xz.aliyun.com/t/16444",
"summary": {
"@type": "html",
"#text": "堆学习之Tcache Stashing Unlink Attacke"
}
},
{
"title": "脱离C2的自动路由,实战中如何将4以上层内网的穿透,4dnat+新版frp+proxifier使用",
"link": "https://xz.aliyun.com/t/16443",
"published": "2024-11-28T20:01:00+08:00",
"id": "https://xz.aliyun.com/t/16443",
"summary": {
"@type": "html",
"#text": "脱离C2的自动路由,实战中如何将4以上层内网的穿透,4dnat+新版frp+proxifier使用"
}
},
{
"title": "Ubuntu needrestart权限提升漏洞(CVE-2024-48990)漏洞分析",
"link": "https://xz.aliyun.com/t/16442",
"published": "2024-11-28T18:19:43+08:00",
"id": "https://xz.aliyun.com/t/16442",
"summary": {
"@type": "html",
"#text": "Ubuntu needrestart权限提升漏洞(CVE-2024-48990)漏洞分析"
}
},
{
"title": "大模型多轮越狱技术分析与实现",
"link": "https://xz.aliyun.com/t/16441",
"published": "2024-11-28T17:22:22+08:00",
"id": "https://xz.aliyun.com/t/16441",
"summary": {
"@type": "html",
"#text": "大模型多轮越狱技术分析与实现"
}
},
{
"title": "2024NewStarCTF Week5 Pwn方向复现",
"link": "https://xz.aliyun.com/t/16439",
"published": "2024-11-28T16:51:11+08:00",
"id": "https://xz.aliyun.com/t/16439",
"summary": {
"@type": "html",
"#text": "2024NewStarCTF Week5 Pwn方向复现"
}
},
{
"title": "CVE-2024-22399 - SwingLazyValue利用链构造分析",
"link": "https://xz.aliyun.com/t/16436",
"published": "2024-11-28T14:53:03+08:00",
"id": "https://xz.aliyun.com/t/16436",
"summary": {
"@type": "html",
"#text": "CVE-2024-22399 - SwingLazyValue利用链构造分析"
}
},
{
"title": "第七届浙江省大学生网络与信息安全竞赛决赛 Misc方向全解",
"link": "https://xz.aliyun.com/t/16435",
"published": "2024-11-28T14:51:55+08:00",
"id": "https://xz.aliyun.com/t/16435",
"summary": {
"@type": "html",
"#text": "第七届浙江省大学生网络与信息安全竞赛决赛 Misc方向全解"
}
},
{
"title": "网鼎杯玄武 crypto 0解析变形的 Shamir 密钥分享机制",
"link": "https://xz.aliyun.com/t/16433",
"published": "2024-11-28T13:53:57+08:00",
"id": "https://xz.aliyun.com/t/16433",
"summary": {
"@type": "html",
"#text": "网鼎杯玄武 crypto 0解析变形的 Shamir 密钥分享机制"
}
},
{
"title": "记一次SSTI长度限制绕过",
"link": "https://xz.aliyun.com/t/16432",
"published": "2024-11-28T11:50:02+08:00",
"id": "https://xz.aliyun.com/t/16432",
"summary": {
"@type": "html",
"#text": "记一次SSTI长度限制绕过"
}
},
{
"title": "windows注入 r3级强制结束进程",
"link": "https://xz.aliyun.com/t/16427",
"published": "2024-11-27T23:46:31+08:00",
"id": "https://xz.aliyun.com/t/16427",
"summary": {
"@type": "html",
"#text": "windows注入 r3级强制结束进程"
}
}
]