122 lines
9.8 KiB
JSON
122 lines
9.8 KiB
JSON
[
|
||
{
|
||
"title": "基于 InternLM 和 LangChain 搭建私人知识库\n",
|
||
"link": "https://paper.seebug.org/3247/",
|
||
"description": "作者:Jinzhong Xu\n原文链接:https://xujinzh.github.io/2024/01/08/ai-Interlm-langchain-RAG/index.html\n本篇介绍基于 InternLM 和 LangChain 搭建私人知识库。\npython!conda create --name internlm_langchain --clone=/root/share/c...\n",
|
||
"pubDate": "Thu, 05 Dec 2024 11:34:00 +0000",
|
||
"guid": "https://paper.seebug.org/3247/",
|
||
"category": "AI安全"
|
||
},
|
||
{
|
||
"title": "书生·浦语大模型使用\n",
|
||
"link": "https://paper.seebug.org/3246/",
|
||
"description": "作者:Jinzhong Xu\n原文链接:https://xujinzh.github.io/2024/01/06/ai-internlm-useage/\n本篇介绍书生·浦语大模型的使用,包括智能对话、智能体工具调用和图文理解创作等。\n环境配置\npython!conda create --name internlm-chat --clone=/root/share/conda_envs/int...\n",
|
||
"pubDate": "Thu, 05 Dec 2024 10:27:00 +0000",
|
||
"guid": "https://paper.seebug.org/3246/",
|
||
"category": "AI安全"
|
||
},
|
||
{
|
||
"title": "Uncontrolled PCDN: Observation and Case Analysis of the Current State of PCDN Technology\n",
|
||
"link": "https://paper.seebug.org/3245/",
|
||
"description": "Author: Knownsec 404 Active Defense Team\nDate: November 22, 2024\n中文版:https://paper.seebug.org/3242\nBackground Introduction\nIn October 2024, Knownsec 404 Active Defense Team detected abnormal traffi...\n",
|
||
"pubDate": "Mon, 02 Dec 2024 06:13:00 +0000",
|
||
"guid": "https://paper.seebug.org/3245/",
|
||
"category": "情报分析"
|
||
},
|
||
{
|
||
"title": "Android 恶意软件混淆与对抗技术专题\n",
|
||
"link": "https://paper.seebug.org/3244/",
|
||
"description": "作者:启明星辰ADLab\n原文链接:https://mp.weixin.qq.com/s/LIAkPLZ_vVOUGjFymdEH-w\n第一章 概 述\n近年来,Android恶意软件数量不断攀升,其采用的攻击和对抗技术也变得越来越复杂。为了对抗安全分析,绕过安全检测,窃取敏感数据或破坏系统安全,恶意软件利用各种对抗技术来伪装和隐藏其恶意行为和代码逻辑。这些对抗技术中,针对资源、文件、字节码指...\n",
|
||
"pubDate": "Wed, 27 Nov 2024 08:10:00 +0000",
|
||
"guid": "https://paper.seebug.org/3244/",
|
||
"category": "移动安全"
|
||
},
|
||
{
|
||
"title": "Prompt 越狱手册\n",
|
||
"link": "https://paper.seebug.org/3243/",
|
||
"description": "作者:洺熙\n本文为作者投稿,Seebug Paper 期待你的分享,凡经采用即有礼品相送! 投稿邮箱:paper@seebug.org\n以下皆为作者洺熙个人观点或洺熙认同的看法,本文一切也只用于技术交流,切勿用于不法目的,一切纷争与作者本人无关\n由于书写本文的时候是从0到1开始写的,所以根据受益人群的不同,可以自行选择对应目录进行观看,同步开源至:https://github.com/Acm...\n",
|
||
"pubDate": "Wed, 27 Nov 2024 03:32:00 +0000",
|
||
"guid": "https://paper.seebug.org/3243/",
|
||
"category": "AI安全"
|
||
},
|
||
{
|
||
"title": "失控的PCDN:观察PCDN技术现状与案例分析\n",
|
||
"link": "https://paper.seebug.org/3242/",
|
||
"description": "作者:知道创宇404积极防御实验室\n日期:2024年11月22日\nEnglish Version: https://paper.seebug.org/3245/\n背景介绍\n2024年10月,知道创宇404积极防御实验室监测到某客户网站流量异常,疑似遭到CC攻击。经过分析,本次CC攻击疑似为PCDN厂商为了平衡上下行流量对客户网站视频文件进行的盗刷流量行为。\n在调查分析的过程中,我们发现PCD...\n",
|
||
"pubDate": "Fri, 22 Nov 2024 12:38:00 +0000",
|
||
"guid": "https://paper.seebug.org/3242/",
|
||
"category": "情报分析"
|
||
},
|
||
{
|
||
"title": "APT-K-47 武器披露之 Asyncshell 的前世今生\n",
|
||
"link": "https://paper.seebug.org/3240/",
|
||
"description": "作者:知道创宇404高级威胁情报团队\n日期:2024年11月22日\nEnglish version: https://paper.seebug.org/3241/\n1. 事件背景\n近期,知道创宇404高级威胁情报团队在日常跟踪APT过程中发现了APT-K-47组织利用“朝觐”话题发起的攻击活动,攻击者利用CHM文件执行相同目录下的恶意载荷。最终载荷功能比较简单,仅支持cmd shell,且使...\n",
|
||
"pubDate": "Fri, 22 Nov 2024 05:22:00 +0000",
|
||
"guid": "https://paper.seebug.org/3240/",
|
||
"category": "威胁情报"
|
||
},
|
||
{
|
||
"title": "Unveiling the Past and Present of APT-K-47 Weapon: Asyncshell\n",
|
||
"link": "https://paper.seebug.org/3241/",
|
||
"description": "Author:Knownsec 404 Advanced Threat Intelligence team\ndate:November 22, 2024\n中文版:https://paper.seebug.org/3240\n1. Background of the incident\nRecently, in the course of daily APT tracking,the Knowns...\n",
|
||
"pubDate": "Fri, 22 Nov 2024 05:10:00 +0000",
|
||
"guid": "https://paper.seebug.org/3241/",
|
||
"category": "威胁情报"
|
||
},
|
||
{
|
||
"title": "使用 ZoomEye 增强新语法拓线 LockBit 3.0 勒索软件联盟基础设施\n",
|
||
"link": "https://paper.seebug.org/3238/",
|
||
"description": "作者:知道创宇404实验室\n日期:2024年11月21日\nEnglish version: https://paper.seebug.org/3239/\n一.摘要\nLockBit 3.0 是一种知名的勒索软件,由网络犯罪组织通过“勒索软件即服务”(RaaS)模式运作。LockBit 3.0勒索软件联盟是使用该恶意软件进行攻击的独立黑客,他们以分成方式合作。这些成员利用 LockBit 提供的...\n",
|
||
"pubDate": "Thu, 21 Nov 2024 02:19:00 +0000",
|
||
"guid": "https://paper.seebug.org/3238/",
|
||
"category": "专题报告"
|
||
},
|
||
{
|
||
"title": "Identify Infrastructure Linked To LockBit 3.0 Ransomware Affiliates By ZoomEye Enhanced New Syntax\n",
|
||
"link": "https://paper.seebug.org/3239/",
|
||
"description": "Author: Knownsec 404 team\nDate: November 20, 2024\n中文版:https://paper.seebug.org/3238/\n1. Abstract\nLockBit 3.0 is a well-known ransomware operated through a "Ransomware-as-a-Service" (RaaS) model. Th...\n",
|
||
"pubDate": "Tue, 19 Nov 2024 03:20:00 +0000",
|
||
"guid": "https://paper.seebug.org/3239/",
|
||
"category": "404 English Paper"
|
||
},
|
||
{
|
||
"title": "CVE-2022-20474分析——LazyValue下的Self-changed Bundle\n",
|
||
"link": "https://paper.seebug.org/3237/",
|
||
"description": "作者:Cxxsheng\n本文为作者投稿,Seebug Paper 期待你的分享,凡经采用即有礼品相送! 投稿邮箱:paper@seebug.org\n前言\n温馨提示,阅读本文前,应当对Bundle Mismatch相关漏洞有初步了解,以下参考资料假如您还没有读过,建议先阅读一下:\n\nBundle风水——Android序列化与反序列化不匹配漏洞详解:经典的入门级别教程。\nAndroid 反序列化...\n",
|
||
"pubDate": "Fri, 15 Nov 2024 08:36:00 +0000",
|
||
"guid": "https://paper.seebug.org/3237/",
|
||
"category": "漏洞分析"
|
||
},
|
||
{
|
||
"title": "LedgerHQ 软件供应链安全事件\n",
|
||
"link": "https://paper.seebug.org/3236/",
|
||
"description": "作者:维一零\n原文链接:https://weiyiling.cn/one/ledgerhq_npmjs_hijack_review\n0x00 前言\n写这篇的文章的原因如下:\n1、 去年有及时关注到这起供应链攻击事件,但由于不熟悉区块链安全以及对关键代码的解密困难未能深入分析,就先收藏留存;\n2、 对区块链安全的兴趣日益加深,以及职业发展需求驱动下开始尝试学习储备相关知识技能;\n3、 最近突然...\n",
|
||
"pubDate": "Thu, 14 Nov 2024 04:21:00 +0000",
|
||
"guid": "https://paper.seebug.org/3236/",
|
||
"category": "区块链"
|
||
},
|
||
{
|
||
"title": "N1CTF24 PHP Master Writeup\n",
|
||
"link": "https://paper.seebug.org/3235/",
|
||
"description": "作者:m4p1e\n原文链接:https://m4p1e.com/2024/11/12/n1ctf24-php-master/\n0x01 介绍\n在刚刚过去的N1CTF24上,我出了一道关于PHP的pwn题,其中涉及到的漏洞[1]是真实存在的,并且目前依然没有被修复。非常遗憾,期待的PHP master并没有出现在这次的比赛中,让我们期待下次的PHP rising star xd。在这篇文章中我...\n",
|
||
"pubDate": "Thu, 14 Nov 2024 02:12:00 +0000",
|
||
"guid": "https://paper.seebug.org/3235/",
|
||
"category": "CTF"
|
||
},
|
||
{
|
||
"title": "Vigor3900 固件仿真及漏洞分析(CVE-2024-44844、CVE-2024-44845)\n",
|
||
"link": "https://paper.seebug.org/3234/",
|
||
"description": "作者:fan@知道创宇404实验室\n时间:2024年11月13日\n1.前言\n我在日常跟踪漏洞情报的过程中,看到 Vigor3900 最新版本固件 1.5.1.6 存在多处后台命令注入漏洞(CVE-2024-44844/CVE-2024-44845)[1]。正好最近看到几个固件仿真小工具,我打算一并试试效果。\n2.产品介绍\nVigor3900 是 DrayTek 推出的一款高性能、多功能的企业...\n",
|
||
"pubDate": "Wed, 13 Nov 2024 04:23:00 +0000",
|
||
"guid": "https://paper.seebug.org/3234/",
|
||
"category": "404专栏"
|
||
},
|
||
{
|
||
"title": "CodeQL 入门和基本使用\n",
|
||
"link": "https://paper.seebug.org/3233/",
|
||
"description": "作者:0x7F@知道创宇404实验室\n日期:2024年11月12日\n1.前言\nCodeQL 是 GitHub 推出的一种静态代码分析工具,用于查找和修复代码中的漏洞和安全问题。该工具最早由 Semmle 团队开发并命名为 Semmle QL,应用于自家的源代码分析平台 LGTM(Looks Good To Me) 上;2020年,Github 收购了 Semmle 团队并成立了 Securi...\n",
|
||
"pubDate": "Tue, 12 Nov 2024 06:07:00 +0000",
|
||
"guid": "https://paper.seebug.org/3233/",
|
||
"category": "404专栏"
|
||
}
|
||
] |