1002 lines
35 KiB
JSON
1002 lines
35 KiB
JSON
[
|
||
{
|
||
"title": "S8强网杯Final-thinkshopplus",
|
||
"link": "https://xz.aliyun.com/t/16581",
|
||
"published": "2024-12-06T19:01:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16581",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "S8强网杯Final-thinkshopplus"
|
||
}
|
||
},
|
||
{
|
||
"title": "伪装成ToDesk安装程序加载后门盗取数字货币",
|
||
"link": "https://xz.aliyun.com/t/16552",
|
||
"published": "2024-12-04T20:00:59+08:00",
|
||
"id": "https://xz.aliyun.com/t/16552",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "伪装成ToDesk安装程序加载后门盗取数字货币"
|
||
}
|
||
},
|
||
{
|
||
"title": "Android逆向实战——以某APP跳过广告为例",
|
||
"link": "https://xz.aliyun.com/t/16550",
|
||
"published": "2024-12-04T17:38:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16550",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Android逆向实战——以某APP跳过广告为例"
|
||
}
|
||
},
|
||
{
|
||
"title": "webpwn的一些总结",
|
||
"link": "https://xz.aliyun.com/t/16549",
|
||
"published": "2024-12-04T17:20:50+08:00",
|
||
"id": "https://xz.aliyun.com/t/16549",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "webpwn的一些总结"
|
||
}
|
||
},
|
||
{
|
||
"title": "Fastjson反序列化漏洞深度解析与利用和修复",
|
||
"link": "https://xz.aliyun.com/t/16547",
|
||
"published": "2024-12-04T15:18:05+08:00",
|
||
"id": "https://xz.aliyun.com/t/16547",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Fastjson反序列化漏洞深度解析与利用和修复"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024金盾信安杯线上题目wp",
|
||
"link": "https://xz.aliyun.com/t/16546",
|
||
"published": "2024-12-04T15:08:41+08:00",
|
||
"id": "https://xz.aliyun.com/t/16546",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024金盾信安杯线上题目wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "高版本Fastjson反序列化Xtring新链和EventListenerList绕过",
|
||
"link": "https://xz.aliyun.com/t/16540",
|
||
"published": "2024-12-04T13:59:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16540",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "高版本Fastjson反序列化Xtring新链和EventListenerList绕过"
|
||
}
|
||
},
|
||
{
|
||
"title": "域渗透入门靶机之HTB-Cicada",
|
||
"link": "https://xz.aliyun.com/t/16539",
|
||
"published": "2024-12-04T13:10:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16539",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "域渗透入门靶机之HTB-Cicada"
|
||
}
|
||
},
|
||
{
|
||
"title": "java加载动态链接库绕过一些限制的思考",
|
||
"link": "https://xz.aliyun.com/t/16538",
|
||
"published": "2024-12-04T11:12:08+08:00",
|
||
"id": "https://xz.aliyun.com/t/16538",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "java加载动态链接库绕过一些限制的思考"
|
||
}
|
||
},
|
||
{
|
||
"title": "从零构建:我的漏洞扫描器之旅",
|
||
"link": "https://xz.aliyun.com/t/16537",
|
||
"published": "2024-12-04T10:38:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16537",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从零构建:我的漏洞扫描器之旅"
|
||
}
|
||
},
|
||
{
|
||
"title": "CS代码审计配合Jdbc反序列化漏洞的利用",
|
||
"link": "https://xz.aliyun.com/t/16536",
|
||
"published": "2024-12-03T23:58:20+08:00",
|
||
"id": "https://xz.aliyun.com/t/16536",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CS代码审计配合Jdbc反序列化漏洞的利用"
|
||
}
|
||
},
|
||
{
|
||
"title": "从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复",
|
||
"link": "https://xz.aliyun.com/t/16535",
|
||
"published": "2024-12-03T23:57:40+08:00",
|
||
"id": "https://xz.aliyun.com/t/16535",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从案例中学习 IoT 固件仿真——D-Link DIR-605L(FW_113) 运行环境修复"
|
||
}
|
||
},
|
||
{
|
||
"title": "某云音乐为例-反调试绕过,栈回溯,web算法逆向",
|
||
"link": "https://xz.aliyun.com/t/16534",
|
||
"published": "2024-12-03T23:50:24+08:00",
|
||
"id": "https://xz.aliyun.com/t/16534",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某云音乐为例-反调试绕过,栈回溯,web算法逆向"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024睿抗网络安全初赛0解题——nopassword详解",
|
||
"link": "https://xz.aliyun.com/t/16533",
|
||
"published": "2024-12-03T22:29:02+08:00",
|
||
"id": "https://xz.aliyun.com/t/16533",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024睿抗网络安全初赛0解题——nopassword详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "某省移动网络安全技能竞赛决赛 个人赛第一名wp",
|
||
"link": "https://xz.aliyun.com/t/16532",
|
||
"published": "2024-12-03T21:45:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16532",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某省移动网络安全技能竞赛决赛 个人赛第一名wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "Apache NiFi 高版本命令执行利用",
|
||
"link": "https://xz.aliyun.com/t/16531",
|
||
"published": "2024-12-03T20:44:14+08:00",
|
||
"id": "https://xz.aliyun.com/t/16531",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Apache NiFi 高版本命令执行利用"
|
||
}
|
||
},
|
||
{
|
||
"title": "WuCup 第一届“吾杯”网络安全技能大赛 WriteUp",
|
||
"link": "https://xz.aliyun.com/t/16529",
|
||
"published": "2024-12-03T17:34:27+08:00",
|
||
"id": "https://xz.aliyun.com/t/16529",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "WuCup 第一届“吾杯”网络安全技能大赛 WriteUp"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次Go SSTI打SSRF到任意文件读",
|
||
"link": "https://xz.aliyun.com/t/16527",
|
||
"published": "2024-12-03T16:52:38+08:00",
|
||
"id": "https://xz.aliyun.com/t/16527",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次Go SSTI打SSRF到任意文件读"
|
||
}
|
||
},
|
||
{
|
||
"title": "极客大挑战 web week3&week4",
|
||
"link": "https://xz.aliyun.com/t/16526",
|
||
"published": "2024-12-03T16:48:02+08:00",
|
||
"id": "https://xz.aliyun.com/t/16526",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "极客大挑战 web week3&week4"
|
||
}
|
||
},
|
||
{
|
||
"title": "jeepay v2.4.0反射型xss+存储型xss分析",
|
||
"link": "https://xz.aliyun.com/t/16524",
|
||
"published": "2024-12-03T15:40:58+08:00",
|
||
"id": "https://xz.aliyun.com/t/16524",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "jeepay v2.4.0反射型xss+存储型xss分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "JDBC Attack漫谈",
|
||
"link": "https://xz.aliyun.com/t/16523",
|
||
"published": "2024-12-03T14:51:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16523",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "JDBC Attack漫谈"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024鹏城杯线下赛复现",
|
||
"link": "https://xz.aliyun.com/t/16522",
|
||
"published": "2024-12-03T14:42:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16522",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024鹏城杯线下赛复现"
|
||
}
|
||
},
|
||
{
|
||
"title": "MemoryModule的远程反射dll加载与一些没有实现的想法",
|
||
"link": "https://xz.aliyun.com/t/16521",
|
||
"published": "2024-12-03T11:58:34+08:00",
|
||
"id": "https://xz.aliyun.com/t/16521",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "MemoryModule的远程反射dll加载与一些没有实现的想法"
|
||
}
|
||
},
|
||
{
|
||
"title": "禅道18.x-20.x版本漏洞挖掘思路分析",
|
||
"link": "https://xz.aliyun.com/t/16520",
|
||
"published": "2024-12-03T11:29:24+08:00",
|
||
"id": "https://xz.aliyun.com/t/16520",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "禅道18.x-20.x版本漏洞挖掘思路分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "THM靶场-Lookup-通关WriteUp",
|
||
"link": "https://xz.aliyun.com/t/16517",
|
||
"published": "2024-12-03T00:58:39+08:00",
|
||
"id": "https://xz.aliyun.com/t/16517",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "THM靶场-Lookup-通关WriteUp"
|
||
}
|
||
},
|
||
{
|
||
"title": "哥斯拉源码解读+如何绕过waf检测",
|
||
"link": "https://xz.aliyun.com/t/16515",
|
||
"published": "2024-12-02T22:23:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16515",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "哥斯拉源码解读+如何绕过waf检测"
|
||
}
|
||
},
|
||
{
|
||
"title": "反沙盒?一文足以",
|
||
"link": "https://xz.aliyun.com/t/16514",
|
||
"published": "2024-12-02T22:21:58+08:00",
|
||
"id": "https://xz.aliyun.com/t/16514",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "反沙盒?一文足以"
|
||
}
|
||
},
|
||
{
|
||
"title": "unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例",
|
||
"link": "https://xz.aliyun.com/t/16513",
|
||
"published": "2024-12-02T21:16:53+08:00",
|
||
"id": "https://xz.aliyun.com/t/16513",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "unicorn模拟执行在逆向中的妙用-以2024古剑山India Pale Ale为例"
|
||
}
|
||
},
|
||
{
|
||
"title": "IoT 安全从零到掌握:超详尽入门指南(实战篇)",
|
||
"link": "https://xz.aliyun.com/t/16511",
|
||
"published": "2024-12-02T20:23:35+08:00",
|
||
"id": "https://xz.aliyun.com/t/16511",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "IoT 安全从零到掌握:超详尽入门指南(实战篇)"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次溯源真实案例",
|
||
"link": "https://xz.aliyun.com/t/16510",
|
||
"published": "2024-12-02T19:29:36+08:00",
|
||
"id": "https://xz.aliyun.com/t/16510",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次溯源真实案例"
|
||
}
|
||
},
|
||
{
|
||
"title": "IoT 安全从零到掌握:超详尽入门指南(基础篇)",
|
||
"link": "https://xz.aliyun.com/t/16512",
|
||
"published": "2024-12-02T18:17:18+08:00",
|
||
"id": "https://xz.aliyun.com/t/16512",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "IoT 安全从零到掌握:超详尽入门指南(基础篇)"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 武数杯 RHG",
|
||
"link": "https://xz.aliyun.com/t/16475",
|
||
"published": "2024-12-02T16:17:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16475",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 武数杯 RHG"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024年第一届吾杯解题writeup",
|
||
"link": "https://xz.aliyun.com/t/16503",
|
||
"published": "2024-12-01T23:40:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16503",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024年第一届吾杯解题writeup"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次RAT的感染过程详细分析",
|
||
"link": "https://xz.aliyun.com/t/16502",
|
||
"published": "2024-12-01T23:10:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16502",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次RAT的感染过程详细分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024古剑山初赛WP",
|
||
"link": "https://xz.aliyun.com/t/16501",
|
||
"published": "2024-12-01T20:34:07+08:00",
|
||
"id": "https://xz.aliyun.com/t/16501",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024古剑山初赛WP"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024吾杯网络安全技能大赛ctf-web方向",
|
||
"link": "https://xz.aliyun.com/t/16500",
|
||
"published": "2024-12-01T19:49:39+08:00",
|
||
"id": "https://xz.aliyun.com/t/16500",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024吾杯网络安全技能大赛ctf-web方向"
|
||
}
|
||
},
|
||
{
|
||
"title": "记某次金融小程序数据加密及签名逆向",
|
||
"link": "https://xz.aliyun.com/t/16497",
|
||
"published": "2024-12-01T17:20:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16497",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记某次金融小程序数据加密及签名逆向"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024网鼎杯初赛和半决赛部分题解---PWN",
|
||
"link": "https://xz.aliyun.com/t/16495",
|
||
"published": "2024-12-01T16:43:53+08:00",
|
||
"id": "https://xz.aliyun.com/t/16495",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024网鼎杯初赛和半决赛部分题解---PWN"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 强网拟态决赛web 部分wp",
|
||
"link": "https://xz.aliyun.com/t/16489",
|
||
"published": "2024-12-01T14:49:39+08:00",
|
||
"id": "https://xz.aliyun.com/t/16489",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 强网拟态决赛web 部分wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "动态逃逸杀软的艺术",
|
||
"link": "https://xz.aliyun.com/t/16486",
|
||
"published": "2024-12-01T10:12:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16486",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "动态逃逸杀软的艺术"
|
||
}
|
||
},
|
||
{
|
||
"title": "样本分析-DarkComet远控木马",
|
||
"link": "https://xz.aliyun.com/t/16485",
|
||
"published": "2024-11-30T23:44:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16485",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "样本分析-DarkComet远控木马"
|
||
}
|
||
},
|
||
{
|
||
"title": "某省移动竞赛决赛个人赛 部分wp",
|
||
"link": "https://xz.aliyun.com/t/16484",
|
||
"published": "2024-11-30T23:13:25+08:00",
|
||
"id": "https://xz.aliyun.com/t/16484",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某省移动竞赛决赛个人赛 部分wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠",
|
||
"link": "https://xz.aliyun.com/t/16483",
|
||
"published": "2024-11-30T21:33:34+08:00",
|
||
"id": "https://xz.aliyun.com/t/16483",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "NtUserInjectKeyboardInput函数绕过杀软屏幕锁定模拟键鼠"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024“中华武数杯” 全国网络攻防精英赛",
|
||
"link": "https://xz.aliyun.com/t/16482",
|
||
"published": "2024-11-30T19:10:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16482",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024“中华武数杯” 全国网络攻防精英赛"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto",
|
||
"link": "https://xz.aliyun.com/t/16480",
|
||
"published": "2024-11-30T18:55:48+08:00",
|
||
"id": "https://xz.aliyun.com/t/16480",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024河南省第六届“金盾信安杯”网络与数据安全大赛 线上挑战赛re&misc&crypto"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 金盾杯 wp",
|
||
"link": "https://xz.aliyun.com/t/16478",
|
||
"published": "2024-11-30T18:13:31+08:00",
|
||
"id": "https://xz.aliyun.com/t/16478",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 金盾杯 wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024古剑山Pwn方向全部题解",
|
||
"link": "https://xz.aliyun.com/t/16474",
|
||
"published": "2024-11-30T15:48:05+08:00",
|
||
"id": "https://xz.aliyun.com/t/16474",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024古剑山Pwn方向全部题解"
|
||
}
|
||
},
|
||
{
|
||
"title": "江苏移动“建材赋能”线下个人决赛crypto三道0解题",
|
||
"link": "https://xz.aliyun.com/t/16473",
|
||
"published": "2024-11-30T14:12:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16473",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "江苏移动“建材赋能”线下个人决赛crypto三道0解题"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024古剑山 pwn 详解",
|
||
"link": "https://xz.aliyun.com/t/16471",
|
||
"published": "2024-11-30T13:52:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16471",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024古剑山 pwn 详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "提示词注入攻击",
|
||
"link": "https://xz.aliyun.com/t/16470",
|
||
"published": "2024-11-30T13:42:51+08:00",
|
||
"id": "https://xz.aliyun.com/t/16470",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "提示词注入攻击"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 古剑山web&pwn&re&misc wp",
|
||
"link": "https://xz.aliyun.com/t/16469",
|
||
"published": "2024-11-30T13:06:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16469",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 古剑山web&pwn&re&misc wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "codeql实战练习-micro_service_seclab",
|
||
"link": "https://xz.aliyun.com/t/16468",
|
||
"published": "2024-11-30T12:31:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16468",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "codeql实战练习-micro_service_seclab"
|
||
}
|
||
},
|
||
{
|
||
"title": "某某热点app登录sign值逆向分析",
|
||
"link": "https://xz.aliyun.com/t/16466",
|
||
"published": "2024-11-30T11:09:28+08:00",
|
||
"id": "https://xz.aliyun.com/t/16466",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某某热点app登录sign值逆向分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "样本分析 基于 rust 的恶意软件 SSLoad",
|
||
"link": "https://xz.aliyun.com/t/16465",
|
||
"published": "2024-11-30T02:54:12+08:00",
|
||
"id": "https://xz.aliyun.com/t/16465",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "样本分析 基于 rust 的恶意软件 SSLoad"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(一)",
|
||
"link": "https://xz.aliyun.com/t/16464",
|
||
"published": "2024-11-30T01:03:18+08:00",
|
||
"id": "https://xz.aliyun.com/t/16464",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于JavaSecLab 一款综合Java漏洞平台的学习思考(一)"
|
||
}
|
||
},
|
||
{
|
||
"title": "某web应用远程代码执行漏洞-反序列化分析",
|
||
"link": "https://xz.aliyun.com/t/16463",
|
||
"published": "2024-11-30T00:14:34+08:00",
|
||
"id": "https://xz.aliyun.com/t/16463",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某web应用远程代码执行漏洞-反序列化分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "SpringMVC的URI解析和权限绕过",
|
||
"link": "https://xz.aliyun.com/t/16462",
|
||
"published": "2024-11-29T21:48:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16462",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "SpringMVC的URI解析和权限绕过"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于深度学习(TextCNN&XGBoost stacking融合)对恶意软件的检测算法设计与实现",
|
||
"link": "https://xz.aliyun.com/t/16461",
|
||
"published": "2024-11-29T21:02:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16461",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于深度学习(TextCNN&XGBoost stacking融合)对恶意软件的检测算法设计与实现"
|
||
}
|
||
},
|
||
{
|
||
"title": "银狐黑产最新加载器利用破解版VPN为诱饵进行传播",
|
||
"link": "https://xz.aliyun.com/t/16459",
|
||
"published": "2024-11-29T19:51:21+08:00",
|
||
"id": "https://xz.aliyun.com/t/16459",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "银狐黑产最新加载器利用破解版VPN为诱饵进行传播"
|
||
}
|
||
},
|
||
{
|
||
"title": "\"多引擎\"的资产识别、信息收集工具",
|
||
"link": "https://xz.aliyun.com/t/16450",
|
||
"published": "2024-11-29T09:52:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16450",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "\"多引擎\"的资产识别、信息收集工具"
|
||
}
|
||
},
|
||
{
|
||
"title": "Discuz!x——3.5版本漏洞复现&代码审计",
|
||
"link": "https://xz.aliyun.com/t/16445",
|
||
"published": "2024-11-28T21:55:27+08:00",
|
||
"id": "https://xz.aliyun.com/t/16445",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Discuz!x——3.5版本漏洞复现&代码审计"
|
||
}
|
||
},
|
||
{
|
||
"title": "堆学习之Tcache Stashing Unlink Attacke",
|
||
"link": "https://xz.aliyun.com/t/16444",
|
||
"published": "2024-11-28T21:45:49+08:00",
|
||
"id": "https://xz.aliyun.com/t/16444",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "堆学习之Tcache Stashing Unlink Attacke"
|
||
}
|
||
},
|
||
{
|
||
"title": "脱离C2的自动路由,实战中如何将4以上层内网的穿透,4dnat+新版frp+proxifier使用",
|
||
"link": "https://xz.aliyun.com/t/16443",
|
||
"published": "2024-11-28T20:01:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16443",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "脱离C2的自动路由,实战中如何将4以上层内网的穿透,4dnat+新版frp+proxifier使用"
|
||
}
|
||
},
|
||
{
|
||
"title": "Ubuntu needrestart权限提升漏洞(CVE-2024-48990)漏洞分析",
|
||
"link": "https://xz.aliyun.com/t/16442",
|
||
"published": "2024-11-28T18:19:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16442",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Ubuntu needrestart权限提升漏洞(CVE-2024-48990)漏洞分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "大模型多轮越狱技术分析与实现",
|
||
"link": "https://xz.aliyun.com/t/16441",
|
||
"published": "2024-11-28T17:22:22+08:00",
|
||
"id": "https://xz.aliyun.com/t/16441",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "大模型多轮越狱技术分析与实现"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024NewStarCTF Week5 Pwn方向复现",
|
||
"link": "https://xz.aliyun.com/t/16439",
|
||
"published": "2024-11-28T16:51:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16439",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024NewStarCTF Week5 Pwn方向复现"
|
||
}
|
||
},
|
||
{
|
||
"title": "CVE-2024-22399 - SwingLazyValue利用链构造分析",
|
||
"link": "https://xz.aliyun.com/t/16436",
|
||
"published": "2024-11-28T14:53:03+08:00",
|
||
"id": "https://xz.aliyun.com/t/16436",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "CVE-2024-22399 - SwingLazyValue利用链构造分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "第七届浙江省大学生网络与信息安全竞赛决赛 Misc方向全解",
|
||
"link": "https://xz.aliyun.com/t/16435",
|
||
"published": "2024-11-28T14:51:55+08:00",
|
||
"id": "https://xz.aliyun.com/t/16435",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第七届浙江省大学生网络与信息安全竞赛决赛 Misc方向全解"
|
||
}
|
||
},
|
||
{
|
||
"title": "网鼎杯玄武 crypto 0:解析变形的 Shamir 密钥分享机制",
|
||
"link": "https://xz.aliyun.com/t/16433",
|
||
"published": "2024-11-28T13:53:57+08:00",
|
||
"id": "https://xz.aliyun.com/t/16433",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "网鼎杯玄武 crypto 0:解析变形的 Shamir 密钥分享机制"
|
||
}
|
||
},
|
||
{
|
||
"title": "记一次SSTI长度限制绕过",
|
||
"link": "https://xz.aliyun.com/t/16432",
|
||
"published": "2024-11-28T11:50:02+08:00",
|
||
"id": "https://xz.aliyun.com/t/16432",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "记一次SSTI长度限制绕过"
|
||
}
|
||
},
|
||
{
|
||
"title": "windows注入 r3级强制结束进程",
|
||
"link": "https://xz.aliyun.com/t/16427",
|
||
"published": "2024-11-27T23:46:31+08:00",
|
||
"id": "https://xz.aliyun.com/t/16427",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "windows注入 r3级强制结束进程"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024网鼎杯 crypto(青龙朱雀白虎) wp",
|
||
"link": "https://xz.aliyun.com/t/16426",
|
||
"published": "2024-11-27T21:27:21+08:00",
|
||
"id": "https://xz.aliyun.com/t/16426",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024网鼎杯 crypto(青龙朱雀白虎) wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "基于realloc函数的堆攻击",
|
||
"link": "https://xz.aliyun.com/t/16424",
|
||
"published": "2024-11-27T21:02:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16424",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "基于realloc函数的堆攻击"
|
||
}
|
||
},
|
||
{
|
||
"title": "Java反序列化攻击链:深入剖析与实战",
|
||
"link": "https://xz.aliyun.com/t/16423",
|
||
"published": "2024-11-27T20:14:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16423",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Java反序列化攻击链:深入剖析与实战"
|
||
}
|
||
},
|
||
{
|
||
"title": "从DAS暑期挑战赛的一道题来理解largebinattack的攻击流程",
|
||
"link": "https://xz.aliyun.com/t/16422",
|
||
"published": "2024-11-27T18:27:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16422",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "从DAS暑期挑战赛的一道题来理解largebinattack的攻击流程"
|
||
}
|
||
},
|
||
{
|
||
"title": "验证码攻防问题总结分享",
|
||
"link": "https://xz.aliyun.com/t/16421",
|
||
"published": "2024-11-27T17:17:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16421",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "验证码攻防问题总结分享"
|
||
}
|
||
},
|
||
{
|
||
"title": "Newstar Week5 WEB详细解析全",
|
||
"link": "https://xz.aliyun.com/t/16419",
|
||
"published": "2024-11-27T15:11:46+08:00",
|
||
"id": "https://xz.aliyun.com/t/16419",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Newstar Week5 WEB详细解析全"
|
||
}
|
||
},
|
||
{
|
||
"title": "ecology checkPassword 代码执行",
|
||
"link": "https://xz.aliyun.com/t/16418",
|
||
"published": "2024-11-27T14:37:03+08:00",
|
||
"id": "https://xz.aliyun.com/t/16418",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "ecology checkPassword 代码执行"
|
||
}
|
||
},
|
||
{
|
||
"title": "JAVA安全之JMX攻防研究分析",
|
||
"link": "https://xz.aliyun.com/t/16417",
|
||
"published": "2024-11-27T14:21:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16417",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "JAVA安全之JMX攻防研究分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024 强网杯qroute详细解析",
|
||
"link": "https://xz.aliyun.com/t/16416",
|
||
"published": "2024-11-27T12:38:51+08:00",
|
||
"id": "https://xz.aliyun.com/t/16416",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024 强网杯qroute详细解析"
|
||
}
|
||
},
|
||
{
|
||
"title": "第八届强网杯青少年专项赛线上选拔赛ctf题解",
|
||
"link": "https://xz.aliyun.com/t/16414",
|
||
"published": "2024-11-27T11:36:27+08:00",
|
||
"id": "https://xz.aliyun.com/t/16414",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第八届强网杯青少年专项赛线上选拔赛ctf题解"
|
||
}
|
||
},
|
||
{
|
||
"title": "调用网页JS解决前端加密",
|
||
"link": "https://xz.aliyun.com/t/16413",
|
||
"published": "2024-11-27T10:22:44+08:00",
|
||
"id": "https://xz.aliyun.com/t/16413",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "调用网页JS解决前端加密"
|
||
}
|
||
},
|
||
{
|
||
"title": "go的栈溢出详细解析",
|
||
"link": "https://xz.aliyun.com/t/16411",
|
||
"published": "2024-11-27T00:26:47+08:00",
|
||
"id": "https://xz.aliyun.com/t/16411",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "go的栈溢出详细解析"
|
||
}
|
||
},
|
||
{
|
||
"title": "pwn堆利用之unlink",
|
||
"link": "https://xz.aliyun.com/t/16409",
|
||
"published": "2024-11-26T22:41:40+08:00",
|
||
"id": "https://xz.aliyun.com/t/16409",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "pwn堆利用之unlink"
|
||
}
|
||
},
|
||
{
|
||
"title": "第二届龙信杯服务器取证复现",
|
||
"link": "https://xz.aliyun.com/t/16408",
|
||
"published": "2024-11-26T20:38:10+08:00",
|
||
"id": "https://xz.aliyun.com/t/16408",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第二届龙信杯服务器取证复现"
|
||
}
|
||
},
|
||
{
|
||
"title": "条件竞争glibc堆的详细讲解",
|
||
"link": "https://xz.aliyun.com/t/16498",
|
||
"published": "2024-11-26T18:24:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16498",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "条件竞争glibc堆的详细讲解"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024网鼎杯半决card_master详细分析",
|
||
"link": "https://xz.aliyun.com/t/16406",
|
||
"published": "2024-11-26T18:04:17+08:00",
|
||
"id": "https://xz.aliyun.com/t/16406",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024网鼎杯半决card_master详细分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "Apache HertzBeat 漏洞复现三则",
|
||
"link": "https://xz.aliyun.com/t/16404",
|
||
"published": "2024-11-26T16:22:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16404",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Apache HertzBeat 漏洞复现三则"
|
||
}
|
||
},
|
||
{
|
||
"title": "Sharp4CompilerLoader:通过动态编译混淆代码执行Shellcode",
|
||
"link": "https://xz.aliyun.com/t/16401",
|
||
"published": "2024-11-26T14:39:11+08:00",
|
||
"id": "https://xz.aliyun.com/t/16401",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Sharp4CompilerLoader:通过动态编译混淆代码执行Shellcode"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024网鼎杯半决赛RE全题解",
|
||
"link": "https://xz.aliyun.com/t/16400",
|
||
"published": "2024-11-26T13:53:43+08:00",
|
||
"id": "https://xz.aliyun.com/t/16400",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024网鼎杯半决赛RE全题解"
|
||
}
|
||
},
|
||
{
|
||
"title": "IOT安全的入门经典——DIR-815漏洞复现",
|
||
"link": "https://xz.aliyun.com/t/16399",
|
||
"published": "2024-11-26T10:04:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16399",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "IOT安全的入门经典——DIR-815漏洞复现"
|
||
}
|
||
},
|
||
{
|
||
"title": "强网青少年二进制和杂项wp",
|
||
"link": "https://xz.aliyun.com/t/16398",
|
||
"published": "2024-11-26T02:29:47+08:00",
|
||
"id": "https://xz.aliyun.com/t/16398",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "强网青少年二进制和杂项wp"
|
||
}
|
||
},
|
||
{
|
||
"title": "强网拟态2024白盒资格赛turn详解",
|
||
"link": "https://xz.aliyun.com/t/16397",
|
||
"published": "2024-11-26T00:47:06+08:00",
|
||
"id": "https://xz.aliyun.com/t/16397",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "强网拟态2024白盒资格赛turn详解"
|
||
}
|
||
},
|
||
{
|
||
"title": "对MSC文件再利用实现过父过流量免杀",
|
||
"link": "https://xz.aliyun.com/t/16394",
|
||
"published": "2024-11-25T23:12:52+08:00",
|
||
"id": "https://xz.aliyun.com/t/16394",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "对MSC文件再利用实现过父过流量免杀"
|
||
}
|
||
},
|
||
{
|
||
"title": "Patchwork(白象)APT组织Protego远控木马攻击场景复现",
|
||
"link": "https://xz.aliyun.com/t/16392",
|
||
"published": "2024-11-25T22:38:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16392",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "Patchwork(白象)APT组织Protego远控木马攻击场景复现"
|
||
}
|
||
},
|
||
{
|
||
"title": "游戏漏洞挖掘思路分享",
|
||
"link": "https://xz.aliyun.com/t/16391",
|
||
"published": "2024-11-25T22:37:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16391",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "游戏漏洞挖掘思路分享"
|
||
}
|
||
},
|
||
{
|
||
"title": "glibc内存管理分析",
|
||
"link": "https://xz.aliyun.com/t/16390",
|
||
"published": "2024-11-25T22:15:06+08:00",
|
||
"id": "https://xz.aliyun.com/t/16390",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "glibc内存管理分析"
|
||
}
|
||
},
|
||
{
|
||
"title": "某系统代码审计RCE",
|
||
"link": "https://xz.aliyun.com/t/16389",
|
||
"published": "2024-11-25T21:02:20+08:00",
|
||
"id": "https://xz.aliyun.com/t/16389",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "某系统代码审计RCE"
|
||
}
|
||
},
|
||
{
|
||
"title": "2024网鼎杯半决赛-pwn",
|
||
"link": "https://xz.aliyun.com/t/16386",
|
||
"published": "2024-11-25T19:56:34+08:00",
|
||
"id": "https://xz.aliyun.com/t/16386",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "2024网鼎杯半决赛-pwn"
|
||
}
|
||
},
|
||
{
|
||
"title": "第四届网鼎杯半决赛-安全运营挑战赛加固修复Part学习&分析",
|
||
"link": "https://xz.aliyun.com/t/16385",
|
||
"published": "2024-11-25T18:06:00+08:00",
|
||
"id": "https://xz.aliyun.com/t/16385",
|
||
"summary": {
|
||
"@type": "html",
|
||
"#text": "第四届网鼎杯半决赛-安全运营挑战赛加固修复Part学习&分析"
|
||
}
|
||
}
|
||
] |