122 lines
9.7 KiB
JSON
122 lines
9.7 KiB
JSON
[
|
||
{
|
||
"title": "AI 作为新型黑客:开发进攻性安全代理\n",
|
||
"link": "https://paper.seebug.org/3253/",
|
||
"description": "作者:Leroy Jacob Valencia\n译者:知道创宇404实验室翻译组\n原文链接:https://arxiv.org/pdf/2406.07561\n摘要\n在网络安全这一宏大领域内,由防御性措施向主动防御的转变对于守护数字基础设施的安全至关重要。本文深入探讨了AI在主动防御网络安全中的角色,尤其是通过研发一个名为ReaperAI的独立AI代理,该代理被设计来模拟和实施网络攻击。借助于...\n",
|
||
"pubDate": "Fri, 13 Dec 2024 07:50:00 +0000",
|
||
"guid": "https://paper.seebug.org/3253/",
|
||
"category": "AI安全"
|
||
},
|
||
{
|
||
"title": "Qwen2.5-Coder 技术报告\n",
|
||
"link": "https://paper.seebug.org/3252/",
|
||
"description": "公众号:简单的机器学习\n原文链接:https://mp.weixin.qq.com/s/EiV7x403sVqVcABo_qd2kg\n引言\nQwen2.5-Coder 系列是阿里巴巴团队推出的一款重要的代码生成模型,相比其前代 CodeQwen1.5,该系列在多个方面进行了显著的升级。Qwen2.5-Coder 系列包括两个模型:Qwen2.5-Coder-1.5B 和 Qwen2.5-Co...\n",
|
||
"pubDate": "Wed, 11 Dec 2024 16:46:00 +0000",
|
||
"guid": "https://paper.seebug.org/3252/",
|
||
"category": "经验心得"
|
||
},
|
||
{
|
||
"title": "Qwen2 源码阅读——核心代码跟读\n",
|
||
"link": "https://paper.seebug.org/3251/",
|
||
"description": "公众号:简单的机器学习\n原文链接:https://mp.weixin.qq.com/s/PVSPNfv0I8_cxgPTmOes5w\n我们继续使用上一节使用的样例文本:\n["你好啊", "简单的机器学习是为了让机器学习变得更简单而存在的"]\n\n\n这个样例产生的tokens结果为:\n{'input_ids': tensor([[108386, 10392...\n",
|
||
"pubDate": "Wed, 11 Dec 2024 16:45:00 +0000",
|
||
"guid": "https://paper.seebug.org/3251/",
|
||
"category": "经验心得"
|
||
},
|
||
{
|
||
"title": "Qwen2 源码阅读——环境准备和说明\n",
|
||
"link": "https://paper.seebug.org/3250/",
|
||
"description": "公众号:简单的机器学习\n原文链接:https://mp.weixin.qq.com/s/kxrc50ZumITVaTE1wtinlg\n下面的源码内容来自transformers代码库中:transformers-4.45.2/src/transformers/models/qwen2/modeling_qwen2.py。\n实验准备\n首先我们下载一些Qwen2需要的配置数据。下载地址:http...\n",
|
||
"pubDate": "Wed, 11 Dec 2024 16:24:00 +0000",
|
||
"guid": "https://paper.seebug.org/3250/",
|
||
"category": "经验心得"
|
||
},
|
||
{
|
||
"title": "揭秘暗黑系网络服务运营商——防弹主机网络\n",
|
||
"link": "https://paper.seebug.org/3248/",
|
||
"description": "作者:知道创宇404实验室\n日期:2024年12月9日\nEnglish version: https://paper.seebug.org/3249/\n一.摘要\n防弹主机(Bulletproof hosting)托管服务为网络犯罪活动提供基础设施,允许犯罪分子规避法律约束,经常被用于恶意软件、黑客攻击、欺诈网站、垃圾邮件等。防弹主机网络,堪称暗黑系网络服务运营商,是专为网络犯罪活动提供恶意基...\n",
|
||
"pubDate": "Wed, 11 Dec 2024 08:06:00 +0000",
|
||
"guid": "https://paper.seebug.org/3248/",
|
||
"category": "专题报告"
|
||
},
|
||
{
|
||
"title": "Unveiling Dark Internet Service Providers: Bulletproof Hosting\n",
|
||
"link": "https://paper.seebug.org/3249/",
|
||
"description": "Author: Knownsec 404 team\nDate: Dec 9, 2024\n中文版:https://paper.seebug.org/3248/\n1. Abstract\nBulletproof hosting services provide the infrastructure for cybercriminal activities, enabling criminals t...\n",
|
||
"pubDate": "Mon, 09 Dec 2024 04:14:00 +0000",
|
||
"guid": "https://paper.seebug.org/3249/",
|
||
"category": "404 English Paper"
|
||
},
|
||
{
|
||
"title": "基于 InternLM 和 LangChain 搭建私人知识库\n",
|
||
"link": "https://paper.seebug.org/3247/",
|
||
"description": "作者:Jinzhong Xu\n原文链接:https://xujinzh.github.io/2024/01/08/ai-Interlm-langchain-RAG/index.html\n本篇介绍基于 InternLM 和 LangChain 搭建私人知识库。\npython!conda create --name internlm_langchain --clone=/root/share/c...\n",
|
||
"pubDate": "Thu, 05 Dec 2024 11:34:00 +0000",
|
||
"guid": "https://paper.seebug.org/3247/",
|
||
"category": "AI安全"
|
||
},
|
||
{
|
||
"title": "书生·浦语大模型使用\n",
|
||
"link": "https://paper.seebug.org/3246/",
|
||
"description": "作者:Jinzhong Xu\n原文链接:https://xujinzh.github.io/2024/01/06/ai-internlm-useage/\n本篇介绍书生·浦语大模型的使用,包括智能对话、智能体工具调用和图文理解创作等。\n环境配置\npython!conda create --name internlm-chat --clone=/root/share/conda_envs/int...\n",
|
||
"pubDate": "Thu, 05 Dec 2024 10:27:00 +0000",
|
||
"guid": "https://paper.seebug.org/3246/",
|
||
"category": "AI安全"
|
||
},
|
||
{
|
||
"title": "Uncontrolled PCDN: Observation and Case Analysis of the Current State of PCDN Technology\n",
|
||
"link": "https://paper.seebug.org/3245/",
|
||
"description": "Author: Knownsec 404 Active Defense Team\nDate: November 22, 2024\n中文版:https://paper.seebug.org/3242\nBackground Introduction\nIn October 2024, Knownsec 404 Active Defense Team detected abnormal traffi...\n",
|
||
"pubDate": "Mon, 02 Dec 2024 06:13:00 +0000",
|
||
"guid": "https://paper.seebug.org/3245/",
|
||
"category": "情报分析"
|
||
},
|
||
{
|
||
"title": "Android 恶意软件混淆与对抗技术专题\n",
|
||
"link": "https://paper.seebug.org/3244/",
|
||
"description": "作者:启明星辰ADLab\n原文链接:https://mp.weixin.qq.com/s/LIAkPLZ_vVOUGjFymdEH-w\n第一章 概 述\n近年来,Android恶意软件数量不断攀升,其采用的攻击和对抗技术也变得越来越复杂。为了对抗安全分析,绕过安全检测,窃取敏感数据或破坏系统安全,恶意软件利用各种对抗技术来伪装和隐藏其恶意行为和代码逻辑。这些对抗技术中,针对资源、文件、字节码指...\n",
|
||
"pubDate": "Wed, 27 Nov 2024 08:10:00 +0000",
|
||
"guid": "https://paper.seebug.org/3244/",
|
||
"category": "移动安全"
|
||
},
|
||
{
|
||
"title": "Prompt 越狱手册\n",
|
||
"link": "https://paper.seebug.org/3243/",
|
||
"description": "作者:洺熙\n本文为作者投稿,Seebug Paper 期待你的分享,凡经采用即有礼品相送! 投稿邮箱:paper@seebug.org\n以下皆为作者洺熙个人观点或洺熙认同的看法,本文一切也只用于技术交流,切勿用于不法目的,一切纷争与作者本人无关\n由于书写本文的时候是从0到1开始写的,所以根据受益人群的不同,可以自行选择对应目录进行观看,同步开源至:https://github.com/Acm...\n",
|
||
"pubDate": "Wed, 27 Nov 2024 03:32:00 +0000",
|
||
"guid": "https://paper.seebug.org/3243/",
|
||
"category": "AI安全"
|
||
},
|
||
{
|
||
"title": "失控的PCDN:观察PCDN技术现状与案例分析\n",
|
||
"link": "https://paper.seebug.org/3242/",
|
||
"description": "作者:知道创宇404积极防御实验室\n日期:2024年11月22日\nEnglish Version: https://paper.seebug.org/3245/\n背景介绍\n2024年10月,知道创宇404积极防御实验室监测到某客户网站流量异常,疑似遭到CC攻击。经过分析,本次CC攻击疑似为PCDN厂商为了平衡上下行流量对客户网站视频文件进行的盗刷流量行为。\n在调查分析的过程中,我们发现PCD...\n",
|
||
"pubDate": "Fri, 22 Nov 2024 12:38:00 +0000",
|
||
"guid": "https://paper.seebug.org/3242/",
|
||
"category": "情报分析"
|
||
},
|
||
{
|
||
"title": "APT-K-47 武器披露之 Asyncshell 的前世今生\n",
|
||
"link": "https://paper.seebug.org/3240/",
|
||
"description": "作者:知道创宇404高级威胁情报团队\n日期:2024年11月22日\nEnglish version: https://paper.seebug.org/3241/\n1. 事件背景\n近期,知道创宇404高级威胁情报团队在日常跟踪APT过程中发现了APT-K-47组织利用“朝觐”话题发起的攻击活动,攻击者利用CHM文件执行相同目录下的恶意载荷。最终载荷功能比较简单,仅支持cmd shell,且使...\n",
|
||
"pubDate": "Fri, 22 Nov 2024 05:22:00 +0000",
|
||
"guid": "https://paper.seebug.org/3240/",
|
||
"category": "威胁情报"
|
||
},
|
||
{
|
||
"title": "Unveiling the Past and Present of APT-K-47 Weapon: Asyncshell\n",
|
||
"link": "https://paper.seebug.org/3241/",
|
||
"description": "Author:Knownsec 404 Advanced Threat Intelligence team\ndate:November 22, 2024\n中文版:https://paper.seebug.org/3240\n1. Background of the incident\nRecently, in the course of daily APT tracking,the Knowns...\n",
|
||
"pubDate": "Fri, 22 Nov 2024 05:10:00 +0000",
|
||
"guid": "https://paper.seebug.org/3241/",
|
||
"category": "威胁情报"
|
||
},
|
||
{
|
||
"title": "使用 ZoomEye 增强新语法拓线 LockBit 3.0 勒索软件联盟基础设施\n",
|
||
"link": "https://paper.seebug.org/3238/",
|
||
"description": "作者:知道创宇404实验室\n日期:2024年11月21日\nEnglish version: https://paper.seebug.org/3239/\n一.摘要\nLockBit 3.0 是一种知名的勒索软件,由网络犯罪组织通过“勒索软件即服务”(RaaS)模式运作。LockBit 3.0勒索软件联盟是使用该恶意软件进行攻击的独立黑客,他们以分成方式合作。这些成员利用 LockBit 提供的...\n",
|
||
"pubDate": "Thu, 21 Nov 2024 02:19:00 +0000",
|
||
"guid": "https://paper.seebug.org/3238/",
|
||
"category": "专题报告"
|
||
}
|
||
] |