72 lines
4.1 KiB
JSON
72 lines
4.1 KiB
JSON
[
|
||
{
|
||
"guid": "https://forum.butian.net/share/4063",
|
||
"title": "2.35版本以下堆沙盒绕过模板总结带例题",
|
||
"description": "总结了2.35版本以下堆沙盒绕过的各种模板,包括2.27,2.29,2.31的原理和模板还有对应例题",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-22 10:00:02"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4062",
|
||
"title": "巧用Chrome-CDP远程调用Debug突破JS逆向",
|
||
"description": "CDP远程调用非常方便,他允许我们直接可以通过代码来操作浏览器完成一系列行为,希望通过我的这篇文章让师傅们对其有一定了解,学习并赋能与我们的渗透测试与安全研究工作之中,提升效率!",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-22 09:00:01"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4060",
|
||
"title": "windows com组件模糊测试入门",
|
||
"description": "windows com组件模糊测试入门\r\n什么是windows com组件\r\ncom全称是Component Object Model,即组件对象模型。按照微软官方的说法,COM 是一个平台无关的、分布式的、面向对象的系统,用于创建可交...",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-21 10:00:02"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4055",
|
||
"title": "实战 | 微信小程序EDUSRC渗透漏洞复盘",
|
||
"description": "这里给师傅们总结下我们在进行漏洞挖掘过程中需要注意的细节,比如我们在看到一个功能点多个数据包的时候,我们需要去挨个分析里面的数据包构造,进而分析数据包的走向,去了解数据包的一个业务逻辑,特别是微信小程序",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-21 08:00:02"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4050",
|
||
"title": "浅谈恶意样本の反沙箱分析",
|
||
"description": "说实话单纯的静态免杀其实不是很难,只要通过足够新颖的加壳手段就能够成功将木马加载到内存中,但是抵御不了蓝队(比如微步云沙箱)使用沙箱的动态分析,所以通常只能够免杀小一天就上传了病毒库,从而免杀失效了。\r\n\r\n本文就是来介绍几种反沙箱的思路来帮助红队搞出耐得住沙箱考验的payload",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-20 10:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4053",
|
||
"title": "在 JSP 中优雅的注入 Spring 内存马",
|
||
"description": "JSP 下注入 Spring 内存马 & Spring Hack 无条件的一种方法",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-20 09:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4048",
|
||
"title": "探寻Bottle框架内存马",
|
||
"description": "在某次测试时候 碰见了一个叫bottle的框架 于是探寻了下在实际中可应用的注入内存马的方法",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-17 10:00:01"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4046",
|
||
"title": "使用汇编代码实现反向shell",
|
||
"description": "本章为笔者在学习过程中的学习记录,其目的是使用python的keystone引擎来一步步实现一个完整的反向shell,这种方法相对麻烦,但主要是为了理解汇编代码的运行过程。",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-17 09:00:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4041",
|
||
"title": "Pipe管道利用",
|
||
"description": "关于Pipe管道的安全技术分享",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-16 09:30:00"
|
||
},
|
||
{
|
||
"guid": "https://forum.butian.net/share/4045",
|
||
"title": "x86_shellcode的一些总结",
|
||
"description": "本文章会涉及到各种shellcode的原理和撰写,然后还有可见字符串漏洞的撰写和原理,以及工具梭哈和 一些针对不同orw情况的模板shellcode",
|
||
"source": "subject",
|
||
"pubDate": "2025-01-16 09:00:00"
|
||
}
|
||
] |