Skip to content

Latest commit

 

History

History
224 lines (206 loc) · 34.4 KB

File metadata and controls

224 lines (206 loc) · 34.4 KB

202111 信息源与信息类型占比

202111-信息源占比-secwiki

202111-信息源占比-xuanwu

202111-最喜欢语言占比

学习视频 推荐

title url
现代化系统中的侧信道(side channel)攻击与防御 https://www.bilibili.com/video/BV16q4y1B7gt
Mining JavaScript Zero-day Vulnerabilities via Object Prop... https://www.bilibili.com/video/BV1xL411M7wz

微信公众号 推荐

nickname_english weixin_no title url
雁行安全团队 YX_Security 信息搜集和密码利用的思路 https://mp.weixin.qq.com/s/HbnXhaN0QdlqTW7f__NFHA
路云天网络安全研究院 gh_5237039d3db1 云天百家第5期:5G专网安全风险与技术方案 https://mp.weixin.qq.com/s/6K3RQtjzAvtyYNkavuHuaw
网空闲话 cyberspacechat 铁路系统网络安全怎么搞?ENISA这份最新报告支大招! https://mp.weixin.qq.com/s/SMqKIquuJE6EIvXCcX70wA
清华五道口MBA pbcsf-fmba 政策研究|关于金融科技安全的认识与思考 https://mp.weixin.qq.com/s/n63l4LOiViv5p9I2ELI2gg
涛动宏观 jinrongjianghu123123 官方首次解读地下钱庄 https://mp.weixin.qq.com/s/-JrUb49rnegnGzPMElSUFg
数据派THU DatapiTHU ​causal-learn:基于Python的因果发现算法平台 https://mp.weixin.qq.com/s/a-UBil7WYmxb6FQx0TAJbw
网络安全观 SecurityInsights 数据安全保护和治理的新方法 https://mp.weixin.qq.com/s/rTz8HVyGJE0x2UbVjiy8jw
腾讯IT技术 TencentITTech AI系列(一):换个思路检测隐蔽C2 https://mp.weixin.qq.com/s/JsvxtiRg8fEq51iTgGfPwQ
安全硬核 THU-COOGLE SiliFuzz:从软件角度发现处理器电路缺陷 https://mp.weixin.qq.com/s/QPYTxin66lwCxZEphCOTew
信息安全与通信保密杂志社 cismag2013 从美军的先期研发看网络安全技术的发展 https://mp.weixin.qq.com/s/a9fmnJOSSuLXfWdAFtGjDA
M01N Team m01nteam 严苛Web对抗环境下的Webshell https://mp.weixin.qq.com/s/lOBXzPk-m_th0yNSHGRxUA
一个人的安全笔记 xjiek2015 我的OSCP之旅回顾与分享 http://mp.weixin.qq.com/s?__biz=MzIwOTA4NTg4MA==&mid=2652489835&idx=1&sn=bf3ce9667c4b1949d54930d0047f796b&chksm=8c945cbcbbe3d5aa9f4b2c164d1c0c2d33e9458bcc579b407b386b88f295c10fbe25a84859f8#rd
数据治理体系 DGsystem 详解数据治理和数据分类分级 https://mp.weixin.qq.com/s/EeUrNvd1-pFO1_ybMHKcpw
我的安全视界观 CANI_Security 浅谈企业级供应链投毒应急安全能力建设 https://mp.weixin.qq.com/s/JAODc20qG5iRKVJmgGPYRw
山城铁骑安服战队 gh_152ec7aac209 shellcode免杀初探! https://mp.weixin.qq.com/s/5BVxYS7HR0ndRQbSB49eBQ
卫星黑客 Satellite_Hacker Starlink 终端固件的提取和分析 https://mp.weixin.qq.com/s/aMWE6ekKiXWqCsbChirEPQ
数据安全研究院 gh_66f2d6fee2d3 阅读笔记 I 挖掘0day的新“姿势” https://mp.weixin.qq.com/s/zHiBVe-1hVM-llC7S2ws4w
大潘点点 dapandiandian 潘柱廷 , 从网安龙头视角解读“十四五”规划结构 https://mp.weixin.qq.com/s/R42H1JbzF71TeirCWpitpg
Lycoris Security gh_1a0c9eea6b2a 利用统计方式检测beacon通信 https://mp.weixin.qq.com/s/-oImqjZyYDiODYWg98xWZw
RedTeaming RedTeamer 学习K8S中常见的21种攻击方式 https://mp.weixin.qq.com/s/QVPW7qpuIs-qZ52kPt1_HA
白帽汇 baimaohui888 如何打造一个网络扫描分析平台 - Part II https://mp.weixin.qq.com/s/91U8tAItrhD1CrlmD7ovMQ
黑哥说安全 gh_67cfd5e45750 【行为测绘应用实战】使用ZoomEye 一网打尽 Trickbot C2 https://mp.weixin.qq.com/s/cCXt6FUEYGd6s9cg5VFN0Q
黑白天实验室 HBT-SEC 针对哈萨克斯坦的基于多阶段 PowerShell 的攻击 https://mp.weixin.qq.com/s?__biz=MzU4NTY4MDEzMw==&mid=2247491440&idx=1&sn=08242f020765ddadecdae07fccd6f5ea
鸿鹄实验室 gh_a2210090ba3f 利用Com组件绕过UAC https://mp.weixin.qq.com/s?__biz=MzU0MjUxNjgyOQ==&mid=2247489075&idx=1&sn=cb02c25c346f2e3e1a50a5edc8fcbf39
黑客技术与网络安全 HackerCoder 一个HTTP请求,把网站打裂开了! https://mp.weixin.qq.com/s?__biz=MzIyMDEzMTA2MQ==&mid=2651159601&idx=2&sn=4ceb26e13206a8b151868c1ea155b51c
阿里云应急响应 gh_12f3517e40de 【漏洞预警】Hadoop Yarn RPC未授权访问漏洞 https://mp.weixin.qq.com/s?__biz=MzI5MzY2MzM0Mw==&mid=2247486205&idx=1&sn=6e581f7f16eccfee3ae9420227c26ca6
阿里云安全 aliyunsec Hadoop Yarn RPC 0 Day在野利用分析与传播手段披露 https://mp.weixin.qq.com/s?__biz=MzA4MTQ2MjI5OA==&mid=2664085773&idx=1&sn=ce93d6a25ec11b6c0fd564f8850025d3
谢公子学安全 xie_sec CobaltStrike流量特征分析 https://mp.weixin.qq.com/s?__biz=MzI2NDQyNzg1OA==&mid=2247489784&idx=1&sn=de6ef4c6d73e2655e50f3ad40f7405c5
腾讯安全威胁情报中心 gh_05a6c5ec3f78 SonarQube api 未授权访问(CVE-2020-27986)漏洞风险通告,腾讯安全支持检测拦截 https://mp.weixin.qq.com/s?__biz=MzI5ODk3OTM1Ng==&mid=2247499644&idx=1&sn=156b972bf94e11e9cbcbd1d815de6e85
盛邦安全WebRAY WebRay_weixin 烽火狼烟丨Hadoop Yarn RPC未授权访问漏洞通告 https://mp.weixin.qq.com/s?__biz=MzAwNTAxMjUwNw==&mid=2650268199&idx=1&sn=462f242e071a5fc71e3f37e8105e7f53
电驭叛客 Cyber-Hack API安全生命周期 https://mp.weixin.qq.com/s/HKsc2EajaZTLPSnX2GqeKg
南街老友 gh_f9a38b1d58f0 初尝蜜罐HFish-自定义蜜罐太香了 https://mp.weixin.qq.com/s?__biz=MzA5OTA0MTU4Mg==&mid=2247485554&idx=2&sn=0245e1699e4d78cfd57316f4a9b4d9ee
分布式实验室 dockerone 万字长文带你全面认识 Kubernetes 中如何实现蓝绿部署、金丝雀发布和滚动更新 https://mp.weixin.qq.com/s?__biz=MzA5OTAyNzQ2OA==&mid=2649743681&idx=1&sn=242b11006b581dfe2aebb14827b131b6
云鼎实验室 YunDingLab 勒索软件即服务与IAB产业浅析 https://mp.weixin.qq.com/s?__biz=MzU3ODAyMjg4OQ==&mid=2247491942&idx=1&sn=4d92d97dcc9edd6480f71ab227d51c3a
M78安全团队 M78sec 重生之我是赏金猎人(三)—逆向app破解数据包sign值实现任意数据重放添加 https://mp.weixin.qq.com/s?__biz=Mzk0NDE4MzE5MA==&mid=2247486545&idx=1&sn=a7481e0aad826b5f77ba3b0a42c1aa51
98KSec AKA-98KSec 浅析利用Tomcat ApplicationFilterChain类实现半通用回显 https://mp.weixin.qq.com/s?__biz=Mzk0MTIxNzAyNw==&mid=2247483975&idx=1&sn=4239cabdab207f5af994bc2605349861
5号黯区 gh_b173573a25bb 利用nim编写shellcode加载器bypass全家桶 https://mp.weixin.qq.com/s?__biz=Mzg2NzIwMTM3NQ==&mid=2247484268&idx=1&sn=e4c12bf1a1c66cc8461c174c885a2c1b
黑白之道 i77169 干货|常见端口渗透总结 https://mp.weixin.qq.com/s?__biz=MzAxMjE3ODU3MQ==&mid=2650526777&idx=3&sn=0e3d2a25806d0603ae74e3400f703488
洋洋的小黑屋 gh_20dd82f249d7 Tomcat 内存马(一)Listener型 https://mp.weixin.qq.com/s?__biz=MzkzOTI1NjI1MA==&mid=2247484688&idx=1&sn=b817c80f6f0c5fb800a864eb0e7ccb0d
XG小刚 XG_WEB Mysql注入-Bypass啊理芸 https://mp.weixin.qq.com/s?__biz=MzIwOTMzMzY0Ng==&mid=2247486638&idx=1&sn=f02d59cae533fe8710f2e0a7e2268434
鹏组安全 Kris_Alex2 靶机实战--linux提权之SUID&脏牛(二) https://mp.weixin.qq.com/s?__biz=Mzg5NDU3NDA3OQ==&mid=2247484710&idx=1&sn=a940de8bc00f1c5830e30f2d568cec79
雷石安全实验室 leishianquan1 CTF真题之python3的沙箱逃逸 https://mp.weixin.qq.com/s?__biz=MzI5MDE0MjQ1NQ==&mid=2247512866&idx=1&sn=e2d394e8a825d9b438292704be2c008d
锦行信息安全 jeeseensec 技术分享 , 一次 springboot未授权到云主机接管 https://mp.weixin.qq.com/s?__biz=MzIxNTQxMjQyNg==&mid=2247488360&idx=1&sn=3ed006f8e7862a2d0d144fb1600f7ebf
深信服千里目安全实验室 Further_eye 【病毒通告】近期频繁利用IE漏洞入侵的Magniber勒索病毒分析 https://mp.weixin.qq.com/s?__biz=MzI4NjE2NjgxMQ==&mid=2650256972&idx=2&sn=700748ae6e0e14a4d11be6563deb1d45
奇安信 CERT gh_64040028303e 【安全风险通告】VMware vCenter Server权限提升漏洞安全风险通告 https://mp.weixin.qq.com/s?__biz=MzU5NDgxODU1MQ==&mid=2247494977&idx=1&sn=e906adc2e0d69befbc3180a8a101d28a
WiFi安全应急响应中心 WiFiSRC frida-进程注入和server dbus通讯架构分析 https://mp.weixin.qq.com/s?__biz=MzI1NTY2MTkwNw==&mid=2247486554&idx=1&sn=c8f786553aaaa488a4dec3b7a5a8d3e8
GobySec gobysec 还在手动收集资产?你比别人慢了一步 https://mp.weixin.qq.com/s?__biz=MzI4MzcwNTAzOQ==&mid=2247509945&idx=1&sn=6a9a013fc8ff29dce7ff46c8ce0c8244
酒仙桥六号部队 anfu-360 Android应用攻与防 https://mp.weixin.qq.com/s/qH6ksA03UcuwQgPHaNuBUg
赛博回忆录 cybermemory 闲来无事,反制GOBY(补档&挂人) https://mp.weixin.qq.com/s?__biz=MzIxNDAyNjQwNg==&mid=2456098656&idx=1&sn=3179fc5de75e6acac637044d99526d8c
老刘说NLP Laoliushuo_NLP 情报技术:美国DARPA主导的智能化情报分析系列项目概览 https://mp.weixin.qq.com/s/SERw3ORYBjwxOKcpNZBEGg
网络侦查研究院 PCpolicesir 如何使用PS2EXE将PowerShell脚本编译为可执行程序 https://mp.weixin.qq.com/s?__biz=MzIxOTM2MDYwNg==&mid=2247508108&idx=3&sn=1113e686ae1a16eb2a802da907d4bb69
安恒信息应急响应中心 gh_1c2b41c1abc7 VMware vCenter Server权限提升漏洞风险提示 https://mp.weixin.qq.com/s?__biz=MzUzOTE2OTM5Mg==&mid=2247486640&idx=1&sn=e3df720546a4ff7c537b7cc6a8fe7b8a
Top security Top_security 红蓝对抗|备战大型攻防演练 https://mp.weixin.qq.com/s?__biz=Mzg3MDU0NjQyMg==&mid=2247487102&idx=1&sn=ffda6c98d01abf2027b702e627c305eb
LSCteam gh_d97c073d1479 业务安全漏洞挖掘——身份认证安全 https://mp.weixin.qq.com/s?__biz=MzUyMjAyODU1NA==&mid=2247489150&idx=1&sn=dd52a0dae6044d517adba9e47827d36c
青衣十三楼飞花堂 gh_9feb5a276a2a Windows内核态调试时根据Object地址反查句柄号 https://mp.weixin.qq.com/s?__biz=MzUzMjQyMDE3Ng==&mid=2247484903&idx=1&sn=d203fd653cc0e55bfb5244742aaba8a3
赵武的自留地 gh_86033a4f818d 网络安全技术人员如何避开内卷 https://mp.weixin.qq.com/s/cXV1-YSqngXp332qopEZSw
渗透测试教程 bzhack windows命令执行防御规避总结 https://mp.weixin.qq.com/s?__biz=MzI3OTIwNDkzNQ==&mid=2651836432&idx=1&sn=0af92d58915bc6f7500f40b6279a64eb
渊龙Sec安全团队 Aabyss-Team 简简单单实现免杀 https://mp.weixin.qq.com/s?__biz=Mzg4NTY0MDg1Mg==&mid=2247483989&idx=1&sn=3d4fccd1945d4cf57102cad64aafe220
星阑科技 StarCrossCN 【技术干货】RMI-JEP290的分析与绕过 https://mp.weixin.qq.com/s?__biz=Mzg5NjEyMjA5OQ==&mid=2247490438&idx=1&sn=b2a95ab086b6a296bebd385c728d6dc0
我不是Hacker gh_aaed037e2267 挖掘某CMS从SQL注入到登陆绕过(CVE-2021-40290) https://mp.weixin.qq.com/s?__biz=MzkwNDI1NDUwMQ==&mid=2247485022&idx=1&sn=b76b69bb48afb4872583d483a9f7b744
微步在线研究响应中心 gh_c108d4d389bf 相煎何急,印APT组织蔓灵花针对巴基斯坦政府机构展开定向攻击 https://mp.weixin.qq.com/s?__biz=MzA5MDc1NDc1MQ==&mid=2247490474&idx=1&sn=1c4dd07b5d5da73acd7a5c2a5bfcf200
奇安信技术研究院 jishuyanjiuyuan001 【年度报告连载五】电子邮件安全拓展协议现状 https://mp.weixin.qq.com/s?__biz=Mzg4OTU4MjQ4Mg==&mid=2247485107&idx=1&sn=4d2fc77ec8d5936c9280320ed58ae453
关键基础设施安全应急响应中心 CII-SRC 微软警告: 钓鱼工具TodayZoo 被广泛用于证书窃取攻击 https://mp.weixin.qq.com/s?__biz=MzkyMzAwMDEyNg==&mid=2247521996&idx=3&sn=0e3fab31170df80671b66c412630a9a6
LemonSec lemon-sec 对Linux—suid提权的一些总结 https://mp.weixin.qq.com/s?__biz=MzUyMTA0MjQ4NA==&mid=2247518206&idx=2&sn=4a0e656ad35aca2a918fd91fd7eb2426
ChaMd5安全团队 chamd5sec 新·8220挖矿团伙样本分析报告 https://mp.weixin.qq.com/s?__biz=MzIzMTc1MjExOQ==&mid=2247498625&idx=1&sn=c1ffa200545713c99d9a8d254c2875d3
默安逐日实验室 gh_995a1a9f25b5 容器环境红队手法总结 https://mp.weixin.qq.com/s?__biz=MzkxMjI3MDgwOA==&mid=2247483918&idx=1&sn=97ae72dc1fbabefb2b19355592ef5a6a
黑云信息安全 heiyunxinxi 渗透攻击-红队-信息收集- https://mp.weixin.qq.com/s?__biz=Mzg5OTYxMjk0Mw==&mid=2247485184&idx=1&sn=72d8f8dc73a07e409adf9024bdd21e7d
米斯特安全团队 acmesec CaA - BurpSuite流量收集和分析插件 https://mp.weixin.qq.com/s?__biz=MzU2NDc2NDYwMA==&mid=2247485313&idx=1&sn=99bc7a1bb0d24a2bb8d65b4ff2af1a99
玄魂工作室 xuanhun521 移动端逆向教程1.2 安卓常用指令集 https://mp.weixin.qq.com/s?__biz=MzA4NDk5NTYwNw==&mid=2651428893&idx=1&sn=d57f179dbf8caee2d19a76eb6cc1db91
渗透云笔记 shentouyun GOby服务器端配置 https://mp.weixin.qq.com/s?__biz=MzU2NzkxMDUyNg==&mid=2247491229&idx=1&sn=64381662db29438a62724fa4b5d9881c
无级安全 wujisec pBootCMS 3.0.4 前台注入漏洞复现 https://mp.weixin.qq.com/s?__biz=MzI0Nzc0NTcwOQ==&mid=2247485185&idx=1&sn=be4010ab9a0a77182ade9307c5f084af
互联网合规君 gh_057ac073892c 个保法生效后,各大平台“个人信息副本”的申请获取实践 https://mp.weixin.qq.com/s/fsSHkumgON9DZe1awFTQ0g
Pai Sec Team huahuaSec 【HTB系列】BountyHunter https://mp.weixin.qq.com/s?__biz=MzU3MTU3NDk4Mw==&mid=2247484891&idx=1&sn=baeeaa55c05aaa4a93ecbf129c22924c
Ots安全 AnQuan7 【渗透测试】利用域接管漏洞的 5 种方法 https://mp.weixin.qq.com/s?__biz=MzAxMjYyMzkwOA==&mid=2247493351&idx=2&sn=5dcf98fabcd0d9b8a0d3ff78ab17731c
NightTeam locozhou 小菜花的frida-svc-interceptor https://mp.weixin.qq.com/s?__biz=Mzg5NzIyMzkzNw==&mid=2247485919&idx=1&sn=ca1402591c1d37c3dc7958a84e2146ea
HACK学习君 XHacker1961 记一次曲折的WAF绕过 https://mp.weixin.qq.com/s?__biz=MzIzNzMxMDkxNw==&mid=2247486085&idx=1&sn=570b3adf02278319757a76baa0e9342e
CNVD漏洞平台 None 关于SonarQube系统存在未授权访问漏洞的安全公告 https://mp.weixin.qq.com/s?__biz=MzU3ODM2NTg2Mg==&mid=2247490778&idx=1&sn=4fef06e06bce01245e5f473c70e1b793
360威胁情报中心 CoreSec360 多场景DoH/DoT配置指南 https://mp.weixin.qq.com/s?__biz=MzUyMjk4NzExMA==&mid=2247488801&idx=1&sn=3f7c3ab522645a2f47f03d9eec27f2e7
锋刃科技 ahfengren 【漏洞情报】Linux Kernel TIPC远程代码执行漏洞(CVE-2021-43267) https://mp.weixin.qq.com/s?__biz=MzUxMjc0MTE3Mw==&mid=2247486815&idx=1&sn=edcd196c775336892e13741a8fa80953
系统安全运维 Taurus-1314147 Windows 提权命令指南 https://mp.weixin.qq.com/s?__biz=Mzk0NjE0NDc5OQ==&mid=2247493913&idx=2&sn=3664de61b8eebe71831158b04ef2083d
知道创宇 knownsec 知道创宇云监测—ScanV MAX更新:Apache Spark、Gitlab GraphQL等多个漏洞可监测 https://mp.weixin.qq.com/s?__biz=MjM5NzA3Nzg2MA==&mid=2649856251&idx=1&sn=0b6874bb84fea2250884b51fed7e6fdd
看雪学苑 ikanxue 全网最详细CVE-2014-0502 Adobe Flash Player双重释放漏洞分析 https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458402566&idx=1&sn=6a8289758711c348b36f8526808747c7
猪猪谈安全 zzt-anquan 干货 , 一篇文章带你深入理解漏洞之 XXE 漏洞 https://mp.weixin.qq.com/s?__biz=MzIyMDAwMjkzNg==&mid=2247496638&idx=1&sn=7f16d3de5a533d15a7680e219eeab7a6
渗透攻击红队 RedTeamHacker 从外网 Weblogic 打进内网,再到约束委派接管域控 https://mp.weixin.qq.com/s?__biz=MzkxNDEwMDA4Mw==&mid=2247488950&idx=1&sn=48d93f1fac38eae99cc4e78474eb557c
掌控安全EDU ZKAQEDU 文库|内网渗透之隧道传输技术 https://mp.weixin.qq.com/s?__biz=MzUyODkwNDIyMg==&mid=2247519631&idx=1&sn=bf5acc4762db1c69e13c9db31bb3e55b
我是安服 scaf_0123 安服笔记:关于移动应用票据导致的信息泄露 https://mp.weixin.qq.com/s?__biz=MzkzMzI3OTczNA==&mid=2247484149&idx=1&sn=89796bf56a3fe018a2f29ec850eceff1
广软NSDA安全团队 gh_72de97d4e162 内网渗透初探 https://mp.weixin.qq.com/s?__biz=MzUzMDg5NDQ0Nw==&mid=2247489476&idx=1&sn=a39eed3450e581385b862c09ae556f9f
小黑的安全笔记 x1a0heI 云服务器ftp被动和主动模式都连接失败 https://mp.weixin.qq.com/s?__biz=MzI4Njk5NjY4OQ==&mid=2247485823&idx=1&sn=43b52f2f7163fba10cf4ba466a3bac29
奇安信威胁情报中心 gh_166784eae33e APT活动中的Windows系统本地提权漏洞及技术分析 https://mp.weixin.qq.com/s/6mT0O9eur5-VEs0rbV0-mg
不懂安全的校长 sectip 内网渗透 , 1.内网基础知识 https://mp.weixin.qq.com/s?__biz=MzkyMzI3OTY4Mg==&mid=2247484768&idx=1&sn=31012b5465686c5eaa96dad6f8f0bbfa
三六零CERT CERT-360 CVE-2021-43267:Linux Kernel TIPC远程代码执行漏洞通告 https://mp.weixin.qq.com/s?__biz=MzU5MjEzOTM3NA==&mid=2247490400&idx=2&sn=bba79003c867c6a443114d71c6ca96d8
Linux学习 LoveLinux1024 Linux 服务器日常巡检脚本分享 https://mp.weixin.qq.com/s?__biz=MzI4MDEwNzAzNg==&mid=2649455213&idx=2&sn=93ed9b2bdf233bf7a76bd4599e83a2f7
Hacking黑白红 Hacking012 【渗透实战系列】,35-旁站信息泄露的dedecms站点渗透 https://mp.weixin.qq.com/s?__biz=Mzg2NDYwMDA1NA==&mid=2247502760&idx=2&sn=32c3aac95cc15c84c42b071425d19f91
看雪学院 ikanxue 基于linker实现so加壳补充-------从dex中加载so https://mp.weixin.qq.com/s?__biz=MjM5NTc2MDYxMw==&mid=2458402519&idx=1&sn=a42e81b669d38f9ff8ed1a8d941b3f2f
哈拉少安全小队 gh_b273ce95df95 【反序列化利用链通用思路】OkayCMS&Smarty反序列化利用链详细分析 https://mp.weixin.qq.com/s?__biz=MzAxNzkyOTgxMw==&mid=2247487771&idx=1&sn=8f9a417964064fc54c50d55b111091be
安全初心 securityheart 工具 , \nVMInjector绕过虚拟机登录验证屏幕的工具 https://mp.weixin.qq.com/s?__biz=MzU4NzU4MDg0Mw==&mid=2247486724&idx=1&sn=4586b52a037ae8fa5ea3f6c90bf78eed
邑安全 EansecD PurpleFox 添加了使用 WebSockets 的新后门 https://mp.weixin.qq.com/s?__biz=MzUyMzczNzUyNQ==&mid=2247509027&idx=2&sn=8877ebc44f5371a55227dd6ab44a1f4e
胖猴实验室 gh_1623eeae8094 天府杯华硕会战的围剿与反围剿 https://mp.weixin.qq.com/s/k1ouK1Gyxpped0ZK4H4h7g
电子与信息学报 dzyxxxb Top100密码学经典论文大盘点 https://mp.weixin.qq.com/s/iZ7X9bC4yRutkYWiCxuApQ
CodeWisdom gh_2395906a410f 技术分享|基于优化搜索的API序列推荐 https://mp.weixin.qq.com/s/jbR2nfIGcAjRS-dceTag8Q
雷神众测 bounty_team Mobsf_MAC_AVD_Android动静态环境搭建排坑实战 https://mp.weixin.qq.com/s?__biz=MzI0NzEwOTM0MA==&mid=2652494861&idx=1&sn=cd3f7d2cd6b44019374f83b27d65b219
进德修业行道 gh_ad128618f5e9 xss挑战之旅 https://mp.weixin.qq.com/s?__biz=Mzg5NTU2NjA1Mw==&mid=2247486229&idx=1&sn=c3af95ec1dcfa4dc2f53d20326a5c639
贝塔安全实验室 BetaSecLab 应急靶场 , 流量分析与溯源 https://mp.weixin.qq.com/s?__biz=Mzg4MzA4Nzg4Ng==&mid=2247494569&idx=1&sn=b9848f152c09170331c68b4bfbefbc09
蛇矛实验室 gh_2c0238928f82 记一次靶场多域场景搭建过程(下) https://mp.weixin.qq.com/s?__biz=MzkwMjI1NzY4Ng==&mid=2247497247&idx=1&sn=05b4691be503ae8e2c03370420aa8054
网络安全应急技术国家工程实验室 NELCERT 原创 , CVE-2021-35052:WinRAR远程代码执行漏洞分析 https://mp.weixin.qq.com/s?__biz=MzUzNDYxOTA1NA==&mid=2247522429&idx=1&sn=66e0ee90cbb3acfc5d73fcd2ed646bb0
维他命安全 VitaminSecurity Kaspersky:2021年第三季度APT趋势报告 https://mp.weixin.qq.com/s?__biz=MzUxMDQzNTMyNg==&mid=2247497329&idx=4&sn=59398eae7413bf53354637d4214e320a
盘古石取证 Panguite_CN 基于web日志的溯源 https://mp.weixin.qq.com/s?__biz=Mzg3MjE1NjQ0NA==&mid=2247491660&idx=1&sn=abe114ae2d012b570a7b7d26534de400
火线Zone huoxian_zone 常见Android组件/控件漏洞 https://mp.weixin.qq.com/s?__biz=MzI2NDQ5NTQzOQ==&mid=2247489647&idx=1&sn=2759a30b6777c7a876ef13e72eaaebfc
潇湘信安 xxxasec 记一次SSRF+HFS命令执行回显相关研究 https://mp.weixin.qq.com/s?__biz=Mzg4NTUwMzM1Ng==&mid=2247492576&idx=1&sn=976bd65bfa66824ccfa2eddd4f70ec2a
安全客 anquanbobao 【技术分享】剖析脏牛4_madvise()与漏洞成因 https://mp.weixin.qq.com/s?__biz=MzA5ODA0NDE2MA==&mid=2649756378&idx=2&sn=aeda5f3deedf8d45f42227827a831bf7
利刃信安 LRXAEGZ Mac Nessus 10.0.0 https://mp.weixin.qq.com/s?__biz=MzU1Mjk3MDY1OA==&mid=2247493357&idx=1&sn=0b874172955fd93014a647199b12d71b
互联网安全内参 anquanneican 警惕:GitLab RCE漏洞 (CVE-2021-22205) 已被广泛利用 https://mp.weixin.qq.com/s?__biz=MzI4NDY2MDMwMw==&mid=2247500089&idx=3&sn=3c3184baa420ef76c5bab547c905f3bf
8ypass sec_in_guangdong codeql学习笔记1 https://mp.weixin.qq.com/s?__biz=MzI0NDM5OTYxNg==&mid=2247484470&idx=1&sn=5d44f38fed0c78af9882cfa38262a059
腾讯安全应急响应中心 tsrc_team 云原生安全攻防|使用eBPF逃逸容器技术分析与实践 https://mp.weixin.qq.com/s?__biz=MjM5NzE1NjA0MQ==&mid=2651205381&idx=1&sn=b7771a54e8b01cb6e7201a0ce4784e62
红队防线 klionsec 一文读懂Kerberos认证流程 https://mp.weixin.qq.com/s?__biz=MzI0OTkzOTc2Nw==&mid=2247484879&idx=1&sn=bb0e0a65fb3f92141563d9d496ba82c3
安世加 asjeiss 技术干货 , linux常见backdoor及排查技术 https://mp.weixin.qq.com/s?__biz=MzU2MTQwMzMxNA==&mid=2247512162&idx=2&sn=941cd451c83885f7dc171595720bcd42
合天网安实验室 hee_tian 从一道CTF题到HTTP请求走私攻击 https://mp.weixin.qq.com/s?__biz=MjM5MTYxNjQxOA==&mid=2652882427&idx=1&sn=86d178c9fbf3076adc0466943c8752dc
军机故阁 gh_e57baf46bdf5 入侵案例分析 https://mp.weixin.qq.com/s?__biz=MzU5Mjk3MDA5Ng==&mid=2247483917&idx=1&sn=754ca2901e5ed22e93ee95db1c5e762c
亿人安全 Yr-Sec XSS编码浅析 https://mp.weixin.qq.com/s?__biz=Mzk0MTIzNTgzMQ==&mid=2247487352&idx=1&sn=578780a714e731392032909e11943bf8
V安全资讯 v-safe-cn xhCMS代码审计思路 https://mp.weixin.qq.com/s?__biz=MzI4MDQ1MzQ0NA==&mid=2247488367&idx=2&sn=c94d1290712dbab20b77e19bf960df78
TeamsSix teamssix-com 代码审计 , Maven 基础知识 https://mp.weixin.qq.com/s?__biz=MzI5Mzk5NTIwMg==&mid=2247486500&idx=1&sn=a9e87893056ee6b6513dd4f9db076a0a
SecIN技术平台 sec-in 原创 , java安全-java RMI https://mp.weixin.qq.com/s?__biz=MzI4Mzc0MTI0Mw==&mid=2247491656&idx=1&sn=35e4c98ba7c5d3705a23589c3c647a1c
HACK学习呀 Hacker1961X 实战 , SRC信息收集思路总结 https://mp.weixin.qq.com/s?__biz=MzI5MDU1NDk2MA==&mid=2247501144&idx=1&sn=62687584927c415941d674fd6642e706
Docker中文社区 dockerchina 3 种姿势轻松采集 Nginx 日志 https://mp.weixin.qq.com/s?__biz=MzI1NzI5NDM4Mw==&mid=2247488172&idx=1&sn=963578a287d536b072f77d20eaeb2e0c
Bypass Bypass-- Splunk系列:Splunk安装部署篇(一) https://mp.weixin.qq.com/s?__biz=MzA3NzE2MjgwMg==&mid=2448907552&idx=1&sn=69de936e93e072e6f4b21c67ce5db34f
骨哥说事 guge_guge 一键自动部署渗透工具 https://mp.weixin.qq.com/s?__biz=MjM5Mzc4MzUzMQ==&mid=2650254865&idx=1&sn=2e0ebaa04cf3b24b957167394e27c69f
补天平台 Patchingthesky 个人总结:使用测绘平台搜目标资产的万能招式 https://mp.weixin.qq.com/s?__biz=MzI2NzY5MDI3NQ==&mid=2247492220&idx=1&sn=9f7c7dfb6c107b21986f9aea5b5e049d
橘猫学安全 gh_af700ee13397 干货,横向移动与域控权限维持方法总汇 https://mp.weixin.qq.com/s?__biz=Mzg5OTY2NjUxMw==&mid=2247485216&idx=1&sn=522ee3b72a1faf34dd3de27f7038dc99
墨雪飘影 SG-CXZ 免扫码登录腾讯企业邮箱 https://mp.weixin.qq.com/s?__biz=MzI3NzI4OTkyNw==&mid=2247487677&idx=1&sn=541d15351c374601f79edbe0d3ce9e59
HACK之道 hacklearn 干货,常见6种WAF绕过和防护原理 https://mp.weixin.qq.com/s?__biz=MzIwMzIyMjYzNA==&mid=2247496452&idx=1&sn=e528b06e502782e9a23895fc56a85f34
黑鸟 blackorbird 航空产业已成境外情报机构重点网络攻击目标 https://mp.weixin.qq.com/s/ANDLQBHTzB2uiS54xxyuZw
释然IT杂谈 ShiRan_IT 【干货】思科ASA防火墙上配置透明模式的Failover Active/Acitve https://mp.weixin.qq.com/s?__biz=MzIxMTEyOTM2Ng==&mid=2247496118&idx=1&sn=f7f9578890d3769c8188719cf6f4ade2
虎符智库 TT_Thinktank 起底国家级APT组织:蔓灵花(APT-Q-37) https://mp.weixin.qq.com/s?__biz=MzIwNjYwMTMyNQ==&mid=2247486683&idx=1&sn=440e2c04f077a2465cbac4c00b09ce60
网安国际 inforsec 2021年网络安全领域四大顶会中国学者发表论文88篇(附目录) https://mp.weixin.qq.com/s/igXuvxBdVZpM9fkAxnkJ5g
科技锐新 qimingyu_java 一文彻底搞懂Spark https://mp.weixin.qq.com/s/Uc-EaqL4Q9HchOH3JNQ53A
祺印说信安 qiyinshuoxinan 打印机可能是“间谍”? 7 种方法防住它“被策反” https://mp.weixin.qq.com/s?__biz=MzA5MzU5MzQzMA==&mid=2652090643&idx=3&sn=c142700c7ba8828592ed71c2dbb9327b
石头安全 gh_bdb076c55582 WriteUP-6days_lab 靶机 https://mp.weixin.qq.com/s?__biz=MzkxNTIxOTkzMQ==&mid=2247484327&idx=1&sn=bf8abff5cee1083527869e5ebcc747bc
盾山实验室 DunShanRR ImHex:十六进制编辑器 https://mp.weixin.qq.com/s?__biz=MzkzMjIwMDY4Nw==&mid=2247485688&idx=1&sn=486c37df65b6479bc9f5e8735039d002
疯猫网络 iloscat 内网渗透之横向移动—票据传递攻击研究 https://mp.weixin.qq.com/s?__biz=MzIyMzE5NTQ3Ng==&mid=2650621978&idx=1&sn=f81afa298a18910f8989b8fbf0f10df7
灼剑安全团队 Tsojan 漏洞复现|Struts2系列漏洞复现总结 https://mp.weixin.qq.com/s?__biz=Mzg5OTY1ODMxMg==&mid=2247488794&idx=1&sn=50b2dfda6cac8ae20b0050f99207a207
渗透Xiao白帽 SuPejkj 【移动安全】Android App—HTTPS证书校验绕过 https://mp.weixin.qq.com/s?__biz=MzI1NTM4ODIxMw==&mid=2247490402&idx=1&sn=fb65c5e0df9b962f133b492cc05292f9
开源聚合网络空间安全研究院 OSPtech_Cyberspace 【挖金宝典】SRC信息收集思路分享 https://mp.weixin.qq.com/s?__biz=MzI4NTE4NDAyNA==&mid=2650390038&idx=1&sn=91b2fae4b2bf29ec89a865fdd6766916
平安集团安全应急响应中心 PSRC_Team Nexus Repository Manager历史表达式注入漏洞分析 https://mp.weixin.qq.com/s?__biz=MzIzODAwMTYxNQ==&mid=2652140927&idx=1&sn=9a6fe102df545083af8516b69931685c
宸极实验室 ChenJiLab 『靶场』hackthebox 之 love 靶场实战 https://mp.weixin.qq.com/s?__biz=Mzg4NTA0MzgxNQ==&mid=2247485171&idx=1&sn=9e60e0c5bfbe144b6119d288621e6248
安恒威胁情报中心 None 安恒威胁情报中心又又又捕获到在野windows内核1day啦! https://mp.weixin.qq.com/s?__biz=MzI1MDU5NjYwNg==&mid=2247492514&idx=1&sn=4d2903dc6f5b71a81344df7b7768fe25
安全宇宙 knownsec818 【创宇小课堂】渗透测试-移动端各种方式抓包 https://mp.weixin.qq.com/s?__biz=MzAxMDc5NzYwNQ==&mid=2652409428&idx=1&sn=8dd83d91f389d463897ebc6ebd27ce9c
安全学术圈 secquan TrustCom会议小记 https://mp.weixin.qq.com/s/itQMU8HwacjfMsI9cFF6VA
威胁棱镜 THREAT_PRISM 破解版密钥相同,部分CobaltStrike加密流量可解 https://mp.weixin.qq.com/s/AcIFSjyqn9gzyRkyx3sRIQ
嘶吼专业版 Pro4hou Windows 0 day漏洞影响所有Windows版本 https://mp.weixin.qq.com/s?__biz=MzI0MDY1MDU4MQ==&mid=2247530978&idx=2&sn=4b867ec41babda4f35cb49ef4acbd517
可信系统安全实验室 gh_296c8139d7e6 【11月3讲座回顾】 Building a Secure Open-Source Operating-System Kernel https://mp.weixin.qq.com/s/UpB07tQxK5vvYl1alSQY3A
代码卫士 codesafe 苹果新漏洞 “Shrootless” 可使攻击者在macOS 系统上安装后门 https://mp.weixin.qq.com/s?__biz=MzI2NTg4OTc5Nw==&mid=2247508847&idx=1&sn=dbe1ae6473c7b27b86e378fed65af24d
乌雲安全 hackctf 实战,利用SCF文件攻击进行渗透实战 https://mp.weixin.qq.com/s?__biz=MzAwMjA5OTY5Ng==&mid=2247499586&idx=1&sn=cf4db3553c243c50a465d1f3e901d75c
web安全工具库 websec-tools 信息收集 -- JBoss架构 https://mp.weixin.qq.com/s?__biz=MzI4MDQ5MjY1Mg==&mid=2247491048&idx=1&sn=e7082350dd3803f8f7fbe44ec9fb7b9c
bgbing安全 bgbingsec GitLab 未授权rce(反弹shell)CVE-2021-22205 https://mp.weixin.qq.com/s?__biz=MzkwNzEzMTg3MQ==&mid=2247484883&idx=1&sn=261e8eedf5ab6663f8f8f332008cfa77
RedCode Team RedCodetm 审计|通读审计之HDWIKI(附原创漏洞)上篇 https://mp.weixin.qq.com/s?__biz=Mzg5MjY3MTk2Mw==&mid=2247484458&idx=1&sn=c18f7cd8be0798891d6143c957c54a8a
Linux中国 linux-cn 如何在 Linux 上杀死一个僵尸进程 , Linux 中国 https://mp.weixin.qq.com/s?__biz=MjM5NjQ4MjYwMQ==&mid=2664643220&idx=1&sn=2eb3afc1070c19eb1a591a7427250ce8
Khan安全攻防实验室 KhanCJSH 利用PingTunnel上线cobalt strike https://mp.weixin.qq.com/s?__biz=MzAwMjQ2NTQ4Mg==&mid=2247487911&idx=1&sn=f1d417ca3422da17a8ced173eca3af13
GoCN golangchina 『每周译Go』定位并修复 Go 中的内存泄漏 https://mp.weixin.qq.com/s?__biz=MzA4ODg0NDkzOA==&mid=2247493669&idx=1&sn=2208d2af6a4b93cfc333fb2d2adcbedf
Gamma实验室 HackerLearning 红队攻击-绕过waf以及IDS等流量设备 https://mp.weixin.qq.com/s?__biz=Mzg2NjQ2NzU3Ng==&mid=2247489039&idx=1&sn=4953b3f8dc6a316f95f07c5e997052a8
FreeBuf freebuf 如何使用EDD枚举域数据 https://mp.weixin.qq.com/s?__biz=MjM5NjA0NjgyMA==&mid=2651146454&idx=4&sn=28a1affe7d6eba5f8c808a205be23973

私人github账号 推荐

github_id title url p_url p_profile p_loc p_company p_repositories p_projects p_stars p_followers p_following repo_lang repo_star repo_forks
wecooperate iMonitorSDK: 系统监控开发套件API https://github.com/wecooperate/iMonitorSDK https://github.com/wecooperate?tab=followers 人因梦想而伟大 None None 6 0 0 0 0 C++ 0 0
ssssssss-team spider-flow: 新一代图形化爬虫平台 https://github.com/ssssssss-team/spider-flow None None None None 0 0 0 0 0 None 0 0
spring2go 一份硬核(hardcore)计算机科学CS自学计划 https://github.com/spring2go/cs_study_plan None None None None 0 0 0 0 0 None 0 0
r0eXpeR 主流供应商的一些攻击性漏洞汇总 . https://github.com/r0eXpeR/supplier https://github.com/r0eXpeR?tab=followers alera(/xs‘/) China,ShangHai None 20 0 0 0 0 Ruby 0 0
mudongliang Linux 平台的漏洞 PoC、Writeup 收集 https://github.com/mudongliang/LinuxFlaw https://github.com/mudongliang?tab=followers Faculty/Researcher at HUST on Software & System Security Wuhan, CN Huazhong University of Science and Technology 23 0 0 0 0 SCSS,C,Shell,Dockerfile 0 0
klinix5 Windows Installer 本地提权漏洞 PoC https://github.com/klinix5/InstallerFileTakeOver https://github.com/klinix5?tab=followers None None 16 0 0 0 0 C++ 0 0
c3rb3ru5d3d53c 从恶意软件中提取基本块和函数特征用于识别和检测的工具 https://github.com/c3rb3ru5d3d53c/binlex https://github.com/c3rb3ru5d3d53c?tab=followers μηςεηsοяεδ мαℓωαяε яεsεαяςнεя sταηδιηg gμαяδ ατ τнε gατεs οƒ мαℓωαяε нεℓℓ 66.66.66.66 None 19 0 0 0 0 Python,C++ 0 0
SkewwG henggeFish: 自动化批量发送钓鱼邮件 https://github.com/SkewwG/henggeFish https://github.com/SkewwG?tab=followers None None 26 0 0 0 0 Python,Go,C,C++ 0 0
S3cur3Th1sSh1t MultiPotato - 一个改进版的 Potato,可以使用自己的漏洞作为 SYSTEM Auth Trigger https://github.com/S3cur3Th1sSh1t/MultiPotato None None None None 0 0 0 0 0 None 0 0
RASSec WebExp: 2020年~2021年 网站CMS、中间件、框架系统漏洞集合 https://github.com/RASSec/WebExp https://github.com/RASSec?tab=followers Bug Bounty Hunter Beijing None 667 0 0 0 0 C,Java,Classic,Python,JavaScript,C++,HTML,Go,PHP,Ruby 0 0
EmYiQing CodeInspector: Java 可控参数分析和数据流跟踪分析 https://github.com/EmYiQing/CodeInspector None None None None 0 0 0 0 0 None 0 0
CHYbeta Apache APISIX uri-blocker 场景绕过之一:$request_uri https://github.com/CHYbeta/OddProxyDemo/tree/master/apisix/demo1 None None None None 0 0 0 0 0 None 0 0
0e0w 深入理解Java代码审计 https://github.com/0e0w/HackJava https://github.com/0e0w?tab=followers 0 error(s),0 warning(s). Hohhot China 60 0 0 0 0 0 0

medium 推荐

title url
通过设置 uchg flag 限制恶意软件对 /Library/LaunchDaemons 等路径的修改 http://antman1p-30185.medium.com/defeating-malicious-launch-persistence-156e2b40fc67
微软 John Lambert 关于防御的一份 “Defender’s Mindset” http://medium.com/@johnlatwc/defenders-mindset-319854d10aaa
利用 Python Selenium 绕过 Google 的 reCaptcha V3 的验证码 http://medium.com/analytics-vidhya/how-to-bypass-recaptcha-v3-with-selenium-python-7e71c1b680fc
利用静态代码分析工具(SAST)的漏洞实现 RCE http://medium.com/cider-sec/malicious-code-analysis-abusing-sast-mis-configurations-to-hack-ci-systems-13d5c1b37ffe

知乎 推荐

title url
Automatic Feature Learning for Predicting Vulnerable Softw... https://zhuanlan.zhihu.com/p/435957686
《Instructions for PhD Students》:Dimitris给PhD学生的忠告 https://zhuanlan.zhihu.com/p/400248999
Devign:基于GNN的源代码漏洞检测 https://zhuanlan.zhihu.com/p/433608077
学习和使用知识图谱需要知道的一些事情 https://zhuanlan.zhihu.com/p/433073550

日更新程序

python update_daily.py