<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" version="2.0"><channel><title>狼目安全</title><link>http://localhost:8080</link><atom:link href="http://localhost:8080/rss.xml" rel="self" type="application/rss+xml"/><description>专注于网络安全,渗透测试,web安全,运维,网络攻防,CTF,算法,漏洞</description><generator>Halo v2.22.14</generator><language>zh-cn</language><image><url>http://localhost:8080/upload/1kl.png</url><title>狼目安全</title><link>http://localhost:8080</link></image><lastBuildDate>Sat, 7 Mar 2026 11:04:05 GMT</lastBuildDate><item><title><![CDATA[开源 EXE DLL转ShellCode工具]]></title><link>http://localhost:8080/archives/kai-yuan-exe-dllzhuan-shellcodegong-ju</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E5%BC%80%E6%BA%90%20EXE%20DLL%E8%BD%ACShellCode%E5%B7%A5%E5%85%B7&amp;url=/archives/kai-yuan-exe-dllzhuan-shellcodegong-ju" width="1" height="1" alt="" style="opacity:0;">我啥都不会,写着玩儿的 成品下载地址: https://gofile.io/d/ADDHhv 源码添加主页Q群 获取~~~]]></description><guid isPermaLink="false">/archives/kai-yuan-exe-dllzhuan-shellcodegong-ju</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2FQQ20260226-174810.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Thu, 26 Feb 2026 09:51:52 GMT</pubDate></item><item><title><![CDATA[开源无落地socket传输shellcode加载工具]]></title><link>http://localhost:8080/archives/kai-yuan-wu-luo-di-socketchuan-shu-shellcodejia-zai-gong-ju</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E5%BC%80%E6%BA%90%E6%97%A0%E8%90%BD%E5%9C%B0socket%E4%BC%A0%E8%BE%93shellcode%E5%8A%A0%E8%BD%BD%E5%B7%A5%E5%85%B7&amp;url=/archives/kai-yuan-wu-luo-di-socketchuan-shu-shellcodejia-zai-gong-ju" width="1" height="1" alt="" style="opacity:0;">监听端用来读取shelldcode文件 当然你也可以修改加解密 加载端用于加载shellcode修改IP和端口即可 下载地址: Shellcode Loader---www.lmboke.com.zip 解压密码: www.lmboke.com]]></description><guid isPermaLink="false">/archives/kai-yuan-wu-luo-di-socketchuan-shu-shellcodejia-zai-gong-ju</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2Fu%3D949656611%2C2583137479%26fm%3D253%26fmt%3Dauto%26app%3D138%26f%3DJPEG.webp&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Thu, 19 Feb 2026 16:15:43 GMT</pubDate></item><item><title><![CDATA[矛·盾 武器库 v3.2 |开箱即用的windows渗透测试工具包]]></title><link>http://localhost:8080/archives/mao-dun-wu-qi-ku-v3.2-kai-xiang-ji-yong-de-windowsshen-tou-ce-shi-gong-ju-bao</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E7%9F%9B%C2%B7%E7%9B%BE%20%E6%AD%A6%E5%99%A8%E5%BA%93%20v3.2%20%7C%E5%BC%80%E7%AE%B1%E5%8D%B3%E7%94%A8%E7%9A%84windows%E6%B8%97%E9%80%8F%E6%B5%8B%E8%AF%95%E5%B7%A5%E5%85%B7%E5%8C%85&amp;url=/archives/mao-dun-wu-qi-ku-v3.2-kai-xiang-ji-yong-de-windowsshen-tou-ce-shi-gong-ju-bao" width="1" height="1" alt="" style="opacity:0;">系统简介 本环境旨在提供一个开箱即用的windows渗透测试环境； 本项目欢迎转载，转载时请注明原作者和原文链接:https://github.com/arch3rPro/Pentest-Windows 建议运行环境：【vmware：17.0 】 /【运行内存：8G】 /【固态硬盘：100G】 由于]]></description><guid isPermaLink="false">/archives/mao-dun-wu-qi-ku-v3.2-kai-xiang-ji-yong-de-windowsshen-tou-ce-shi-gong-ju-bao</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F1818-1.webp&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Thu, 19 Feb 2026 15:46:07 GMT</pubDate></item><item><title><![CDATA[AWVS 破解版 Acunetix 25.5.250613157]]></title><link>http://localhost:8080/archives/awvs-po-jie-ban-acunetix-25.5.250613157</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=AWVS%20%E7%A0%B4%E8%A7%A3%E7%89%88%20Acunetix%2025.5.250613157&amp;url=/archives/awvs-po-jie-ban-acunetix-25.5.250613157" width="1" height="1" alt="" style="opacity:0;">下载地址 https://gofile.io/d/jjoCCP 解压密码:www.lmboke.com 破解方法 正常安装后双击www.lmboke.com.bat]]></description><guid isPermaLink="false">/archives/awvs-po-jie-ban-acunetix-25.5.250613157</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2Fhacker-tool-acunetix-wvs.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Thu, 19 Feb 2026 15:41:34 GMT</pubDate></item><item><title><![CDATA[NetExec 网络服务漏洞利用工具]]></title><link>http://localhost:8080/archives/netexec-wang-luo-fu-wu-lou-dong-li-yong-gong-ju</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=NetExec%20%E7%BD%91%E7%BB%9C%E6%9C%8D%E5%8A%A1%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8%E5%B7%A5%E5%85%B7&amp;url=/archives/netexec-wang-luo-fu-wu-lou-dong-li-yong-gong-ju" width="1" height="1" alt="" style="opacity:0;">NetExec简介 NetExec（又名 nxc）是一种网络服务漏洞利用工具，可帮助自动评估大型网络的安全性。 该项目最初由@byt3bl33d3r（当时名为CrackMapExec）于2015年创建。2019年，@mpgn_x64开始维护该项目，并在接下来的四年里添加了许多优秀的工具和功能。202]]></description><guid isPermaLink="false">/archives/netexec-wang-luo-fu-wu-lou-dong-li-yong-gong-ju</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2Fimage.avif&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Thu, 19 Feb 2026 15:30:25 GMT</pubDate></item><item><title><![CDATA[【红队】一款先进的跨平台红队演练框架]]></title><link>http://localhost:8080/archives/hong-dui-yi-kuan-xian-jin-de-kua-ping-tai-hong-dui-yan-lian-kuang-jia</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E3%80%90%E7%BA%A2%E9%98%9F%E3%80%91%E4%B8%80%E6%AC%BE%E5%85%88%E8%BF%9B%E7%9A%84%E8%B7%A8%E5%B9%B3%E5%8F%B0%E7%BA%A2%E9%98%9F%E6%BC%94%E7%BB%83%E6%A1%86%E6%9E%B6&amp;url=/archives/hong-dui-yi-kuan-xian-jin-de-kua-ping-tai-hong-dui-yan-lian-kuang-jia" width="1" height="1" alt="" style="opacity:0;">Tuoni 是一款先进的跨平台红队演练框架，旨在通过大规模网络防御演练来加强网络安全教育和培训。它采用 Java 开发以确保稳健性，使用 Docker 实现多功能性，并配备直观的 Web 浏览器界面，能够支持并简化网络演练流程。凭借其模块化、可扩展的插件系统，Tuoni 使红队成员能够灵活地根据特定]]></description><guid isPermaLink="false">/archives/hong-dui-yi-kuan-xian-jin-de-kua-ping-tai-hong-dui-yan-lian-kuang-jia</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2FScreenshot1.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Sun, 15 Feb 2026 17:19:04 GMT</pubDate></item><item><title><![CDATA[新一代HFS文件系统]]></title><link>http://localhost:8080/archives/xin-yi-dai-hfswen-jian-xi-tong</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E6%96%B0%E4%B8%80%E4%BB%A3HFS%E6%96%87%E4%BB%B6%E7%B3%BB%E7%BB%9F&amp;url=/archives/xin-yi-dai-hfswen-jian-xi-tong" width="1" height="1" alt="" style="opacity:0;">HFS文件系统 直链地址下载 https://lp.lmboke.com/HFS%E8%99%9A%E6%8B%9F%E6%96%87%E4%BB%B6%E7%B3%BB%E7%BB%9F%201.0.0.exe 免责声明]]></description><guid isPermaLink="false">/archives/xin-yi-dai-hfswen-jian-xi-tong</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F%25E8%2581%2594%25E6%2583%25B3%25E6%2588%25AA%25E5%259B%25BE_20251113194659.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Thu, 13 Nov 2025 10:34:27 GMT</pubDate></item><item><title><![CDATA[RuoYi-AI框架曝任意文件上传漏洞(CVE-2025-6466)，可导致服务器沦陷]]></title><link>http://localhost:8080/archives/ruoyi-aikuang-jia-pu-ren-yi-wen-jian-shang-chuan-lou-dong-cve-2025-6466-ke-dao-zhi-fu-wu-qi-lun-xian</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=RuoYi-AI%E6%A1%86%E6%9E%B6%E6%9B%9D%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0%E6%BC%8F%E6%B4%9E%28CVE-2025-6466%29%EF%BC%8C%E5%8F%AF%E5%AF%BC%E8%87%B4%E6%9C%8D%E5%8A%A1%E5%99%A8%E6%B2%A6%E9%99%B7&amp;url=/archives/ruoyi-aikuang-jia-pu-ren-yi-wen-jian-shang-chuan-lou-dong-cve-2025-6466-ke-dao-zhi-fu-wu-qi-lun-xian" width="1" height="1" alt="" style="opacity:0;">导语 一条未过滤的上传路径，可能成为整个系统的死亡入口 安全团队确认！RuoYi-ai开源框架核心文件上传功能存在高危漏洞（CVE-2025-6466），攻击者可绕过安全防护上传任意文件，可以直接获取服务器控制权限。该漏洞已发现大规模利用迹象，涉及政府、金融、教育等行业的数万系]]></description><guid isPermaLink="false">/archives/ruoyi-aikuang-jia-pu-ren-yi-wen-jian-shang-chuan-lou-dong-cve-2025-6466-ke-dao-zhi-fu-wu-qi-lun-xian</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F%E8%81%94%E6%83%B3%E6%88%AA%E5%9B%BE_20250626224357-ytpo.png&amp;size=m" type="image/jpeg" length="0"/><category>漏洞</category><pubDate>Thu, 26 Jun 2025 14:45:00 GMT</pubDate></item><item><title><![CDATA[CVE-2025-33053 网络快捷方式文件远程代码执行漏洞]]></title><link>http://localhost:8080/archives/cve-2025-33053-wang-luo-kuai-jie-fang-shi-wen-jian-yuan-cheng-dai-ma-zhi-xing-lou-dong</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=CVE-2025-33053%20%E7%BD%91%E7%BB%9C%E5%BF%AB%E6%8D%B7%E6%96%B9%E5%BC%8F%E6%96%87%E4%BB%B6%E8%BF%9C%E7%A8%8B%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C%E6%BC%8F%E6%B4%9E&amp;url=/archives/cve-2025-33053-wang-luo-kuai-jie-fang-shi-wen-jian-yuan-cheng-dai-ma-zhi-xing-lou-dong" width="1" height="1" alt="" style="opacity:0;">CVE-2025-33053 网络快捷方式文件远程代码执行漏洞 背景 微软6月修复了一个网络快捷方式的漏洞，由checkpoint捕获的APT组织Stealth Falcon样本中发现的。]]></description><guid isPermaLink="false">/archives/cve-2025-33053-wang-luo-kuai-jie-fang-shi-wen-jian-yuan-cheng-dai-ma-zhi-xing-lou-dong</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F%E8%81%94%E6%83%B3%E6%88%AA%E5%9B%BE_20250626223847.png&amp;size=m" type="image/jpeg" length="0"/><category>漏洞</category><pubDate>Thu, 26 Jun 2025 14:38:00 GMT</pubDate></item><item><title><![CDATA[Realtek RTL8762E SDK v1.4.0 中的配对随机数过早注入漏洞]]></title><link>http://localhost:8080/archives/realtek-rtl8762e-sdk-v1.4.0-zhong-de-pei-dui-sui-ji-shu-guo-zao-zhu-ru-lou-dong</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=Realtek%20RTL8762E%20SDK%20v1.4.0%20%E4%B8%AD%E7%9A%84%E9%85%8D%E5%AF%B9%E9%9A%8F%E6%9C%BA%E6%95%B0%E8%BF%87%E6%97%A9%E6%B3%A8%E5%85%A5%E6%BC%8F%E6%B4%9E&amp;url=/archives/realtek-rtl8762e-sdk-v1.4.0-zhong-de-pei-dui-sui-ji-shu-guo-zao-zhu-ru-lou-dong" width="1" height="1" alt="" style="opacity:0;">1. 概述 在使用 RTL8762E SDK v1.4.0 的 Realtek RTL8762EKF-EVB 开发平台中发现了一个拒绝服务（DoS）漏洞。在蓝牙安全连接配对过程中，设备在接收到必需的配对公钥之前就接受了精心构造的配对随机数数据包，导致状态机违规。这会引起协议不一致，使配对过程失败并拒]]></description><guid isPermaLink="false">/archives/realtek-rtl8762e-sdk-v1.4.0-zhong-de-pei-dui-sui-ji-shu-guo-zao-zhu-ru-lou-dong</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%281%29_%E5%89%AF%E6%9C%AC-fmez.png&amp;size=m" type="image/jpeg" length="0"/><category>漏洞</category><pubDate>Thu, 26 Jun 2025 14:31:12 GMT</pubDate></item><item><title><![CDATA[风险隐患报告生成器]]></title><link>http://localhost:8080/archives/feng-xian-yin-huan-bao-gao-sheng-cheng-qi</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E9%A3%8E%E9%99%A9%E9%9A%90%E6%82%A3%E6%8A%A5%E5%91%8A%E7%94%9F%E6%88%90%E5%99%A8&amp;url=/archives/feng-xian-yin-huan-bao-gao-sheng-cheng-qi" width="1" height="1" alt="" style="opacity:0;">工具介绍 风险隐患报告生成器是一款专业的安全报告管理工具，支持创建、编辑、管理多个安全评估项目，并能一键生成规范的 Word 格式报告文档。应用采用现代化的桌面端架构，提供流畅的用户体验和丰富的功能特性。]]></description><guid isPermaLink="false">/archives/feng-xian-yin-huan-bao-gao-sheng-cheng-qi</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%2855%29_%E5%89%AF%E6%9C%AC-wgvs.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Mon, 23 Jun 2025 12:27:00 GMT</pubDate></item><item><title><![CDATA[Lockbit勒索软件犯罪团伙逐渐崩溃，Qilin 掌控局面]]></title><link>http://localhost:8080/archives/lockbitle-suo-ruan-jian-fan-zui-tuan-huo-zhu-jian-beng-kui-qilin-zhang-kong-ju-mian</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=Lockbit%E5%8B%92%E7%B4%A2%E8%BD%AF%E4%BB%B6%E7%8A%AF%E7%BD%AA%E5%9B%A2%E4%BC%99%E9%80%90%E6%B8%90%E5%B4%A9%E6%BA%83%EF%BC%8CQilin%20%E6%8E%8C%E6%8E%A7%E5%B1%80%E9%9D%A2&amp;url=/archives/lockbitle-suo-ruan-jian-fan-zui-tuan-huo-zhu-jian-beng-kui-qilin-zhang-kong-ju-mian" width="1" height="1" alt="" style="opacity:0;">Qilin 如何趁乱统治勒索软件江湖 Qilin泄露站点 2024-2025 年间，RansomHub、LockBit、Everest、]]></description><guid isPermaLink="false">/archives/lockbitle-suo-ruan-jian-fan-zui-tuan-huo-zhu-jian-beng-kui-qilin-zhang-kong-ju-mian</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%2853%29.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Mon, 23 Jun 2025 12:17:11 GMT</pubDate></item><item><title><![CDATA[银狐利用快连 vpn 和 QQ 浏览器传播恶意程序 Winos v4.0]]></title><link>http://localhost:8080/archives/yin-hu-li-yong-kuai-lian-vpn-he-qq-liu-lan-qi-chuan-bo-e-yi-cheng-xu-winos-v4.0</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E9%93%B6%E7%8B%90%E5%88%A9%E7%94%A8%E5%BF%AB%E8%BF%9E%20vpn%20%E5%92%8C%20QQ%20%E6%B5%8F%E8%A7%88%E5%99%A8%E4%BC%A0%E6%92%AD%E6%81%B6%E6%84%8F%E7%A8%8B%E5%BA%8F%20Winos%20v4.0&amp;url=/archives/yin-hu-li-yong-kuai-lian-vpn-he-qq-liu-lan-qi-chuan-bo-e-yi-cheng-xu-winos-v4.0" width="1" height="1" alt="" style="opacity:0;">概述 Rapid7安全研究团队最近发现了一个复杂的恶意软件传播活动，攻击者通过伪装成热门软件（如VPN客户端、QQ浏览器等）的安装包来分发Winos v4.0恶意软件。这种恶意软件完全在内存中运行，极难被传统杀毒软件检测到，一旦感染可为攻击者提供远程访问权限。 该活动最早在2025年2月的一次MDR]]></description><guid isPermaLink="false">/archives/yin-hu-li-yong-kuai-lian-vpn-he-qq-liu-lan-qi-chuan-bo-e-yi-cheng-xu-winos-v4.0</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%2865%29_%E5%89%AF%E6%9C%AC-kpli.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Sun, 22 Jun 2025 12:35:24 GMT</pubDate></item><item><title><![CDATA[FBI关于杀猪盘加密货币投资诈骗的紧急报告]]></title><link>http://localhost:8080/archives/fbiguan-yu-sha-zhu-pan-jia-mi-huo-bi-tou-zi-zha-pian-de-jin-ji-bao-gao</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=FBI%E5%85%B3%E4%BA%8E%E6%9D%80%E7%8C%AA%E7%9B%98%E5%8A%A0%E5%AF%86%E8%B4%A7%E5%B8%81%E6%8A%95%E8%B5%84%E8%AF%88%E9%AA%97%E7%9A%84%E7%B4%A7%E6%80%A5%E6%8A%A5%E5%91%8A&amp;url=/archives/fbiguan-yu-sha-zhu-pan-jia-mi-huo-bi-tou-zi-zha-pian-de-jin-ji-bao-gao" width="1" height="1" alt="" style="opacity:0;">2025年5月29日，美国联邦调查局（FBI）网络犯罪部门发布了一份标有“TLP:CLEAR”的FLASH报告（编号20250529-001），旨在向网络安全专业人员和系统管理员提供有关菲律宾公司Funnull Technology Inc.（以下简称Funnull）参与加密货币投资诈骗（CIF，俗]]></description><guid isPermaLink="false">/archives/fbiguan-yu-sha-zhu-pan-jia-mi-huo-bi-tou-zi-zha-pian-de-jin-ji-bao-gao</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%2862%29_%E5%89%AF%E6%9C%AC-mmya.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Sun, 22 Jun 2025 12:26:49 GMT</pubDate></item><item><title><![CDATA[微软和CrowdStrike合作标准化黑客团体命名]]></title><link>http://localhost:8080/archives/wei-ruan-he-crowdstrikehe-zuo-biao-zhun-hua-hei-ke-tuan-ti-ming-ming</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E5%BE%AE%E8%BD%AF%E5%92%8CCrowdStrike%E5%90%88%E4%BD%9C%E6%A0%87%E5%87%86%E5%8C%96%E9%BB%91%E5%AE%A2%E5%9B%A2%E4%BD%93%E5%91%BD%E5%90%8D&amp;url=/archives/wei-ruan-he-crowdstrikehe-zuo-biao-zhun-hua-hei-ke-tuan-ti-ming-ming" width="1" height="1" alt="" style="opacity:0;">前言 在2025年6月2日，微软和CrowdStrike宣布了一项战略合作，旨在通过映射不同网络安全公司对黑客团体的命名来标准化威胁行为者的标识。这一举措回应了网络安全行业长期存在的问题：不同公司对同一威胁团体的命名不一致，导致情报共享和威胁响应效率低下。例如，一个知名的俄罗斯网络间谍团体可能被Ma]]></description><guid isPermaLink="false">/archives/wei-ruan-he-crowdstrikehe-zuo-biao-zhun-hua-hei-ke-tuan-ti-ming-ming</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%283%29_%E5%89%AF%E6%9C%AC-vrmu.jpg&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Sun, 22 Jun 2025 12:20:00 GMT</pubDate></item><item><title><![CDATA[华硕 Armoury Crate 漏洞允许攻击者获取 Windows 管理员权限]]></title><link>http://localhost:8080/archives/hua-shuo-armoury-crate-lou-dong-yun-xu-gong-ji-zhe-huo-qu-windows-guan-li-yuan-quan-xian</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E5%8D%8E%E7%A1%95%20Armoury%20Crate%20%E6%BC%8F%E6%B4%9E%E5%85%81%E8%AE%B8%E6%94%BB%E5%87%BB%E8%80%85%E8%8E%B7%E5%8F%96%20Windows%20%E7%AE%A1%E7%90%86%E5%91%98%E6%9D%83%E9%99%90&amp;url=/archives/hua-shuo-armoury-crate-lou-dong-yun-xu-gong-ji-zhe-huo-qu-windows-guan-li-yuan-quan-xian" width="1" height="1" alt="" style="opacity:0;">前言 华硕 Armoury Crate 软件中一个高危漏洞可能允许威胁行为者在 Windows 机器上将他们的权限提升到 SYSTEM 级别。 该安全问题被追踪为 CVE-2025-3464，并获得了 8.8 分（满分 10 分）的严重性评分。 它可能被利用来绕过授权，并影响 Armoury Cra]]></description><guid isPermaLink="false">/archives/hua-shuo-armoury-crate-lou-dong-yun-xu-gong-ji-zhe-huo-qu-windows-guan-li-yuan-quan-xian</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%282%29_%E5%89%AF%E6%9C%AC-ruqg.jpg&amp;size=m" type="image/jpeg" length="0"/><category>漏洞</category><pubDate>Sun, 22 Jun 2025 12:13:06 GMT</pubDate></item><item><title><![CDATA[暴露Grafana Alerting中的DingDing API 密钥CVE-2025-3415]]></title><link>http://localhost:8080/archives/bao-lu-grafana-alertingzhong-de-dingding-api-mi-yao-cve-2025-3415</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E6%9A%B4%E9%9C%B2Grafana%20Alerting%E4%B8%AD%E7%9A%84DingDing%20API%20%E5%AF%86%E9%92%A5CVE-2025-3415&amp;url=/archives/bao-lu-grafana-alertingzhong-de-dingding-api-mi-yao-cve-2025-3415" width="1" height="1" alt="" style="opacity:0;">Grafana Vulnerability, DingDing CVE-2023-3128 前言 Grafana Labs 发布了一轮安全补丁，以解决 CVE-2025-3415，这是一个中危漏洞 (CVSS 4.3)，可能在 Grafana Alerting 中暴露敏感配置数据，特别是 DingD]]></description><guid isPermaLink="false">/archives/bao-lu-grafana-alertingzhong-de-dingding-api-mi-yao-cve-2025-3415</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%2859%29_%E5%89%AF%E6%9C%AC-zktr.png&amp;size=m" type="image/jpeg" length="0"/><category>漏洞</category><pubDate>Fri, 20 Jun 2025 12:48:45 GMT</pubDate></item><item><title><![CDATA[Telegram与俄罗斯联邦安全局（FSB）关系及用户隐私风险分析]]></title><link>http://localhost:8080/archives/telegramyu-e-luo-si-lian-bang-an-quan-ju-fsb-guan-xi-ji-yong-hu-yin-si-feng-xian-fen-xi</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=Telegram%E4%B8%8E%E4%BF%84%E7%BD%97%E6%96%AF%E8%81%94%E9%82%A6%E5%AE%89%E5%85%A8%E5%B1%80%EF%BC%88FSB%EF%BC%89%E5%85%B3%E7%B3%BB%E5%8F%8A%E7%94%A8%E6%88%B7%E9%9A%90%E7%A7%81%E9%A3%8E%E9%99%A9%E5%88%86%E6%9E%90&amp;url=/archives/telegramyu-e-luo-si-lian-bang-an-quan-ju-fsb-guan-xi-ji-yong-hu-yin-si-feng-xian-fen-xi" width="1" height="1" alt="" style="opacity:0;">近期多家调查显示，Telegram的通信基础设施与俄罗斯联邦安全局（FSB）间存在若干关联，引发对用户隐私的严重关切。Telegram一直以加密和隐私保护著称，官方宣称其“从未向第三方提供过一字节的用户信息”。然而，多项最新报道指出：Telegram部分底层网络由与俄罗斯情报机构有联系的企业提供服务]]></description><guid isPermaLink="false">/archives/telegramyu-e-luo-si-lian-bang-an-quan-ju-fsb-guan-xi-ji-yong-hu-yin-si-feng-xian-fen-xi</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F%E8%81%94%E6%83%B3%E6%88%AA%E5%9B%BE_20250620204325.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Fri, 20 Jun 2025 12:43:43 GMT</pubDate></item><item><title><![CDATA[OpenAI、Anthropic 和 Gemini 越狱指北]]></title><link>http://localhost:8080/archives/openai-anthropic-he-gemini-yue-yu-zhi-bei</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=OpenAI%E3%80%81Anthropic%20%E5%92%8C%20Gemini%20%E8%B6%8A%E7%8B%B1%E6%8C%87%E5%8C%97&amp;url=/archives/openai-anthropic-he-gemini-yue-yu-zhi-bei" width="1" height="1" alt="" style="opacity:0;">https://arxiv.org/html/2506.07948v1 一项名为 “TokenBreak” 的新型规避技术被发现，该技术能有效 绕过基于 AI 的内容审核系统 ，包括那些在流行的 AI 模型、聊天机器人和内容过滤器中使用的系统。这种方法通过 在有害或受限内容中插入微小改动（如单字符编]]></description><guid isPermaLink="false">/archives/openai-anthropic-he-gemini-yue-yu-zhi-bei</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%2858%29_%E5%89%AF%E6%9C%AC-vgou.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Fri, 20 Jun 2025 12:40:22 GMT</pubDate></item><item><title><![CDATA[伊朗 Handala 黑客组织全面剖析]]></title><link>http://localhost:8080/archives/yi-lang-handala-hei-ke-zu-zhi-quan-mian-pou-xi</link><description><![CDATA[<img src="http://localhost:8080/plugins/feed/assets/telemetry.gif?title=%E4%BC%8A%E6%9C%97%20Handala%20%E9%BB%91%E5%AE%A2%E7%BB%84%E7%BB%87%E5%85%A8%E9%9D%A2%E5%89%96%E6%9E%90&amp;url=/archives/yi-lang-handala-hei-ke-zu-zhi-quan-mian-pou-xi" width="1" height="1" alt="" style="opacity:0;">Handala Hacking Team 全面剖析 本文深入解析伊朗关联网络威胁行动体 Handala Hacking Team（下文简称 Handala）——涵盖其起源、演进、关键行动、技术能力与现状，旨在为网络安全决策者提供可执行情报，并揭示此威胁的多面属性。 Handala 于 2023 年末]]></description><guid isPermaLink="false">/archives/yi-lang-handala-hei-ke-zu-zhi-quan-mian-pou-xi</guid><dc:creator>Administrator</dc:creator><enclosure url="http://localhost:8080/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=%2Fupload%2F640%2520%2857%29_%E5%89%AF%E6%9C%AC-tfay.png&amp;size=m" type="image/jpeg" length="0"/><category>网络安全</category><pubDate>Fri, 20 Jun 2025 12:32:13 GMT</pubDate></item></channel></rss>