Need help with sec_profile?
Click the “chat” button below for chat support from the developer who created it, or find similar developers for support.

About the developer

tanjiti
495 Stars 128 Forks 197 Commits 1 Opened issues

Description

爬取secwiki和xuanwu.github.io/sec.today,分析安全信息站点、安全趋势、提取安全工作者账号(twitter,weixin,github等)

Services available

!
?

Need anything else?

Contributors list

No Data

数据--所有

数据--年度

202011 信息源与信息类型占比

202011-信息源占比-secwiki

202011-信息源占比-xuanwu

202011-信息类型占比-xuanwu

202011-最喜欢语言占比

微信公众号 推荐

| nicknameenglish | weixinno | title | url| | --- | --- | --- | ---| | 有赞coder | youzancoder | 接口越权扫描平台初探 | https://mp.weixin.qq.com/s/epVb1Y4WQ-MWeRhRPlvofg | 1| | 穿过丛林 | ghf90eac70537b | 基于程序分析的大数据应用内存预估方法 | https://mp.weixin.qq.com/s/C3yN9nIRTN9ebmvOd8S2JA | 1| | Netlab 三六零 | Netlab360 | DNSMon: 用DNS数据进行威胁发现 | https://mp.weixin.qq.com/s/6CtRd7o4IjreLaU-hFt9vQ | 1| | 伪架构师 | fake-architect | (译)云原生安全白皮书 | https://mp.weixin.qq.com/s/uH7M7vR1m0CJhoVfr-DisQ | 1| | 匠心独运维妙维效 | gh54f52b20027d | 浅谈中间件安全漏洞修复体系建设 | https://mp.weixin.qq.com/s/6bJskpLJLAEIXdGq5Hljw | 1| | 大数据猫 | kitten-talking-data | 阿里云ClickHouse海量数据分析分享 | https://mp.weixin.qq.com/s/MnirNdLxyvrCAPd51SiW6w | 1| | 阿里巴巴中间件 | Aliware2018 | 我看技术人的成长路径 | https://mp.weixin.qq.com/s/m6NbHb9UUtiSOMPnKgId3g | 1| | 安全乐观主义 | ghd6239d0bb816 | 浅谈华为SDL软件安全工程能力 | https://mp.weixin.qq.com/s/i1N80qN14hGslRnrIV8mjg | 2| | 腾讯安全应急响应中心 | tsrcteam | 物联网安全系列之探索IoT通信安全的研究之道 | https://mp.weixin.qq.com/s/6KviA72Ke0I9ZVYusTDpoA | 1| | 龙渊实验室 | LongYuanLab | 基于Flink的网络流量实时解析 | https://mp.weixin.qq.com/s/i7f7p9HBE-03YWNnlNdPA | 1| | ChaMd5安全团队 | chamd5sec | 智能合约:整数溢出、访问控制缺陷漏洞与跨合约调用漏洞 | https://mp.weixin.qq.com/s/XRrHeugDMV-6ANRxC0ov3Q | 1| | 安恒信息安全研究院 | gh684e6ad8d12c | 2020西湖论剑IoT闯关赛回顾&Writeup(嵌入式Web部分)【附集赞获奖名单】 | https://mp.weixin.qq.com/s/IGZUIY2w8aRJZUbZa3UqHA | 1| | 潇湘信安 | xxxasec | 利用avdump转储lsass.exe进程 | https://mp.weixin.qq.com/s/bHDMTlY-YZxx9dS-MqQfRA | 10| | 360BugCloud | bugcloud360 | Python 源码混淆与加密 | https://mp.weixin.qq.com/s/LmxdXRjMCOIisQzCISBoGw | 1| | VIPKID安全响应中心 | vksrc | 【VK技术分享】Docker安全实践 | https://mp.weixin.qq.com/s/9PWg4jIztJcutAY-ohzJUw | 1| | 时间之外沉浮事 | tasnrh | NIST《网络靶场指南》浅析 | https://mp.weixin.qq.com/s/0FQwtu-TKyVuaAhpdu0huA | 1| | 蚂蚁安全实验室 | AlipaySecurityLab | 探索先进自动化漏洞挖掘技术中的不足 | https://mp.weixin.qq.com/s/1qYCJoyCREtgU3X20uqQ | 1| | 酒仙桥六号部队 | anfu-360 | 从网关进入内网到DNS协议出网 | https://mp.weixin.qq.com/s/LjtSgwv7fWDEjPgh1tZw | 1| | 数据派THU | DatapiTHU | 独家 , 使用Spark进行大规模图形挖掘(附链接) | https://mp.weixin.qq.com/s/vytVTAgU-6iRG-drf9eYQ | 1| | 看雪学院 | ikanxue | 姚辉 , 技术老兵谈杀毒软件沉浮史 | https://mp.weixin.qq.com/s/4bL4yTtOwX2hSZWsk5J5Q | 1| | 合天智汇 | heetian | 细说php反序列化字符逃逸 | https://mp.weixin.qq.com/s/7jAS7RGuBBz6M8U6lQv-w | 1| | 法制天平 | g780216 | 帮助信息网络犯罪活动罪案例汇总 | https://mp.weixin.qq.com/s/RlFD6H-4j5g2R49IE9ghw | 1| | 安全先师 | ghd61f62dd440d | 蜜罐调研与内网安全 | https://mp.weixin.qq.com/s/-lJT3PNsj-VvMxalHb06AA | 1| | 爱奇艺技术产品团队 | iQIYI-TP | 开源 , HMGNN:异构小图神经网络及其在拉新裂变风控场景的应用 | https://mp.weixin.qq.com/s/VRDOQsEdA-QfNRtKQCSjUA | 1| | 锦行信息安全 | jeeseensec | 技术文章 , windows横向渗透中的令牌完整性限制 | https://mp.weixin.qq.com/s/idzRDjcQDPdiAd4dnJQs0w | 1| | 安全学术圈 | secquan | 安全学术研究趋势分析 | https://mp.weixin.qq.com/s/UKBhgtnYIPI6uzuPYn59A | 1| | 腾讯科恩实验室 | KeenSecurityLab | 科恩实验室最新NeurIPS-2020论文解读:基于跨模态检索的二进制代码-源代码匹配 | https://mp.weixin.qq.com/s/fvnvh25VaHgproPvVT6LDg | 1| | nmask | nmask-article | 黑客诱捕器—蜜罐的部署与使用 | https://mp.weixin.qq.com/s/TPb3E1fRszdEwp6Yyn8mQw | 1| | 嘶吼专业版 | Pro4hou | 安全运营之攻击溯源 | https://mp.weixin.qq.com/s/9Yx4gK5-7CbP9Aqy-twpVw | 1| | 梦之光芒的电子梦 | monyermp | 人生是一个回环 —— 我的十年安全工作总结 | https://mp.weixin.qq.com/s/OiBtKzKaWuzVvBGOrwC5A | 1| | 绿盟科技研究通讯 | nsfocusresearch | Serverless安全研究 — Serverless安全风险 | https://mp.weixin.qq.com/s/rbS042RBiFu8UFFQW4kew | 1| | 赛博星人 | cyberspace666 | 红蓝对抗之内网中psexec的行为捕获 | https://mp.weixin.qq.com/s/G7GdbgXNn5FAR78Edps-w | 1| | Coggle数据科学 | gh8df601c10cb4 | 蚂蚁金服-支付风险识别亚军方案 | https://mp.weixin.qq.com/s/5NNTeLvqWl0SQaPl-Cvug | 1| | 网络安全观 | SecurityInsights | CrowdStrike , 无文件攻击白皮书 | https://mp.weixin.qq.com/s/0jMTOKsvV9q70Gz04veHg | 1| | 腾讯代码安全检查Xcheck | gh177b81103e8d | Xcheck之Java安全检查引擎 | https://mp.weixin.qq.com/s/rb1BfcZeCTr2PIiypXqVjw | 1|

组织github账号 推荐

| githubid | title | url | orgurl | orgprofile | orggeo | orgrepositories | orgpeople | orgprojects | repolang | repostar | repoforks| | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | ---|

私人github账号 推荐

| githubid | title | url | purl | pprofile | ploc | pcompany | prepositories | pprojects | pstars | pfollowers | pfollowing | repolang | repostar | repoforks | | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | --- | ---| | 0x36 | kernel exploit for Apple iOS 13.X | https://github.com/0x36/oobevents | https://twitter.com/simo36 | | None | None | 7 | 0 | 0 | 0 | 0 | Python,C,Makefile | 171 | 46 | 1| | 3v4Si0N | HTTP-revshell: 用于Red team练习和渗透测试者的Powershell脚本工具,通过HTTP/S协议反向链接。 | https://github.com/3v4Si0N/HTTP-revshell | None | Security Analyst at @Deloitte | Spain | https://twitter.com/3v4Si0N | 10 | 0 | 0 | 0 | 0 | Python,C,PowerShell | 205 | 29 | 1| | Ch1ngg | SharpGetTitle - 基于 C# 的多线程 Web Title 扫描器 | https://github.com/Ch1ngg/SharpGetTitle | https://www.ch1ng.com/ | | no | no | 25 | 0 | 0 | 0 | 0 | Python,C#,ASP,Java | 117 | 20 | 2| | Charmve | Bluetooth-LE安全性:方法,工具和堆栈视频会议学习资源。 | https://github.com/Charmve/BLE-Security-Attack-Defence | https://charmve.github.io/ | Research SDE at the Future Security Labs in Qihoo 360, B.E. in Electronic Engineering & B.A. in Business English at Yangzhou University | Suzhou, Beijing, Shanghai, Hongkong | Qihoo 360 | 33 | 0 | 0 | 0 | 0 | Python,C,Java,C++ | 6 | 2 | 1| | MalPhobic | Abbadon 远控工具使用 Discord 作为 C&C | https://github.com/MalPhobic/MalwareReports/blob/main/AbbadonRAT/AbbadonRAT.pdf | None | None | None | None | 0 | 0 | 0 | 0 | 0 | | 0 | 0 | 1| | OWASP | OWASP NodeGoat项目资源,了解OWASP十大安全风险,如何使用Node.js开发的Web应用程序安全问题、 | https://github.com/OWASP/NodeGoat | None | None | None | None | 0 | 0 | 0 | 0 | 0 | Shell,Java,Python,JavaScript,Perl,HTML,Go,Ruby,CSS | 0 | 0 | 1| | RedTeamPentesting | Apache Tomcat WebSocket 漏洞 (CVE-2020-13935) Exploit | https://github.com/RedTeamPentesting/CVE-2020-13935 | None | None | None | None | 0 | 0 | 0 | 0 | 0 | Go | 0 | 0 | 1| | Sentinel-One | 基于 Qiling 框架实现的 UEFI NVRAM 变量 Fuzzer | https://github.com/Sentinel-One/efifuzz | None | None | None | None | 0 | 0 | 0 | 0 | 0 | C,TypeScript,Java,Python,JavaScript,C++,C#,Objective-C,HTML,Shell | 0 | 0 | 1| | airbus-seclab | Diffware - 文件、目录 Diff 工具,支持多种配置参数 | https://github.com/airbus-seclab/diffware | None | None | None | None | 0 | 0 | 0 | 0 | 0 | C,Python,OCaml,C++,Ruby,PowerShell | 1000 | 137 | 1| | antonio-morales | Hackfest - Advanced Fuzzing Workshop 的资料 | https://github.com/antonio-morales/HackfestAdvancedFuzzingWorkshop | https://twitter.com/Nosoynadiemas | | None | None | 6 | 0 | 0 | 0 | 0 | C,JavaScript,Rich | 106 | 20 | 1| | cyber-research | 5个国家的APT恶意软件数据集。 | https://github.com/cyber-research/APTMalware | None | | None | None | 2 | 0 | 0 | 0 | 0 | Python | 52 | 10 | 1| | didi | Sharingan是一个基于go语言编写的流量录制回放工具,合项目重构、回归测试等。 | https://github.com/didi/sharingan | None | None | None | None | 0 | 0 | 0 | 0 | 0 | C,Vue,Java,Python,Kotlin,JavaScript,C++,TypeScript,Objective-C,HTML,Go,CSS | 15800 | 2200 | 1| | fabacab | 蓝队最好的学习资源项目。 | https://github.com/fabacab/awesome-cybersecurity-blueteam | None | ⚑ Ⓐnti-capitalist Free Software developer, Black Lives Matter, abolish all prisons, 0xACAB ⚑ | None | Code signing GPG key: 0x15FC01926CB6D75614790893B0303BF6BA36A560 | 197 | 0 | 0 | 0 | 0 | Shell,HTML,PHP | 1100 | 248 | 1| | forest0 | 微信聊天记录导出工具 | https://github.com/forest0/wechathistoryexport | None | | None | None | 5 | 0 | 0 | 0 | 0 | Python,C,HTML,Jupyter,Vim | 28 | 7 | 1| | google | C++语言接口基础(CLIF)知识介绍。 | https://github.com/google/clif | None | None | None | None | 0 | 0 | 0 | 0 | 0 | TypeScript,Java,Python,JavaScript,C++,Objective-C,Haskell,Starlark,Go,Jupyter | 0 | 0 | 1| | grimm-co | 为 Ghidra 二进制分析工具编写脚本,辅助还原 stripped 二进制内的结构体 | https://github.com/grimm-co/GEARSHIFT | None | None | None | None | 0 | 0 | 0 | 0 | 0 | C,Shell,Java,Python,C++,Go | 0 | 0 | 1| | hayasec | 一键辅助抓取 360 安全浏览器密码的 CobaltStrike 脚本 | https://github.com/hayasec/360SafeBrowsergetpass | http://hayasec.me | Network Security Engineer | None | None | 72 | 0 | 0 | 0 | 0 | Python,C#,Java,C++ | 110 | 13 | 1| | kwart | jd-cli:是对Java Decompiler反编译器项目命令软件包,可在win与Linux运行使用。 | https://github.com/kwart/jd-cli | http://javlog.cacek.cz/ | | Czech Republic | Contractor | 73 | 0 | 0 | 0 | 0 | Shell,Java | 318 | 80 | 1| | marcinguy | Chrome 浏览器 Freetype 字体处理溢出漏洞 PoC(CVE-2020-15999) | https://github.com/marcinguy/CVE-2020-15999// | https://twitter.com/marcinguy | IT | Berlin, Germany | None | 58 | 0 | 0 | 0 | 0 | Python,C | 310 | 97 | 1| | mq1n | 一个可以借助有物理内存读写权限的驱动实现调用任意内核函数的库。 | https://github.com/mq1n/VDM// | None | | Turkey | None | 1200 | 0 | 0 | 0 | 0 | C++ | 178 | 100 | 1| | nghiadt1098 | Windows 内核 CVE-2020-16889 漏洞的 PoC | https://github.com/nghiadt1098/MyResearch/tree/main/CVE-2020-16889 | https://www.facebook.com/nghiadt1098 | Viettel Cyber Security | Ha Noi, Viet Nam | None | 31 | 0 | 0 | 0 | 0 | Java,Python,JavaScript,C++,Pascal,HTML | 0 | 2 | 1| | shellphish | Shellphish 最近更新了 how2heap Repo,包含最新的各类堆利用技巧 | https://github.com/shellphish/how2heap | None | None | None | None | 0 | 0 | 0 | 0 | 0 | Python,C,CSS | 4100 | 855 | 1| | target | halogen: Automatically create YARA rules from malicious do... | https://github.com/target/halogen | None | None | None | None | 0 | 0 | 0 | 0 | 0 | Shell,FreeMarker,Scala,Python,JavaScript,C++,Haskell,CSS,Go,Ruby,Rust | 1100 | 101 | 1| | uknowsec | TailorScan: 自用缝合怪内网扫描器 | https://github.com/uknowsec/TailorScan | http://uknowsec.cn | 不忘初心,方得始终 | Nanjing | None | 45 | 0 | 0 | 0 | 0 | C#,Python,Go | 976 | 226 | 1| | vxunderground | vxunderground 按照不同语言收集的恶意软件源码 | https://github.com/vxunderground/MalwareSourceCode | https://vx-underground.org | The largest collection of malware source code, samples, and papers on the internet. | International | None | 2 | 0 | 0 | 0 | 0 | Go,Assembly | 2800 | 276 | 1| | zbnio | zbn: 安全编排与自动化响应平台 | https://github.com/zbnio/zbn | None | None | None | None | 0 | 0 | 0 | 0 | 0 | Python | 0 | 0 | 1| | zodiacon | zodiacon 开源的一个类似 Process Explorer 的工具 | https://github.com/zodiacon/SystemExplorer | https://scorpiosoftware.net | | Israel | None | 72 | 0 | 0 | 0 | 0 | C#,C,C++ | 413 | 105 | 1|

medium_xuanwu 推荐

| title | url| | --- | ---| | WP: 发现 SSTI 漏洞并绕过 WAF | http://cyc10n3.medium.com/rce-via-server-side-template-injection-ad46f8e0c2ae| | 在 Python 中调用 Objective C 代码 | http://medium.com/red-teaming-with-a-blue-team-mentaility/making-objective-c-calls-from-python-standard-libraries-550ed3a30a30| | TP-Link Takeover with a Flash Drive | http://medium.com/tenable-techblog/tp-link-takeover-with-a-flash-drive-d493666f6b39| | A Deep Dive Into Windows Scheduled Tasks and The Processes Running Them | http://nasbench.medium.com/a-deep-dive-into-windows-scheduled-tasks-and-the-processes-running-them-218d1eed4cce|

medium_secwiki 推荐

| title | url| | --- | ---|

zhihu_xuanwu 推荐

| title | url| | --- | ---|

zhihu_secwiki 推荐

| title | url| | --- | ---| | 自然语言处理的未来十年 | https://zhuanlan.zhihu.com/p/289716231|

xz_xuanwu 推荐

| title | url| | --- | ---|

xz_secwiki 推荐

| title | url| | --- | ---| | 从sql注入到连接3389 | https://xz.aliyun.com/t/8561| | 记一次三层网络环境的靶场渗透 | https://xz.aliyun.com/t/8519| | 高级的MSSQL注入技巧 | https://xz.aliyun.com/t/8513| | 从0到tfp0第一部分:基础知识 | https://xz.aliyun.com/t/8509| | UEditor编辑器任意文件上传漏洞分析 | https://xz.aliyun.com/t/8488| | 某HW行动中的一次渗透测试 | https://xz.aliyun.com/t/8493| | 云上渗透-RDS数据库攻防 | https://xz.aliyun.com/t/8451| | XSS 实战攻击思路总结 | https://xz.aliyun.com/t/8459|

日更新程序

python update_daily.py

We use cookies. If you continue to browse the site, you agree to the use of cookies. For more information on our use of cookies please see our Privacy Policy.