5.27-6.9奇安信社区内容分享

下面是我总结出来的几篇:

Weevely管理工具免杀马研究:https://forum.butian.net/share/4330
CVE-2025-46731|CraftCMS Twig SSTI 代码执行漏洞分析与复现:https://forum.butian.net/article/725
AsyncRAT基于RAM运行的轻量级远程访问木马分析:https://forum.butian.net/share/3942
如何利用AI大模型辅助漏洞挖掘:https://forum.butian.net/share/4378
vLLM PyNcclPipe pickle反序列化漏洞(CVE-2025-47277):https://forum.butian.net/article/736
一些vmpwn的详细总结:https://forum.butian.net/share/3968
vmpwn从入门到精通:https://forum.butian.net/share/4363
CVE-2025-45529 sscms存在任意文件读取漏洞分析:https://forum.butian.net/article/733
ClassPathXmlApplicationContext的不出网利用学习:https://forum.butian.net/share/4373
CVE-2025-32432:Craft CMS 远程代码执行漏洞:https://forum.butian.net/article/728
基于条件干预的大模型推理时防御:https://forum.butian.net/share/4349
Vulnserver.exe漏洞分析及利用:https://forum.butian.net/share/4013
AI Red Teaming探索:https://forum.butian.net/share/4387
大模型应用提示词重构攻击:https://forum.butian.net/share/4347
Windows内核:初探 ELAM:https://forum.butian.net/share/3953
CCBCISCN初赛Pwn部分题解:https://forum.butian.net/share/4364
高效漏洞挖掘的技战法:https://forum.butian.net/share/4417
Veeam Backup RCE (CVE-2024-40711):https://forum.butian.net/share/4000
远程访问木马RAT样本分析:https://forum.butian.net/share/3943

后续会做一些总结和自己的理解,可以关注博客内容

声明:本篇文章仅做分享用于教育目的

posted @ 2025-06-09 17:56  Elma-sorin  阅读(8)  评论(0)    收藏  举报