-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathcontent.json
More file actions
1 lines (1 loc) · 38.1 KB
/
content.json
File metadata and controls
1 lines (1 loc) · 38.1 KB
1
[{"title":"[译文] AutoWarp: Microsoft Azure自动化服务中的严重跨帐户漏洞","date":"2023-02-26T10:48:20.000Z","path":"2023/02/26/译文-AutoWarp-Microsoft-Azure自动化服务中的严重跨帐户漏洞/","updated":"2023-02-26T13:28:30.434Z","tags":[{"name":"udf","slug":"udf","permalink":"https://exexute.github.io/tags/udf/"},{"name":"CloudSecurity","slug":"CloudSecurity","permalink":"https://exexute.github.io/tags/CloudSecurity/"},{"name":"unauthorized","slug":"unauthorized","permalink":"https://exexute.github.io/tags/unauthorized/"}]},{"title":"从0开始上手使用nebula图数据库","date":"2022-09-18T21:51:47.000Z","path":"2022/09/19/从0开始上手使用nebula图数据库/","updated":"2022-10-16T01:15:10.291Z","tags":[]},{"title":"GoLang native sca tool for developer","date":"2022-09-08T11:36:34.000Z","path":"2022/09/08/Go-Native-SCA-Tool-For-Developer/","updated":"2022-09-08T23:52:24.903Z","tags":[{"name":"Go","slug":"Go","permalink":"https://exexute.github.io/tags/Go/"},{"name":"SCA","slug":"SCA","permalink":"https://exexute.github.io/tags/SCA/"}]},{"title":"白盒检测工具之Java与Kotlin混编漏洞检测","date":"2022-09-08T00:03:07.000Z","path":"2022/09/08/白盒检测工具之Java与Kotlin混编漏洞检测/","updated":"2022-09-06T23:52:10.362Z","tags":[{"name":"AST-Framework","slug":"AST-Framework","permalink":"https://exexute.github.io/tags/AST-Framework/"},{"name":"SAST","slug":"SAST","permalink":"https://exexute.github.io/tags/SAST/"},{"name":"代码分析","slug":"代码分析","permalink":"https://exexute.github.io/tags/代码分析/"}]},{"title":"白盒检测工具之跨二三方包检测","date":"2022-09-07T00:02:50.000Z","path":"2022/09/07/白盒检测工具之跨二三方包检测/","updated":"2022-09-07T14:23:19.816Z","tags":[{"name":"AST-Framework","slug":"AST-Framework","permalink":"https://exexute.github.io/tags/AST-Framework/"},{"name":"SAST","slug":"SAST","permalink":"https://exexute.github.io/tags/SAST/"},{"name":"代码分析","slug":"代码分析","permalink":"https://exexute.github.io/tags/代码分析/"}]},{"title":"白盒检测工具之代码统计","date":"2022-09-06T00:02:25.000Z","path":"2022/09/06/白盒检测工具之代码预分析/","updated":"2022-09-06T23:29:07.689Z","tags":[{"name":"AST-Framework","slug":"AST-Framework","permalink":"https://exexute.github.io/tags/AST-Framework/"},{"name":"SAST","slug":"SAST","permalink":"https://exexute.github.io/tags/SAST/"},{"name":"代码分析","slug":"代码分析","permalink":"https://exexute.github.io/tags/代码分析/"}]},{"title":"如何反编译RPM包","date":"2022-08-13T08:53:46.000Z","path":"2022/08/13/如何反编译RPM包/","updated":"2022-09-06T14:23:08.267Z","tags":[{"name":"反编译","slug":"反编译","permalink":"https://exexute.github.io/tags/反编译/"}]},{"title":"Linux如何强制覆盖文件","date":"2022-08-13T08:53:31.000Z","path":"2022/08/13/Linux如何强制覆盖文件/","updated":"2022-08-13T09:20:36.776Z","tags":[{"name":"linux","slug":"linux","permalink":"https://exexute.github.io/tags/linux/"}]},{"title":"Gin框架: 从0开始搭建 Gin Web 服务","date":"2022-07-27T14:04:08.000Z","path":"2022/07/27/Gin框架-从0开始搭建-Gin-Web-服务/","updated":"2022-08-14T06:43:16.362Z","tags":[{"name":"Go","slug":"Go","permalink":"https://exexute.github.io/tags/Go/"},{"name":"Gin","slug":"Gin","permalink":"https://exexute.github.io/tags/Gin/"}]},{"title":"CVE-2022-33980: Apache-Commons-Configuration2 ScriptEngine RCE","date":"2022-07-11T16:09:48.000Z","path":"2022/07/12/CVE-2022-33980-Apache-Commons-Configuration2-ScriptEngine-RCE/","updated":"2022-08-14T05:37:03.946Z","tags":[{"name":"ScriptEngine","slug":"ScriptEngine","permalink":"https://exexute.github.io/tags/ScriptEngine/"},{"name":"Apache-Commons-Configuration2","slug":"Apache-Commons-Configuration2","permalink":"https://exexute.github.io/tags/Apache-Commons-Configuration2/"}]},{"title":"Java Jsch组件研究","date":"2022-06-30T00:43:22.000Z","path":"2022/06/30/Java-Jsch组件研究/","updated":"2022-09-06T14:24:14.040Z","tags":[{"name":"JSch","slug":"JSch","permalink":"https://exexute.github.io/tags/JSch/"}]},{"title":"从 0 开始在 Java 项目中使用 gRPC","date":"2022-02-07T04:19:55.000Z","path":"2022/02/07/How-to-use-gRPC-in-Java-Project/","updated":"2022-06-24T14:06:06.890Z","tags":[{"name":"Java","slug":"Java","permalink":"https://exexute.github.io/tags/Java/"},{"name":"gRPC","slug":"gRPC","permalink":"https://exexute.github.io/tags/gRPC/"}]},{"title":"Github Actions中元数据的语法.md","date":"2022-01-04T10:49:26.000Z","path":"2022/01/04/Github-Actions中元数据的语法-md/","updated":"2022-06-24T00:08:18.658Z","tags":[{"name":"Github CI","slug":"Github-CI","permalink":"https://exexute.github.io/tags/Github-CI/"}]},{"title":"洞态IAST-自动检测S2-007","date":"2021-04-24T01:00:46.000Z","path":"2021/04/24/洞态IAST-自动检测S2-007/","updated":"2022-09-06T14:23:36.440Z","tags":[{"name":"IAST","slug":"IAST","permalink":"https://exexute.github.io/tags/IAST/"},{"name":"漏洞分析","slug":"漏洞分析","permalink":"https://exexute.github.io/tags/漏洞分析/"}]},{"title":"洞态IAST-自动检测S2-001","date":"2021-04-16T12:29:44.000Z","path":"2021/04/16/洞态IAST-自动检测S2-001/","updated":"2022-09-06T14:23:33.137Z","tags":[{"name":"IAST","slug":"IAST","permalink":"https://exexute.github.io/tags/IAST/"},{"name":"漏洞分析","slug":"漏洞分析","permalink":"https://exexute.github.io/tags/漏洞分析/"}]},{"title":"Django之优雅的使用分页","date":"2021-02-04T15:19:03.000Z","path":"2021/02/04/Django之优雅的使用分页/","updated":"2022-06-24T14:17:26.364Z","tags":[{"name":"Python","slug":"Python","permalink":"https://exexute.github.io/tags/Python/"},{"name":"Django","slug":"Django","permalink":"https://exexute.github.io/tags/Django/"},{"name":"分页","slug":"分页","permalink":"https://exexute.github.io/tags/分页/"}]},{"title":"Django之优雅的使用logging","date":"2021-01-30T23:17:38.000Z","path":"2021/01/31/Django之优雅的使用logging/","updated":"2022-06-24T14:17:21.218Z","tags":[{"name":"Python","slug":"Python","permalink":"https://exexute.github.io/tags/Python/"},{"name":"Django","slug":"Django","permalink":"https://exexute.github.io/tags/Django/"},{"name":"logging","slug":"logging","permalink":"https://exexute.github.io/tags/logging/"}]},{"title":"DjangoRestFramework认证之自定义TokenAuthentication实现CSRF防御","date":"2020-12-21T14:21:26.000Z","path":"2020/12/21/django之自定义TokenAuthentication实现CSRF防御/","updated":"2022-06-24T14:17:29.700Z","tags":[{"name":"Django","slug":"Django","permalink":"https://exexute.github.io/tags/Django/"}]},{"title":"【转载】持续集成服务Travis之github集成CI","date":"2020-10-19T15:12:18.000Z","path":"2020/10/19/持续集成服务Travis之github集成CI/","updated":"2022-09-06T14:23:27.960Z","tags":[{"name":"Travis CI","slug":"Travis-CI","permalink":"https://exexute.github.io/tags/Travis-CI/"}]},{"title":"【持续更新】Java代码开发规范之重构","date":"2020-10-18T06:39:47.000Z","path":"2020/10/18/Java代码开发规范-重构/","updated":"2022-08-14T05:40:10.984Z","tags":[{"name":"代码规范","slug":"代码规范","permalink":"https://exexute.github.io/tags/代码规范/"},{"name":"重构","slug":"重构","permalink":"https://exexute.github.io/tags/重构/"}]},{"title":"Spring Boot Actuator之jolokia利用","date":"2020-10-11T14:21:19.000Z","path":"2020/10/11/Spring-Boot-Actuator之通过jolokia利用/","updated":"2022-06-24T14:10:53.323Z","tags":[{"name":"actuator","slug":"actuator","permalink":"https://exexute.github.io/tags/actuator/"},{"name":"MBeans","slug":"MBeans","permalink":"https://exexute.github.io/tags/MBeans/"}]},{"title":"IAST交互式安全测试之核心流程","date":"2020-10-10T15:12:18.000Z","path":"2020/10/10/IAST-交互式安全测试工具关键技术流程/","updated":"2022-09-06T14:24:10.962Z","tags":[{"name":"IAST","slug":"IAST","permalink":"https://exexute.github.io/tags/IAST/"}]},{"title":"Linux提权之PATH环境变量(译文)","date":"2020-06-15T22:50:29.000Z","path":"2020/06/16/Linux提权之PATH环境变量/","updated":"2022-06-24T14:08:19.367Z","tags":[{"name":"PATH","slug":"PATH","permalink":"https://exexute.github.io/tags/PATH/"},{"name":"linux","slug":"linux","permalink":"https://exexute.github.io/tags/linux/"},{"name":"privilege escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"}]},{"title":"HTB-Windows-Resolute","date":"2020-06-07T03:27:41.000Z","path":"2020/06/07/HTB-Windows-Resolute/","updated":"2022-06-24T14:37:08.024Z","tags":[{"name":"dnsadmins","slug":"dnsadmins","permalink":"https://exexute.github.io/tags/dnsadmins/"}]},{"title":"windows privilege escalate: DnsAdmins Group","date":"2020-06-06T21:53:41.000Z","path":"2020/06/07/windows-privilege-escalate-DnsAdmins-Group/","updated":"2022-06-24T14:14:32.207Z","tags":[{"name":"Windows","slug":"Windows","permalink":"https://exexute.github.io/tags/Windows/"},{"name":"DnsAdmins","slug":"DnsAdmins","permalink":"https://exexute.github.io/tags/DnsAdmins/"}]},{"title":"HTB Windows Nest","date":"2020-02-22T16:48:51.000Z","path":"2020/02/23/HTB-Windows-Nest/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"smb","slug":"smb","permalink":"https://exexute.github.io/tags/smb/"},{"name":"custom decrypt","slug":"custom-decrypt","permalink":"https://exexute.github.io/tags/custom-decrypt/"},{"name":"stage","slug":"stage","permalink":"https://exexute.github.io/tags/stage/"},{"name":"NTFS交换数据流隐写","slug":"NTFS交换数据流隐写","permalink":"https://exexute.github.io/tags/NTFS交换数据流隐写/"},{"name":"HQK Reporting Service V1.2","slug":"HQK-Reporting-Service-V1-2","permalink":"https://exexute.github.io/tags/HQK-Reporting-Service-V1-2/"}]},{"title":"HTB Linux Postman","date":"2020-01-20T00:54:18.000Z","path":"2020/01/20/HTB-Linux-Postman/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"Crack id_rsa","slug":"Crack-id-rsa","permalink":"https://exexute.github.io/tags/Crack-id-rsa/"},{"name":"redis 4.0.9","slug":"redis-4-0-9","permalink":"https://exexute.github.io/tags/redis-4-0-9/"},{"name":"backup file","slug":"backup-file","permalink":"https://exexute.github.io/tags/backup-file/"},{"name":"webmin 1.910","slug":"webmin-1-910","permalink":"https://exexute.github.io/tags/webmin-1-910/"},{"name":"cve-2019-12840","slug":"cve-2019-12840","permalink":"https://exexute.github.io/tags/cve-2019-12840/"}]},{"title":"HTB Linux Traverxec","date":"2020-01-19T23:41:00.000Z","path":"2020/01/20/HTB-Linux-Traverxec/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"Crack id_rsa","slug":"Crack-id-rsa","permalink":"https://exexute.github.io/tags/Crack-id-rsa/"},{"name":"nostromo","slug":"nostromo","permalink":"https://exexute.github.io/tags/nostromo/"},{"name":"nostromo 1.9.6","slug":"nostromo-1-9-6","permalink":"https://exexute.github.io/tags/nostromo-1-9-6/"},{"name":"CVE-2019-16278","slug":"CVE-2019-16278","permalink":"https://exexute.github.io/tags/CVE-2019-16278/"},{"name":"Cisco IOS Hash","slug":"Cisco-IOS-Hash","permalink":"https://exexute.github.io/tags/Cisco-IOS-Hash/"},{"name":"nostromo conf","slug":"nostromo-conf","permalink":"https://exexute.github.io/tags/nostromo-conf/"},{"name":"suid","slug":"suid","permalink":"https://exexute.github.io/tags/suid/"},{"name":"journalctl","slug":"journalctl","permalink":"https://exexute.github.io/tags/journalctl/"}]},{"title":"HTB Linux OpenAdmin","date":"2020-01-11T01:52:55.000Z","path":"2020/01/11/HTB-Linux-OpenAdmin/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"OpenNetAdmin v18.1.1","slug":"OpenNetAdmin-v18-1-1","permalink":"https://exexute.github.io/tags/OpenNetAdmin-v18-1-1/"},{"name":"Password Reuse","slug":"Password-Reuse","permalink":"https://exexute.github.io/tags/Password-Reuse/"},{"name":"Local Port Exploit","slug":"Local-Port-Exploit","permalink":"https://exexute.github.io/tags/Local-Port-Exploit/"},{"name":"Crack id_rsa","slug":"Crack-id-rsa","permalink":"https://exexute.github.io/tags/Crack-id-rsa/"},{"name":"sudo","slug":"sudo","permalink":"https://exexute.github.io/tags/sudo/"}]},{"title":"htb-windows-Forest","date":"2019-12-12T13:52:36.000Z","path":"2019/12/12/htb-windows-Forest/","updated":"2022-06-24T14:37:08.064Z","tags":[]},{"title":"HTB Windows Legacy","date":"2019-12-09T14:30:43.000Z","path":"2019/12/09/HTB-Windows-Legacy/","updated":"2022-06-24T14:37:08.064Z","tags":[{"name":"MS08-067","slug":"MS08-067","permalink":"https://exexute.github.io/tags/MS08-067/"}]},{"title":"HTB Linux Beep","date":"2019-12-08T09:00:43.000Z","path":"2019/12/08/HTB-Linux-Beep/","updated":"2022-06-24T14:37:07.859Z","tags":[{"name":"OSCP","slug":"OSCP","permalink":"https://exexute.github.io/tags/OSCP/"},{"name":"Elastix","slug":"Elastix","permalink":"https://exexute.github.io/tags/Elastix/"}]},{"title":"HTB Windows Devel","date":"2019-12-07T10:40:20.000Z","path":"2019/12/07/HTB-Windows-Devel/","updated":"2022-06-24T14:37:08.024Z","tags":[{"name":"OSCP","slug":"OSCP","permalink":"https://exexute.github.io/tags/OSCP/"},{"name":"windows","slug":"windows","permalink":"https://exexute.github.io/tags/windows/"},{"name":"ftp","slug":"ftp","permalink":"https://exexute.github.io/tags/ftp/"},{"name":"MS11-046","slug":"MS11-046","permalink":"https://exexute.github.io/tags/MS11-046/"},{"name":"Sherlock","slug":"Sherlock","permalink":"https://exexute.github.io/tags/Sherlock/"}]},{"title":"HTB Linux Lame","date":"2019-12-06T23:20:18.000Z","path":"2019/12/07/HTB-Linux-Lame/","updated":"2022-06-24T14:37:08.064Z","tags":[{"name":"OSCP","slug":"OSCP","permalink":"https://exexute.github.io/tags/OSCP/"},{"name":"CVE-2007-2447","slug":"CVE-2007-2447","permalink":"https://exexute.github.io/tags/CVE-2007-2447/"}]},{"title":"Python Code Injection","date":"2019-08-29T08:09:47.000Z","path":"2019/08/29/Python-Code-Injection/","updated":"2022-06-24T14:10:23.476Z","tags":[{"name":"代码注入","slug":"代码注入","permalink":"https://exexute.github.io/tags/代码注入/"},{"name":"eval","slug":"eval","permalink":"https://exexute.github.io/tags/eval/"},{"name":"exec","slug":"exec","permalink":"https://exexute.github.io/tags/exec/"}]},{"title":"HTB linux Craft","date":"2019-08-29T03:51:34.000Z","path":"2019/08/29/HTB-linux-Craft/","updated":"2022-06-24T14:37:08.024Z","tags":[{"name":"gogs","slug":"gogs","permalink":"https://exexute.github.io/tags/gogs/"},{"name":"git信息搜集","slug":"git信息搜集","permalink":"https://exexute.github.io/tags/git信息搜集/"},{"name":"代码注入","slug":"代码注入","permalink":"https://exexute.github.io/tags/代码注入/"},{"name":"虚拟主机","slug":"虚拟主机","permalink":"https://exexute.github.io/tags/虚拟主机/"},{"name":"SSH私钥登陆","slug":"SSH私钥登陆","permalink":"https://exexute.github.io/tags/SSH私钥登陆/"},{"name":"vault","slug":"vault","permalink":"https://exexute.github.io/tags/vault/"}]},{"title":"HTB linux Haystack","date":"2019-08-29T03:51:19.000Z","path":"2019/08/29/HTB-linux-Haystack/","updated":"2022-06-24T14:37:08.044Z","tags":[{"name":"misc","slug":"misc","permalink":"https://exexute.github.io/tags/misc/"},{"name":"ELK","slug":"ELK","permalink":"https://exexute.github.io/tags/ELK/"},{"name":"logstash","slug":"logstash","permalink":"https://exexute.github.io/tags/logstash/"},{"name":"CVE-2018-17246","slug":"CVE-2018-17246","permalink":"https://exexute.github.io/tags/CVE-2018-17246/"}]},{"title":"HTB-windows-Arkman","date":"2019-08-22T03:14:50.000Z","path":"2019/08/22/HTB-windows-Arkman/","updated":"2022-06-24T14:37:08.024Z","tags":[{"name":"deserialization","slug":"deserialization","permalink":"https://exexute.github.io/tags/deserialization/"},{"name":"viewstates","slug":"viewstates","permalink":"https://exexute.github.io/tags/viewstates/"},{"name":"luks","slug":"luks","permalink":"https://exexute.github.io/tags/luks/"},{"name":"ysoserial","slug":"ysoserial","permalink":"https://exexute.github.io/tags/ysoserial/"},{"name":"readpst","slug":"readpst","permalink":"https://exexute.github.io/tags/readpst/"}]},{"title":"NoSql Injection - Patrick Spiegel(翻译)","date":"2019-08-13T02:34:35.000Z","path":"2019/08/13/NoSql-Injection-Patrick-Spiegel/","updated":"2022-06-24T14:09:00.720Z","tags":[{"name":"NoSql","slug":"NoSql","permalink":"https://exexute.github.io/tags/NoSql/"},{"name":"MongoDB","slug":"MongoDB","permalink":"https://exexute.github.io/tags/MongoDB/"},{"name":"Redis","slug":"Redis","permalink":"https://exexute.github.io/tags/Redis/"},{"name":"Memcached","slug":"Memcached","permalink":"https://exexute.github.io/tags/Memcached/"},{"name":"CouchDB","slug":"CouchDB","permalink":"https://exexute.github.io/tags/CouchDB/"}]},{"title":"HTB linux Jarvis","date":"2019-08-12T06:02:33.000Z","path":"2019/08/12/HTB-linux-Jarvis/","updated":"2022-06-24T14:37:08.024Z","tags":[{"name":"sudoers","slug":"sudoers","permalink":"https://exexute.github.io/tags/sudoers/"},{"name":"suid","slug":"suid","permalink":"https://exexute.github.io/tags/suid/"},{"name":"sql注入","slug":"sql注入","permalink":"https://exexute.github.io/tags/sql注入/"},{"name":"OS命令执行","slug":"OS命令执行","permalink":"https://exexute.github.io/tags/OS命令执行/"}]},{"title":"HTB linux LuKe","date":"2019-07-31T15:42:03.000Z","path":"2019/07/31/HTB-linux-LuKe/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"jwt","slug":"jwt","permalink":"https://exexute.github.io/tags/jwt/"}]},{"title":"SSL 双向认证","date":"2019-07-14T06:25:09.000Z","path":"2019/07/14/SSL-双向认证/","updated":"2022-06-24T14:10:57.269Z","tags":[{"name":"SSL双向认证","slug":"SSL双向认证","permalink":"https://exexute.github.io/tags/SSL双向认证/"}]},{"title":"Python Deserialize Analyze","date":"2019-07-05T10:24:55.000Z","path":"2019/07/05/Python-Deserialize-Analyze/","updated":"2022-06-24T14:25:30.203Z","tags":[{"name":"反序列化","slug":"反序列化","permalink":"https://exexute.github.io/tags/反序列化/"},{"name":"Pickle","slug":"Pickle","permalink":"https://exexute.github.io/tags/Pickle/"}]},{"title":"HTB linux LaCasaDePapel","date":"2019-07-04T14:07:26.000Z","path":"2019/07/04/HTB-linux-LaCasaDePapel/","updated":"2022-06-24T14:37:07.860Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"LFI","slug":"LFI","permalink":"https://exexute.github.io/tags/LFI/"},{"name":"ssl","slug":"ssl","permalink":"https://exexute.github.io/tags/ssl/"},{"name":"psysh","slug":"psysh","permalink":"https://exexute.github.io/tags/psysh/"},{"name":"php_function","slug":"php-function","permalink":"https://exexute.github.io/tags/php-function/"},{"name":"symblink","slug":"symblink","permalink":"https://exexute.github.io/tags/symblink/"}]},{"title":"PasswordAttacks","date":"2019-07-02T15:32:41.000Z","path":"2019/07/02/PasswordAttacks/","updated":"2022-06-24T14:09:26.314Z","tags":[{"name":"Crunch","slug":"Crunch","permalink":"https://exexute.github.io/tags/Crunch/"},{"name":"HashDump","slug":"HashDump","permalink":"https://exexute.github.io/tags/HashDump/"},{"name":"PasswordDump","slug":"PasswordDump","permalink":"https://exexute.github.io/tags/PasswordDump/"},{"name":"HashAttack","slug":"HashAttack","permalink":"https://exexute.github.io/tags/HashAttack/"},{"name":"PassTheHash","slug":"PassTheHash","permalink":"https://exexute.github.io/tags/PassTheHash/"}]},{"title":"ClientSideAttack","date":"2019-07-02T14:45:32.000Z","path":"2019/07/02/ClientSideAttack/","updated":"2022-06-24T14:03:10.673Z","tags":[{"name":"java_applet","slug":"java-applet","permalink":"https://exexute.github.io/tags/java-applet/"}]},{"title":"File Transfers","date":"2019-07-01T05:20:51.000Z","path":"2019/07/01/File-Transfers/","updated":"2022-06-24T14:27:59.442Z","tags":[{"name":"文件下载","slug":"文件下载","permalink":"https://exexute.github.io/tags/文件下载/"}]},{"title":"Win32 Buffer Overflow (slmail)","date":"2019-06-26T13:20:32.000Z","path":"2019/06/26/Win32-Buffer-Overflow-slmail/","updated":"2022-06-24T14:27:12.723Z","tags":[{"name":"slmail","slug":"slmail","permalink":"https://exexute.github.io/tags/slmail/"},{"name":"exp_dev","slug":"exp-dev","permalink":"https://exexute.github.io/tags/exp-dev/"}]},{"title":"privilege escalate with Hijacking","date":"2019-06-24T01:26:07.000Z","path":"2019/06/24/privilege-escalate-with-Hijacking/","updated":"2022-06-24T14:20:08.994Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"Hijacking","slug":"Hijacking","permalink":"https://exexute.github.io/tags/Hijacking/"},{"name":"cheatsheet","slug":"cheatsheet","permalink":"https://exexute.github.io/tags/cheatsheet/"}]},{"title":"HTB-linux-WriteUp","date":"2019-06-20T14:00:00.000Z","path":"2019/06/20/HTB-linux-WriteUp/","updated":"2022-06-24T14:37:07.860Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"Hijacking","slug":"Hijacking","permalink":"https://exexute.github.io/tags/Hijacking/"},{"name":"cmsms","slug":"cmsms","permalink":"https://exexute.github.io/tags/cmsms/"},{"name":"CVE","slug":"CVE","permalink":"https://exexute.github.io/tags/CVE/"},{"name":"PATH","slug":"PATH","permalink":"https://exexute.github.io/tags/PATH/"}]},{"title":"How Hacking in SMB","date":"2019-06-12T13:25:18.000Z","path":"2019/06/12/How-Hacking-in-SMB/","updated":"2022-06-24T15:04:08.638Z","tags":[{"name":"smb","slug":"smb","permalink":"https://exexute.github.io/tags/smb/"},{"name":"smb_tools","slug":"smb-tools","permalink":"https://exexute.github.io/tags/smb-tools/"}]},{"title":"How Hacking in AD","date":"2019-06-12T13:03:55.000Z","path":"2019/06/12/How-Hacking-in-AD/","updated":"2022-06-24T14:05:59.589Z","tags":[{"name":"mimikatz","slug":"mimikatz","permalink":"https://exexute.github.io/tags/mimikatz/"}]},{"title":"how hacking in DNS","date":"2019-06-12T13:03:41.000Z","path":"2019/06/12/how-hacking-in-DNS/","updated":"2022-06-24T15:04:08.638Z","tags":[{"name":"dns","slug":"dns","permalink":"https://exexute.github.io/tags/dns/"},{"name":"dng","slug":"dng","permalink":"https://exexute.github.io/tags/dng/"},{"name":"nslookup","slug":"nslookup","permalink":"https://exexute.github.io/tags/nslookup/"},{"name":"fierce","slug":"fierce","permalink":"https://exexute.github.io/tags/fierce/"},{"name":"dnsenum","slug":"dnsenum","permalink":"https://exexute.github.io/tags/dnsenum/"},{"name":"dnsrecon","slug":"dnsrecon","permalink":"https://exexute.github.io/tags/dnsrecon/"}]},{"title":"HTB-linux-FriendZone","date":"2019-06-10T15:42:57.000Z","path":"2019/06/10/HTB-linux-FriendZone/","updated":"2022-06-24T14:37:07.902Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"smb","slug":"smb","permalink":"https://exexute.github.io/tags/smb/"},{"name":"zone_transfer","slug":"zone-transfer","permalink":"https://exexute.github.io/tags/zone-transfer/"},{"name":"LFI","slug":"LFI","permalink":"https://exexute.github.io/tags/LFI/"},{"name":"Hijacking","slug":"Hijacking","permalink":"https://exexute.github.io/tags/Hijacking/"}]},{"title":"HTB-linux-SwagShop","date":"2019-05-16T22:50:51.000Z","path":"2019/05/17/HTB-linux-SwagShop/","updated":"2022-06-24T14:37:08.024Z","tags":[{"name":"sudoers","slug":"sudoers","permalink":"https://exexute.github.io/tags/sudoers/"},{"name":"magento","slug":"magento","permalink":"https://exexute.github.io/tags/magento/"},{"name":"privilete_escalate","slug":"privilete-escalate","permalink":"https://exexute.github.io/tags/privilete-escalate/"}]},{"title":"HTB-windows-Bastion","date":"2019-05-07T23:23:58.000Z","path":"2019/05/08/HTB-windows-Bastion/","updated":"2022-06-24T14:37:08.024Z","tags":[{"name":"mremoteng_decrypt","slug":"mremoteng-decrypt","permalink":"https://exexute.github.io/tags/mremoteng-decrypt/"},{"name":"qemu_nbd","slug":"qemu-nbd","permalink":"https://exexute.github.io/tags/qemu-nbd/"},{"name":"VHD","slug":"VHD","permalink":"https://exexute.github.io/tags/VHD/"},{"name":"mount_smb_share","slug":"mount-smb-share","permalink":"https://exexute.github.io/tags/mount-smb-share/"},{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"}]},{"title":"how to get a tty from reverse shell","date":"2019-04-27T02:39:25.000Z","path":"2019/04/27/how-to-get-a-tty-from-reverse-shell/","updated":"2022-06-24T14:06:12.318Z","tags":[{"name":"reverse_shell","slug":"reverse-shell","permalink":"https://exexute.github.io/tags/reverse-shell/"},{"name":"cheatsheet","slug":"cheatsheet","permalink":"https://exexute.github.io/tags/cheatsheet/"},{"name":"tty","slug":"tty","permalink":"https://exexute.github.io/tags/tty/"}]},{"title":"how hacking with LaTex","date":"2019-04-24T14:34:56.000Z","path":"2019/04/24/how-hacking-with-LaTex/","updated":"2022-06-24T14:06:16.857Z","tags":[{"name":"latex","slug":"latex","permalink":"https://exexute.github.io/tags/latex/"}]},{"title":"how get a reverse shell","date":"2019-04-24T04:20:18.000Z","path":"2019/04/24/how-get-a-reverse-shell/","updated":"2022-06-24T14:04:27.999Z","tags":[{"name":"reverse_shell","slug":"reverse-shell","permalink":"https://exexute.github.io/tags/reverse-shell/"},{"name":"cheatsheet","slug":"cheatsheet","permalink":"https://exexute.github.io/tags/cheatsheet/"}]},{"title":"Pentesting test in windows","date":"2019-04-22T14:20:59.000Z","path":"2019/04/22/windows内网渗透思路/","updated":"2022-06-24T14:37:12.663Z","tags":[{"name":"MS-Sql","slug":"MS-Sql","permalink":"https://exexute.github.io/tags/MS-Sql/"},{"name":"信息收集","slug":"信息收集","permalink":"https://exexute.github.io/tags/信息收集/"},{"name":"pass the hash","slug":"pass-the-hash","permalink":"https://exexute.github.io/tags/pass-the-hash/"}]},{"title":"hacktools for windows","date":"2019-04-22T14:18:55.000Z","path":"2019/04/22/hacktools-for-windows/","updated":"2022-06-24T14:34:37.467Z","tags":[{"name":"smbclient","slug":"smbclient","permalink":"https://exexute.github.io/tags/smbclient/"}]},{"title":"HTB_windows_Netmon","date":"2019-04-21T04:01:19.000Z","path":"2019/04/21/HTB-windows-Netmon/","updated":"2022-06-24T14:37:08.044Z","tags":[{"name":"ftp","slug":"ftp","permalink":"https://exexute.github.io/tags/ftp/"},{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"cve","slug":"cve","permalink":"https://exexute.github.io/tags/cve/"},{"name":"smbclient","slug":"smbclient","permalink":"https://exexute.github.io/tags/smbclient/"},{"name":"PRTG","slug":"PRTG","permalink":"https://exexute.github.io/tags/PRTG/"}]},{"title":"HTB-windows-querier","date":"2019-04-18T16:26:20.000Z","path":"2019/04/19/HTB-windows-querier/","updated":"2022-09-06T14:24:43.323Z","tags":[{"name":"excel macros","slug":"excel-macros","permalink":"https://exexute.github.io/tags/excel-macros/"},{"name":"smb share","slug":"smb-share","permalink":"https://exexute.github.io/tags/smb-share/"},{"name":"MS-Sql","slug":"MS-Sql","permalink":"https://exexute.github.io/tags/MS-Sql/"},{"name":"ntlmhash","slug":"ntlmhash","permalink":"https://exexute.github.io/tags/ntlmhash/"},{"name":"Group Policy Preferences","slug":"Group-Policy-Preferences","permalink":"https://exexute.github.io/tags/Group-Policy-Preferences/"},{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"}]},{"title":"HTB-linux-chaos","date":"2019-04-18T16:25:02.000Z","path":"2019/04/19/HTB-linux-chaos/","updated":"2022-06-24T14:37:08.044Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"wordpress","slug":"wordpress","permalink":"https://exexute.github.io/tags/wordpress/"},{"name":"email","slug":"email","permalink":"https://exexute.github.io/tags/email/"},{"name":"decrypt","slug":"decrypt","permalink":"https://exexute.github.io/tags/decrypt/"},{"name":"latex","slug":"latex","permalink":"https://exexute.github.io/tags/latex/"},{"name":"rbash","slug":"rbash","permalink":"https://exexute.github.io/tags/rbash/"},{"name":"firefox_decrypt","slug":"firefox-decrypt","permalink":"https://exexute.github.io/tags/firefox-decrypt/"}]},{"title":"HTB_linux_Help","date":"2019-04-15T15:42:57.000Z","path":"2019/04/15/HTB-linux-Help/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"cve","slug":"cve","permalink":"https://exexute.github.io/tags/cve/"},{"name":"任意文件上传","slug":"任意文件上传","permalink":"https://exexute.github.io/tags/任意文件上传/"}]},{"title":"Malware_analysis_php","date":"2019-04-15T12:14:19.000Z","path":"2019/04/15/Malware-analysis-php/","updated":"2022-06-24T14:08:42.284Z","tags":[{"name":"malware_ayalysis","slug":"malware-ayalysis","permalink":"https://exexute.github.io/tags/malware-ayalysis/"},{"name":"php_shell","slug":"php-shell","permalink":"https://exexute.github.io/tags/php-shell/"}]},{"title":"HTB_Linux_irked","date":"2019-04-15T05:32:51.000Z","path":"2019/04/15/HTB-Linux-irked/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"suid","slug":"suid","permalink":"https://exexute.github.io/tags/suid/"},{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"cve","slug":"cve","permalink":"https://exexute.github.io/tags/cve/"},{"name":"unrealircd","slug":"unrealircd","permalink":"https://exexute.github.io/tags/unrealircd/"},{"name":"steghide","slug":"steghide","permalink":"https://exexute.github.io/tags/steghide/"}]},{"title":"Vulnhub-Challenging-WebDeveloper","date":"2019-04-08T13:39:58.000Z","path":"2019/04/08/Vulnhub-Challenging-WebDeveloper/","updated":"2022-06-24T14:37:07.860Z","tags":[{"name":"sudoers","slug":"sudoers","permalink":"https://exexute.github.io/tags/sudoers/"},{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"wordpress","slug":"wordpress","permalink":"https://exexute.github.io/tags/wordpress/"},{"name":"pcap_analyze","slug":"pcap-analyze","permalink":"https://exexute.github.io/tags/pcap-analyze/"}]},{"title":"Vulnhub-Challenging-Born2Root-2","date":"2019-04-04T16:47:05.000Z","path":"2019/04/05/Vulnhub-Challenging-Born2Root-2/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"joomla","slug":"joomla","permalink":"https://exexute.github.io/tags/joomla/"}]},{"title":"Vulnhub-Challenging-unknowndevice64-v1.0","date":"2019-03-31T00:37:17.000Z","path":"2019/03/31/Vulnhub-Challenging-unknowndevice64-v1-0/","updated":"2022-06-24T14:37:07.860Z","tags":[{"name":"sudoers","slug":"sudoers","permalink":"https://exexute.github.io/tags/sudoers/"},{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"steghide","slug":"steghide","permalink":"https://exexute.github.io/tags/steghide/"},{"name":"reverse_rbash","slug":"reverse-rbash","permalink":"https://exexute.github.io/tags/reverse-rbash/"}]},{"title":"privilege escalate with SUID","date":"2019-03-27T05:03:49.000Z","path":"2019/03/27/privilege-escalate-with-SUID/","updated":"2022-06-24T14:20:09.019Z","tags":[{"name":"suid","slug":"suid","permalink":"https://exexute.github.io/tags/suid/"},{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"cheatsheet","slug":"cheatsheet","permalink":"https://exexute.github.io/tags/cheatsheet/"}]},{"title":"privilege escalate with sudoers","date":"2019-03-26T05:09:49.000Z","path":"2019/03/26/sudoers-get-root-cheatsheet/","updated":"2022-06-24T14:20:09.040Z","tags":[{"name":"sudoers","slug":"sudoers","permalink":"https://exexute.github.io/tags/sudoers/"},{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"cheatsheet","slug":"cheatsheet","permalink":"https://exexute.github.io/tags/cheatsheet/"}]},{"title":"linux_find_hacking","date":"2019-03-26T02:01:17.000Z","path":"2019/03/26/linux-find-hacking/","updated":"2022-06-24T14:08:00.513Z","tags":[{"name":"search_file","slug":"search-file","permalink":"https://exexute.github.io/tags/search-file/"}]},{"title":"cve_2019_1003000_jenkins系列RCE漏洞分析","date":"2019-03-25T04:55:35.000Z","path":"2019/03/25/cve-2019-1003000-jenkins系列RCE漏洞分析/","updated":"2022-06-24T14:03:57.953Z","tags":[{"name":"rce","slug":"rce","permalink":"https://exexute.github.io/tags/rce/"},{"name":"sandbox","slug":"sandbox","permalink":"https://exexute.github.io/tags/sandbox/"}]},{"title":"Python MetaClass","date":"2019-03-25T03:26:12.000Z","path":"2019/03/25/python-MetaClass/","updated":"2022-06-24T14:10:44.771Z","tags":[{"name":"Python","slug":"Python","permalink":"https://exexute.github.io/tags/Python/"}]},{"title":"csrf_prevention","date":"2019-03-21T01:11:34.000Z","path":"2019/03/21/csrf-prevention/","updated":"2022-06-24T14:03:38.113Z","tags":[{"name":"甲方安全","slug":"甲方安全","permalink":"https://exexute.github.io/tags/甲方安全/"}]},{"title":"port_service_vul","date":"2019-03-20T01:27:54.000Z","path":"2019/03/20/port-service-vul/","updated":"2022-06-24T14:09:40.483Z","tags":[{"name":"services","slug":"services","permalink":"https://exexute.github.io/tags/services/"}]},{"title":"dirb实战","date":"2019-03-20T00:51:48.000Z","path":"2019/03/20/dirb最佳实践/","updated":"2022-06-24T14:27:35.800Z","tags":[{"name":"url_brute","slug":"url-brute","permalink":"https://exexute.github.io/tags/url-brute/"}]},{"title":"Vulnhub Challenging: Raven","date":"2019-03-05T14:00:00.000Z","path":"2019/03/05/Vulnhub-Challenging-Raven/","updated":"2022-06-24T14:37:08.084Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"wordpress","slug":"wordpress","permalink":"https://exexute.github.io/tags/wordpress/"},{"name":"ssh","slug":"ssh","permalink":"https://exexute.github.io/tags/ssh/"},{"name":"udf","slug":"udf","permalink":"https://exexute.github.io/tags/udf/"}]},{"title":"cve_2014_0160_心脏滴血漏洞分析","date":"2019-03-04T23:51:46.000Z","path":"2019/03/05/cve-2014-0160-心脏滴血漏洞分析/","updated":"2022-06-24T14:03:51.385Z","tags":[{"name":"内存越界访问","slug":"内存越界访问","permalink":"https://exexute.github.io/tags/内存越界访问/"},{"name":"openssl","slug":"openssl","permalink":"https://exexute.github.io/tags/openssl/"}]},{"title":"kong安装lua waf之最佳实践","date":"2018-12-25T11:00:48.000Z","path":"2018/12/25/kong安装lua-waf之最佳实践/","updated":"2022-06-24T14:08:10.694Z","tags":[{"name":"甲方安全","slug":"甲方安全","permalink":"https://exexute.github.io/tags/甲方安全/"},{"name":"WAF","slug":"WAF","permalink":"https://exexute.github.io/tags/WAF/"}]},{"title":"Python 特性总结","date":"2018-12-18T14:13:50.000Z","path":"2018/12/18/Python-器/","updated":"2022-06-24T14:16:26.753Z","tags":[{"name":"Python","slug":"Python","permalink":"https://exexute.github.io/tags/Python/"}]},{"title":"设计模式:工厂模式","date":"2018-12-18T13:16:21.000Z","path":"2018/12/18/设计模式-工厂模式/","updated":"2022-06-24T14:02:50.895Z","tags":[{"name":"Python","slug":"Python","permalink":"https://exexute.github.io/tags/Python/"},{"name":"设计模式","slug":"设计模式","permalink":"https://exexute.github.io/tags/设计模式/"}]},{"title":"设计模式: 单例模式","date":"2018-12-17T12:50:38.000Z","path":"2018/12/17/设计模式-单例模式/","updated":"2022-06-24T14:02:36.294Z","tags":[{"name":"Python","slug":"Python","permalink":"https://exexute.github.io/tags/Python/"},{"name":"设计模式","slug":"设计模式","permalink":"https://exexute.github.io/tags/设计模式/"}]},{"title":"Vulnhub Challenging: Temple of doom 1","date":"2018-12-13T01:38:46.000Z","path":"2018/12/13/VUlnhub-Challenging-Temple-of-doom-1/","updated":"2022-06-24T14:37:07.860Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"反序列化","slug":"反序列化","permalink":"https://exexute.github.io/tags/反序列化/"},{"name":"node_rce","slug":"node-rce","permalink":"https://exexute.github.io/tags/node-rce/"},{"name":"ss-manager","slug":"ss-manager","permalink":"https://exexute.github.io/tags/ss-manager/"}]},{"title":"Vulnhub Challenging: jarbas","date":"2018-12-11T11:28:41.000Z","path":"2018/12/11/Vulnhub-Challenging-jarbas/","updated":"2022-06-24T14:37:07.860Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"Jenkins","slug":"Jenkins","permalink":"https://exexute.github.io/tags/Jenkins/"},{"name":"Crontab","slug":"Crontab","permalink":"https://exexute.github.io/tags/Crontab/"}]},{"title":"密码爆破最佳实践","date":"2018-12-09T00:53:25.000Z","path":"2018/12/09/密码破解工具最佳实践/","updated":"2022-06-24T14:02:15.180Z","tags":[{"name":"密码破解","slug":"密码破解","permalink":"https://exexute.github.io/tags/密码破解/"}]},{"title":"hexo-nomal-to-beauty","date":"2018-12-08T04:17:08.000Z","path":"2018/12/08/hexo-nomal-to-beauty/","updated":"2022-06-24T14:28:43.335Z","tags":[{"name":"hexo美化","slug":"hexo美化","permalink":"https://exexute.github.io/tags/hexo美化/"}]},{"title":"Hexo搭建个人博客","date":"2018-12-08T04:17:08.000Z","path":"2018/12/08/hexo-install/","updated":"2022-06-24T14:28:33.867Z","tags":[{"name":"hexo美化","slug":"hexo美化","permalink":"https://exexute.github.io/tags/hexo美化/"}]},{"title":"Hexo博客开发环境迁移","date":"2018-12-08T03:10:19.000Z","path":"2018/12/08/Hexo博客开发环境迁移/","updated":"2022-06-24T14:28:52.142Z","tags":[]},{"title":"Vulnhub Challenging: Wakanda 1","date":"2018-12-07T11:53:36.000Z","path":"2018/12/07/Vulnhub-Challengeing-Wakanda/","updated":"2022-06-24T14:37:07.859Z","tags":[{"name":"privilege_escalation","slug":"privilege-escalation","permalink":"https://exexute.github.io/tags/privilege-escalation/"},{"name":"文件包含","slug":"文件包含","permalink":"https://exexute.github.io/tags/文件包含/"},{"name":"pip","slug":"pip","permalink":"https://exexute.github.io/tags/pip/"}]}]