-
Notifications
You must be signed in to change notification settings - Fork 2
/
Copy pathindex.xml
80 lines (80 loc) · 5.57 KB
/
index.xml
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
<channel>
<title>Geekby's Blog</title>
<link>https://www.geekby.site/</link>
<description>Geekby's Blog</description>
<generator>Hugo -- gohugo.io</generator><language>zh-cn</language><managingEditor>[email protected] (Geekby)</managingEditor>
<webMaster>[email protected] (Geekby)</webMaster><lastBuildDate>Sat, 08 Feb 2025 14:00:00 +0800</lastBuildDate>
<atom:link href="https://www.geekby.site/index.xml" rel="self" type="application/rss+xml" />
<item>
<title>别让DeepSeek坑了你!本地部署模型真的安全吗?</title>
<link>https://www.geekby.site/2025/02/%E5%88%AB%E8%AE%A9deepseek%E5%9D%91%E4%BA%86%E4%BD%A0%E6%9C%AC%E5%9C%B0%E9%83%A8%E7%BD%B2%E6%A8%A1%E5%9E%8B%E7%9C%9F%E7%9A%84%E5%AE%89%E5%85%A8%E5%90%97/</link>
<pubDate>Sat, 08 Feb 2025 14:00:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2025/02/%E5%88%AB%E8%AE%A9deepseek%E5%9D%91%E4%BA%86%E4%BD%A0%E6%9C%AC%E5%9C%B0%E9%83%A8%E7%BD%B2%E6%A8%A1%E5%9E%8B%E7%9C%9F%E7%9A%84%E5%AE%89%E5%85%A8%E5%90%97/</guid>
<description><![CDATA[本地部署大模型安全分析]]></description>
</item><item>
<title>利用云提供商漏洞获取初始访问权限</title>
<link>https://www.geekby.site/2024/09/%E5%88%A9%E7%94%A8%E4%BA%91%E6%8F%90%E4%BE%9B%E5%95%86%E6%BC%8F%E6%B4%9E%E8%8E%B7%E5%8F%96%E5%88%9D%E5%A7%8B%E8%AE%BF%E9%97%AE%E6%9D%83%E9%99%90/</link>
<pubDate>Mon, 30 Sep 2024 15:00:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2024/09/%E5%88%A9%E7%94%A8%E4%BA%91%E6%8F%90%E4%BE%9B%E5%95%86%E6%BC%8F%E6%B4%9E%E8%8E%B7%E5%8F%96%E5%88%9D%E5%A7%8B%E8%AE%BF%E9%97%AE%E6%9D%83%E9%99%90/</guid>
<description><![CDATA[BlackHat议题解读:利用云提供商漏洞获取初始访问权限]]></description>
</item><item>
<title>通过影子资源攻击AWS帐户</title>
<link>https://www.geekby.site/2024/09/%E9%80%9A%E8%BF%87%E5%BD%B1%E5%AD%90%E8%B5%84%E6%BA%90%E6%94%BB%E5%87%BBaws%E5%B8%90%E6%88%B7/</link>
<pubDate>Wed, 25 Sep 2024 17:00:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2024/09/%E9%80%9A%E8%BF%87%E5%BD%B1%E5%AD%90%E8%B5%84%E6%BA%90%E6%94%BB%E5%87%BBaws%E5%B8%90%E6%88%B7/</guid>
<description><![CDATA[BlackHat议题解读:通过影子资源攻击AWS帐户]]></description>
</item><item>
<title>dotnet代码审计系列(一)</title>
<link>https://www.geekby.site/2024/08/dotnet%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E7%B3%BB%E5%88%97%E4%B8%80/</link>
<pubDate>Fri, 30 Aug 2024 09:23:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2024/08/dotnet%E4%BB%A3%E7%A0%81%E5%AE%A1%E8%AE%A1%E7%B3%BB%E5%88%97%E4%B8%80/</guid>
<description><![CDATA[dotnet代码审计]]></description>
</item><item>
<title>Kubernetes Pod 横向移动</title>
<link>https://www.geekby.site/2023/11/kubernetes-pod-%E6%A8%AA%E5%90%91%E7%A7%BB%E5%8A%A8/</link>
<pubDate>Wed, 29 Nov 2023 15:28:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2023/11/kubernetes-pod-%E6%A8%AA%E5%90%91%E7%A7%BB%E5%8A%A8/</guid>
<description><![CDATA[Kubernetes Pod 横向移动]]></description>
</item><item>
<title>RSAC议题解读-云上跨租户漏洞攻击面分析</title>
<link>https://www.geekby.site/2023/05/rsac%E8%AE%AE%E9%A2%98%E8%A7%A3%E8%AF%BB-%E4%BA%91%E4%B8%8A%E8%B7%A8%E7%A7%9F%E6%88%B7%E6%BC%8F%E6%B4%9E%E6%94%BB%E5%87%BB%E9%9D%A2%E5%88%86%E6%9E%90/</link>
<pubDate>Wed, 31 May 2023 15:23:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2023/05/rsac%E8%AE%AE%E9%A2%98%E8%A7%A3%E8%AF%BB-%E4%BA%91%E4%B8%8A%E8%B7%A8%E7%A7%9F%E6%88%B7%E6%BC%8F%E6%B4%9E%E6%94%BB%E5%87%BB%E9%9D%A2%E5%88%86%E6%9E%90/</guid>
<description><![CDATA[云上跨租户漏洞攻击面分析]]></description>
</item><item>
<title>OAuth 2.0协议及漏洞</title>
<link>https://www.geekby.site/2023/05/oauth-2.0%E5%8D%8F%E8%AE%AE%E5%8F%8A%E6%BC%8F%E6%B4%9E/</link>
<pubDate>Mon, 01 May 2023 15:23:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2023/05/oauth-2.0%E5%8D%8F%E8%AE%AE%E5%8F%8A%E6%BC%8F%E6%B4%9E/</guid>
<description><![CDATA[OAuth 2.0协议及漏洞]]></description>
</item><item>
<title>vCenter 漏洞利用</title>
<link>https://www.geekby.site/2022/05/vcenter%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8/</link>
<pubDate>Thu, 05 May 2022 15:23:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2022/05/vcenter%E6%BC%8F%E6%B4%9E%E5%88%A9%E7%94%A8/</guid>
<description><![CDATA[vCenter 漏洞利用]]></description>
</item><item>
<title>Spring beans RCE 漏洞分析</title>
<link>https://www.geekby.site/2022/03/spring-beans-rce%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/</link>
<pubDate>Wed, 30 Mar 2022 15:23:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2022/03/spring-beans-rce%E6%BC%8F%E6%B4%9E%E5%88%86%E6%9E%90/</guid>
<description><![CDATA[Spring beans RCE 漏洞分析]]></description>
</item><item>
<title>Zabbix 漏洞深入利用</title>
<link>https://www.geekby.site/2022/03/zabbix%E6%BC%8F%E6%B4%9E%E6%B7%B1%E5%85%A5%E5%88%A9%E7%94%A8/</link>
<pubDate>Mon, 21 Mar 2022 15:00:00 +0800</pubDate>
<author>作者</author>
<guid>https://www.geekby.site/2022/03/zabbix%E6%BC%8F%E6%B4%9E%E6%B7%B1%E5%85%A5%E5%88%A9%E7%94%A8/</guid>
<description><![CDATA[Zabbix 漏洞深入利用]]></description>
</item></channel>
</rss>