tmp

https://studygolang.com/articles/16985
https://studygolang.com/articles/19458
http://www.r9it.com/20190611/go-mod-use-dev-package.html
https://mp.weixin.qq.com/s?__biz=MzIwMTM5MjUwMg==&mid=506104436&idx=1&sn=85a95ea7bbf29c33020464355e0a8ed1&chksm=0d30826d3a470b7bca9c6a273700dd7f19c3473d29a5b4ee5f22787d88502697ea8efca8d757&scene=18&ascene=7&devicetype=android-29&version=2700123b&nettype=ctnet&abtest_cookie=AAACAA%3D%3D&lang=zh_CN&exportkey=AdQ5Uo%2BWodfisFK7jv1UJWE%3D&pass_ticket=WLUgzE9Cysjcr57CPpuES0xBx%2BR827RDlksBF6rCec6jJiwBSWOSsg0h45TBz4vX&wx_header=1


https://mp.weixin.qq.com/s/ypwInF6Yk07Oe9CrxrMqFw

https://mp.weixin.qq.com/s/EiXSI_s0f6hyED9hNfihmw

OVS
https://mp.weixin.qq.com/s/2KaHYOxyvZw1B6PhmjN_vw
https://mp.weixin.qq.com/s/p-_ygYnOwSbFSx3fsD7iTQ

爬公众号所有文章
https://mp.weixin.qq.com/s?__biz=MzUzMjUyMDQ5Mw==&mid=2247485014&idx=1&sn=3c3a85c6ea7130659fe19a2d06952939&chksm=fab34d14cdc4c402a6604e1c40875880c429405743aafa7148c6b8de05b052eade3828b3f740&scene=90&xtrack=1&subscene=93&clicktime=1565325970&ascene=56&devicetype=android-28&version=27000634&nettype=3gnet&abtest_cookie=BQABAAgACgALABIAEwAFAJ6GHgAjlx4AVpkeAMWZHgD1mR4AAAA%3D&lang=zh_CN&pass_ticket=nupAIrZ%2F1rrhH5VZIDV3QYoxudOU5df7yWlsejwIxJPtdMQw19OIK9fU0HKhoiMI&wx_header=1

cve-2019-5736
https://x3fwy.bitcron.com/post/runc-malicious-container-escape

docker
https://mp.weixin.qq.com/s/7o8QxGydMTUe4Q7Tz46Diw

openstack
https://mp.weixin.qq.com/s/g-bKZqRFUGXDghIfGJ16_g
https://mp.weixin.qq.com/s/QtdMkt9giEEnvFTQzO9u7g

kali
http://mp.weixin.qq.com/mp/homepage?__biz=MzA4NDk5NTYwNw==&hid=11&sn=debd488756944bb3e22a10f608e13de6&scene=18#wechat_redirect

letex
https://mp.weixin.qq.com/s?__biz=MzI4MDYzNzg4Mw==&mid=2247489140&idx=4&sn=d2c74df0662a7d976ad69f4f46e65bec&chksm=ebb42ea0dcc3a7b61ca768aa259836e4840009a1b59d31d004efaee27f887ec1d83c22c4cda6&xtrack=1&scene=0&subscene=131&clicktime=1554164378&ascene=7&devicetype=android-26&version=2700033c&nettype=WIFI&abtest_cookie=BQABAAgACgALABIAEwAGAJ6GHgAjlx4AXpkeAMmZHgDZmR4A3JkeAAAA&lang=zh_CN&pass_ticket=jZcIs1%2BrBPucsmrqoM0OWGExCJeR1qPEiWHzlDTuxNFpMc%2BpURAzmeRgFbZrDb%2BA&wx_header=1

反射
http://ifeve.com/java-reflection/

kali
URL跳转反向shell
https://mp.weixin.qq.com/s/9yfAXT2slibEcnuow-jhQg
CSRF获取secret

原文地址:https://www.cnblogs.com/aaroncnblogs/p/10569265.html