威胁情报站点
以下是网络安全相关的站点,我以文本文档的形式分享出来,师傅们可以复制内容黏贴到html格式,就可以直接导入到浏览器中了。
<HTML>
<META HTTP-EQUIV="Content-Type" CONTENT="text/html; charset=UTF-8">
<Title>书签</Title>
<H1>书签</H1>
<DT><H3 FOLDED>个人收藏</H3>
<DL><p>
</DL><p>
<DT><H3 FOLDED>书签菜单</H3>
<DL><p>
</DL><p>
<DT><H3 FOLDED>标签页组个人收藏</H3>
<DL><p>
<DT><H3 FOLDED>书签栏</H3>
<DL><p>
</DL><p>
</DL><p>
<DT><H3 FOLDED id="com.apple.ReadingList">阅读列表</H3>
<DL><p>
</DL><p>
<DT><H3 FOLDED>已导入“2025/1/5”</H3>
<DL><p>
<DT><H3 FOLDED>书签栏</H3>
<DL><p>
<DT><H3 FOLDED>📖</H3>
<DL><p>
<DT><H3 FOLDED>安全社区</H3>
<DL><p>
<DT><A HREF="https://xz.aliyun.com/tab/1">技术文章 - 先知社区</A>
<DT><A HREF="https://forum.butian.net/">奇安信攻防社区</A>
<DT><A HREF="https://tttang.com/">跳跳糖</A>
<DT><A HREF="https://stack.chaitin.com/">CT Stack 安全社区</A>
<DT><A HREF="https://www.wangan.com/">网安 – 专业的网络安全产业、社区、媒体平台</A>
<DT><A HREF="https://secself.com/">助安社区 - 网络安全论坛</A>
<DT><A HREF="https://bbs.sangfor.com.cn/plugin.php?id=info:index#?orderby=dateline&type=index&page=1&init">深信服社区</A>
<DT><A HREF="https://bbs.nightteam.cn/">门户 - Powered by Discuz!</A>
<DT><A HREF="https://www.inforsec.org/wp/">inforsec.org/wp/</A>
<DT><A HREF="https://news.drweb.cn/list/?p=0&lng=cn&c=5">大蜘蛛®大蜘蛛反病毒软件由世界著名信息安全反病毒产品俄罗斯厂商Doctor Web公司出品。</A>
<DT><A HREF="https://www.yunyawu.com/">云涯历险记|我口袋只剩玫瑰一片 此行又山高路远</A>
<DT><A HREF="https://vipread.com/">信息安全知识库 vipread.com</A>
<DT><A HREF="https://mbsse.antiy.cn/#/ewhiteboard/view-diagrams/12159af20c7e464fb151073c43325d15">ATT&CK(对抗战术、技术和常识知识库)</A>
<DT><A HREF="https://thecyberexpress.com/firewall-daily/dark-web-news/">#1 Trusted Latest Dark Web News - The Cyber Express</A>
<DT><A HREF="https://www.oscs1024.com/cm">OSCS | 开源软件供应链安全社区 | 让每一个开源项目变得更安全</A>
<DT><A HREF="https://blog.segu-info.com.ar/">Segu-Info - 自 2000 年以来的网络安全</A>
<DT><A HREF="https://forum.ywhack.com/today_security.php?action=all&time=yesterday">[~]#棱角 ::Edge.Forum*</A>
<DT><A HREF="https://bbs.antiy.cn/forum.php?mod=forumdisplay&fid=52">IT综合信息区 - 创意安天 - Powered by Discuz!</A>
<DT><A HREF="https://govuln.com/news/">安全文摘 - 『代码审计』知识星球</A>
</DL><p>
<DT><H3 FOLDED>安全研究员</H3>
<DL><p>
<DT><A HREF="https://twitter.com/AzakaSekai_">(20) 安坂星海 Azaka 🐼 VTuber (@AzakaSekai_) / X</A>
<DT><A HREF="https://doubleagent.net/">doubleagent.net</A>
<DT><A HREF="https://cyberplace.social/home">主页 - Cyberplace</A>
<DT><A HREF="https://palant.info/articles/">Articles | Almost Secure</A>
<DT><A HREF="https://gynvael.coldwind.pl/?blog=1">gynvael.coldwind//vx.log</A>
<DT><A HREF="https://medium.com/walmartglobaltech">Walmart Global Tech Blog – Medium</A>
<DT><A HREF="https://thefrogsec.github.io/">FrogSec&#39;s Research Blog</A>
<DT><A HREF="https://mastodon.social/@gabe_k">gabe_k (@gabe_k@mastodon.social) - Mastodon</A>
<DT><A HREF="https://maxkersten.nl/blog/">博客 – Max Kersten</A>
<DT><A HREF="https://techcommunity.microsoft.com/t5/microsoft-sentinel-blog/bg-p/MicrosoftSentinelBlog">Microsoft Sentinel Blog - Microsoft Community Hub</A>
<DT><A HREF="https://key08.com/">白帽Wiki - 一个简单的wiki</A>
<DT><A HREF="https://pwnull.github.io/archives/">归档 - 进阶的胖闹-pwnull</A>
<DT><A HREF="https://v1k1ngfr.github.io/">vegvisir - Explore, Understand, Hack, Share</A>
<DT><A HREF="https://0reg.dev/blog">Retr0&#39;s Register</A>
<DT><A HREF="https://decoder.cloud/">Decoder 的博客 – IT 安全提示和技巧</A>
<DT><A HREF="https://pwning.tech/">Pwning Tech - Learn to pwn modern tech</A>
<DT><A HREF="https://www.seqrite.com/blog/">Blogs on Information Technology, Network & Cybersecurity | Seqrite</A>
<DT><A HREF="https://0xbigshaq.github.io/">0xbigshaq.github.io</A>
<DT><A HREF="https://www.troyhunt.com/">Troy Hunt: Troy Hunt</A>
<DT><A HREF="https://kaist-hacking.github.io/">Hacking Lab</A>
<DT><A HREF="https://azr43lkn1ght.github.io/">Azr43lkn1ght</A>
<DT><A HREF="https://ssd-disclosure.com/">Home - SSD Secure Disclosure</A>
<DT><A HREF="https://evilpan.com/">有价值炮灰</A>
<DT><A HREF="https://blog.orange.tw/2024/06/cve-2024-4577-yet-another-php-rce.html">Orange: CVE-2024-4577 - Yet Another PHP RCE: Make PHP-CGI Argument Injection Great Again!</A>
<DT><A HREF="https://mohemiv.com/">Arseniy Sharoglazov</A>
<DT><A HREF="https://leadroyal.cn/">LeadroyaL&#39;s website</A>
<DT><A HREF="https://feei.cn/">FEEI - FEEI</A>
<DT><A HREF="https://zgao.top/archives/">文章归档 – Zgao&#39;s blog</A>
<DT><A HREF="https://mrd0x.com/">Security Research | mr.d0x</A>
<DT><A HREF="https://grumpz.net/series/security-research">My Security Research - Master Bug Bounty Hunting: Your Guide to Breaking into Cybersecurity for Newcomers</A>
<DT><A HREF="https://nokline.github.io/">Harel 安全研究 | 在这里您可以阅读我随着时间的推移收集的所有研究和技术!</A>
<DT><A HREF="https://vin01.github.io/piptagole/">Vin01’s Blog | A collection of tidbits which might do some good out there or at least be interesting for some of you.</A>
<DT><A HREF="https://rtx.meta.security/">Home | Meta Red Team X</A>
<DT><A HREF="https://devblogs.microsoft.com/powershell/">PowerShell 团队 - 一次用一行代码实现世界自动化......</A>
<DT><A HREF="https://tinyhack.com/">Tinyhack.com – 黑客出于热爱会做别人为了钱不会做的事情。</A>
<DT><A HREF="https://blog.sofiane.cc/">Sofiane&#39;s Blog</A>
<DT><A HREF="https://ynwarcs.github.io/y-cve-2023-24871-intro-descr">CVE-2023-24871 - intro & vulnerability description</A>
<DT><A HREF="https://pentest.party/notes/windows/privilege-restore">SeRestorePrivilege - Pentest Party</A>
<DT><A HREF="https://0xdf.gitlab.io/">0xdf hacks stuff | CTF solutions, malware analysis, home lab development</A>
<DT><A HREF="https://wojciechregula.blog/post/">Posts | IT Security blog</A>
<DT><A HREF="https://stulle123.github.io/posts/">Posts | stulle123&#39;s Blog</A>
<DT><A HREF="https://pierrekim.github.io/index.html">Home of Pierre</A>
<DT><A HREF="https://blog.huli.tw/">Huli&#39;s blog</A>
<DT><A HREF="https://blog.trailofbits.com/">Trail of Bits Blog</A>
<DT><A HREF="https://spaceraccoon.dev/">Spaceraccoon&#39;s Blog</A>
<DT><A HREF="https://santandersecurityresearch.github.io/blog/">Cyber Security Research</A>
<DT><A HREF="https://blog.doyensec.com/">Doyensec&#39;s Blog</A>
<DT><A HREF="https://syntax-err0r.github.io/">About | Syntax-Err0r</A>
<DT><A HREF="https://securitycipher.com/security-tools/">Security Tools - Security Cipher</A>
<DT><A HREF="https://epcyber.com/home-1">Home</A>
<DT><A HREF="https://zh.annas-archive.org/">安娜的档案</A>
<DT><A HREF="https://www.ribbiting-sec.info/">Ribbit-ing Cybersecurity</A>
<DT><A HREF="https://jjensn.com/">a security researcher and his projects</A>
<DT><A HREF="https://blog.ghostwolflab.com/vulnerability_research/597/">创建RDP有效负载 – Ghost Wolf Lab – Research</A>
<DT><A HREF="https://blog.redteam-pentesting.de/">RedTeam Pentesting - Blog</A>
<DT><A HREF="https://clearbluejar.github.io/">clearbluejar</A>
<DT><A HREF="https://blog.coffinsec.com/">hyprblog | Vulnerability research, software development, and other technobabble.</A>
<DT><A HREF="https://whereisk0shl.top/">WHEREISK0SHL</A>
<DT><A HREF="https://sallam.gitbook.io/sec-88/write-ups/decoding-server-behavior-the-key-to-mass-account-takeover">Decoding Server Behavior: The Key to Mass Account Takeover | Sec-88</A>
<DT><A HREF="https://blog.razzsecurity.com/">Razz Security Blog -</A>
<DT><A HREF="https://vozec.fr/researchs/">Vozec&#39;s Blog - Researchs</A>
<DT><A HREF="https://www.lab539.com/blog">Lab539 博客 — Lab539</A>
<DT><A HREF="https://hackyboiz.github.io/archives/">Archives - hackyboiz</A>
<DT><A HREF="https://danaepp.com/blog">博客 - Dana Epp 的博客</A>
<DT><A HREF="https://kibty.town/blog">博客 - eva 的网站</A>
<DT><A HREF="https://starkeblog.com/">StarkeBlog</A>
<DT><A HREF="https://embracethered.com/blog/">Embrace The Red · Embrace The Red</A>
<DT><A HREF="https://www.evilsocket.net/">evilsocket</A>
<DT><A HREF="https://gh0st.cn/">Chen&#39;s Blog</A>
<DT><A HREF="https://blog.fox-it.com/">Fox-IT International blog – News and opinions from Fox-IT</A>
<DT><A HREF="https://samcurry.net/">Blog | Sam Curry</A>
<DT><A HREF="https://www.da.vidbuchanan.co.uk/blog/">Blog</A>
<DT><A HREF="https://starlabs.sg/">STAR Labs</A>
<DT><A HREF="https://blog.quarkslab.com/">Quarkslab&#39;s blog</A>
<DT><A HREF="https://nao-sec.org/archive">Archive | @nao_sec</A>
<DT><A HREF="https://fj016.fr/blog">帖子 | fj016</A>
<DT><A HREF="https://zwclose.github.io/">ZwClose</A>
<DT><A HREF="https://sharpsec.run/">Sharp Security – Hacking, OSINT, Crypto</A>
<DT><A HREF="https://0xmaz.me/">Mohamed Alzhrani</A>
<DT><A HREF="https://www.deep-kondah.com/">Deep Kondah</A>
<DT><A HREF="https://dreyand.rs/">DreyAnd&#39;s Web Security Blog</A>
<DT><A HREF="https://delroth.net/">delroth 的主页</A>
<DT><A HREF="https://battleda.sh/blog">Blog | Sean Kahler</A>
<DT><A HREF="https://www.dogesec.com/blog/">Blog | DOGESEC</A>
<DT><A HREF="https://jhftss.github.io/">Mickey&#39;s Blogs – Exploring the world with my sword of debugger :)</A>
<DT><A HREF="https://starlabs.sg/blog/">博客 | STAR 实验室</A>
<DT><A HREF="https://naehrdine.blogspot.com/">cat /dev/brain</A>
<DT><A HREF="https://www.hexacorn.com/blog/">六角形 | 六角形</A>
<DT><A HREF="https://blog.didierstevens.com/">Didier Stevens | (博客“DidierStevens”)</A>
<DT><A HREF="https://decrypt.lol/">Home • Decrypt LOL</A>
<DT><A HREF="https://denwp.com/">Denwp Research</A>
<DT><A HREF="https://blog.exodusintel.com/">Homepage - Exodus Intelligence</A>
<DT><A HREF="https://jeva.cc/">ma4ter</A>
<DT><A HREF="https://beierle.win/">Jonathan&#39;s Blog</A>
<DT><A HREF="https://justhaifei1.blogspot.com/">Haifei&#39;s random thoughts</A>
<DT><A HREF="https://www.lijiejie.com/">李劼杰的博客</A>
<DT><A HREF="https://sanshiok.com/">Hello sanshiOK | 网安人,网安魂! SECURITY GO! GO!! GO!!!</A>
<DT><A HREF="https://aibaranov.github.io/">Home</A>
<DT><A HREF="https://practicalsecurityanalytics.com/blog/red-team/">红队 – Practical Security Analytics LLC</A>
<DT><A HREF="https://randomascii.wordpress.com/">Random ASCII – tech blog of Bruce Dawson | Forecast for randomascii: programming, tech topics, with a chance of unicycling</A>
<DT><A HREF="https://blog.deeb.ch/">deeb blog</A>
<DT><A HREF="https://attackshipsonfi.re/">attack ships on fire | Substack</A>
</DL><p>
<DT><H3 FOLDED>OSINT</H3>
<DL><p>
<DT><A HREF="https://start.me/p/rxRbpo/cti">CTI 😎 - start.me</A>
<DT><A HREF="https://start.me/p/DPYPMz/the-ultimate-osint-collection#tour">终极开源情报合集 - start.me --- The Ultimate OSINT Collection - start.me</A>
<DT><A HREF="https://osinter.dk/feed/day/">Todays news | OSINTer</A>
<DT><A HREF="https://whatsmyname.app/">WhatsMyName Web</A>
<DT><A HREF="https://docs.google.com/spreadsheets/u/0/d/1klugQqw6POlBtuzon8S0b18-gpsDwX-5OYRrB7TyNEw/htmlview">AaronCTI&#39;s OSINT Resource Collection - Google 云端硬盘</A>
<DT><A HREF="https://start.me/p/m6Lrlv">树人的小屋 - start.me</A>
<DT><A HREF="http://dingba.top/">丁爸网-首页</A>
<DT><A HREF="https://choa.fun/f/84">【网络迷踪】- 炒饭 - 世界那么大</A>
<DT><A HREF="https://urlhaus.abuse.ch/browse/">URLhaus | Browse</A>
<DT><A HREF="https://txwz.qq.com/wechat/search">反诈骗联合实验室</A>
<DT><A HREF="https://osint.industries/">OSINT Industries</A>
<DT><A HREF="https://www.user-searcher.com/">User Searcher: Free tool to search username in network</A>
<DT><A HREF="https://www.email-format.com/">查找数百万家公司的电子邮件地址格式</A>
<DT><A HREF="https://www.osint.industries/">OSINT Industries | Powerful Tools for Accurate Investigations</A>
<DT><A HREF="https://wigle.net/">WiGLE:无线网络映射</A>
<DT><A HREF="https://epcyber.com/blog">EPCYBER - Osint Dark Web, Darkweb Tips, China Osint</A>
<DT><A HREF="https://epcyber.com/osint-china-advanced">OSINT China Advanced</A>
<DT><A HREF="https://10sint.com/">10sint - Top 10 OSINT Tools</A>
<DT><A HREF="https://tgstat.ru/en">Telegram 频道和群组目录 / 俄罗斯 – TGStat</A>
<DT><A HREF="https://intelx.io/">情报X</A>
<DT><A HREF="https://darkweb.vc/">Darkweb.vc</A>
<DT><A HREF="https://cylect.io/">Cylect.io,终极 AI OSINT 工具。</A>
<DT><A HREF="https://ahrefs.com/blog/google-advanced-search-operators/">Google Search Operators: The Complete List (44 Advanced Operators)</A>
<DT><A HREF="https://firebog.net/">Blocklist Collection ¦ Firebog</A>
<DT><A HREF="https://search.libraryofleaks.org/">Find public records and leaks - Library of Leaks</A>
<DT><A HREF="https://w3techs.com/">W3Techs - extensive and reliable web technology surveys</A>
<DT><A HREF="https://freshtools.to/">FreshTools | Spam Tools | SMTP | SHELL | MAILER | cPanel | FTP | Combo List | Fresh RDP | Fresh Tools | Valid shod | site to buy smtp | buy spam tools | spammer shop | best site to buy spamming tools | Hacking RDP | Hacking shop | Buy Spamming Tools | buy cpanel for spamming | buy rdp for spamming | spammer store | spammer ro | free spam tools | remote desktop | underground marketplace | email accounts | Spammer Tools | dark web | hacked rdp shop | Inbox Mailer | hacked rdp | Buy Tools Spam | Spamming Tools | Rdp Shop | Site To Buy Spamming Tools | Buy Spam Equipment | Buy Carding Accounts | Fresh Cracked RDP</A>
<DT><A HREF="https://domains-monitor.com/cn/">下载所有域名列表</A>
<DT><A HREF="https://purecrawl.com/download/domains">База зарегистрированных доменов разбитая по зонам</A>
<DT><A HREF="https://lenso.ai/en">Lenso.ai - AI Reverse Image Search</A>
<DT><A HREF="https://faceonlive.com/face-search-online/">Free Face Search Online - FaceOnLive : On-Premises ID Verification & Biometrics Solution Provider</A>
<DT><A HREF="https://profacefinder.com/">ProFaceFinder: Face Recognition and Reverse Image Search Engine -</A>
<DT><A HREF="https://facecheck.id/zh">FaceCheck - 反向图片搜索 - 人脸识别搜索引擎</A>
<DT><A HREF="https://pimeyes.com/en">PimEyes:人脸识别搜索引擎和反向图像搜索</A>
<DT><A HREF="https://www.httrack.com/">HTTrack Website Copier - Free Software Offline Browser (GNU GPL)</A>
<DT><A HREF="https://ipv6.he.net/certification/register.php">Hurricane Electric IPv6 Certification</A>
<DT><A HREF="https://www.unit221b.com/">221B 单位——诚信为本,谨慎设计。</A>
<DT><A HREF="https://inteltechniques.com/tools/index.html">IntelTechniques Search Tool</A>
<DT><A HREF="https://sundowndev.github.io/phoneinfoga/">PhoneInfoga</A>
<DT><A HREF="https://builtwith.com/">BuiltWith Technology Lookup</A>
<DT><A HREF="https://synapsint.com/">Synapsint</A>
</DL><p>
<DT><H3 FOLDED>国外安全实验室</H3>
<DL><p>
<DT><A HREF="https://unit42.paloaltonetworks.com/">Unit 42 - Latest Cyber Security Research | Palo Alto Networks</A>
<DT><A HREF="https://www.trendmicro.com/en_us/research.html">Research, News, and Perspectives</A>
<DT><A HREF="https://www.microsoft.com/en-us/security/blog/">微软安全Microsoft Security Blog | Digital Security Tips and Solutions</A>
<DT><A HREF="https://vx-underground.org/#">Vx Underground</A>
<DT><A HREF="https://www.crowdstrike.com/blog/">Cybersecurity Blog | CrowdStrike</A>
<DT><A HREF="https://research.checkpoint.com/">CPR - Check Point Research</A>
<DT><A HREF="https://blog.talosintelligence.com/">Cisco Talos Blog</A>
<DT><A HREF="https://www.rapid7.com/blog/">Rapid7 Cybersecurity Blog & Latest Vulnerability News</A>
<DT><A HREF="https://krebsonsecurity.com/">Krebs on Security – In-depth security news and investigation</A>
<DT><A HREF="https://symantec-enterprise-blogs.security.com/blogs/">Symantec Enterprise Blogs</A>
<DT><A HREF="https://isc.sans.edu/">SANS.edu Internet Storm Center - SANS Internet Storm Center</A>
<DT><A HREF="https://www.volexity.com/blog/">Blog | Threat Intelligence & Memory Forensics | Volexity</A>
<DT><A HREF="https://www.hub.trimarcsecurity.com/posts">Posts | Trimarc Content Hub</A>
<DT><A HREF="https://www.mitiga.io/blog">Mitiga Blog: Research, Updates, Trends and Analysis</A>
<DT><A HREF="https://blog.aquasec.com/">Cloud native applications security</A>
<DT><A HREF="https://www.hackingdream.net/">Hacking Dream</A>
<DT><A HREF="https://www.skullsecurity.org/">SkullSecurity | SkullSecurity Blog</A>
<DT><A HREF="https://www.proofpoint.com/us/blog">Cybersecurity Intelligence, News & Insights | Proofpoint US</A>
<DT><A HREF="https://trustedsec.com/research">TrustedSec | Research</A>
<DT><A HREF="https://www.zscaler.com/blogs">Blogs | Zscaler</A>
<DT><A HREF="https://www.gdatasoftware.com/blog">G DATA SECURITY BLOG</A>
<DT><A HREF="https://www.group-ib.com/blog/">Blog | Group-IB</A>
<DT><A HREF="https://www.databreaches.net/">DataBreaches.net: The Office of Inadequate Security</A>
<DT><A HREF="https://www.chainalysis.com/blog/">Blog - Chainalysis</A>
<DT><A HREF="https://www.netspi.com/blogs/">Pentesting & Attack Surface Blog | NetSPI</A>
<DT><A HREF="https://www.bitsight.com/blog">Bitsight Blog</A>
<DT><A HREF="https://www.blackhillsinfosec.com/blog/">Blog - Black Hills Information Security</A>
<DT><A HREF="https://www.threatfabric.com/blogs">Articles — ThreatFabric</A>
<DT><A HREF="https://www.sentinelone.com/blog/">Cybersecurity Blog | SentinelOne</A>
<DT><A HREF="https://www.netskope.com/netskope-threat-labs#blogs">Netskope Threat Labs: Combating Security Threats</A>
<DT><A HREF="https://www.malwarebytes.com/blog">Malwarebytes Labs - The Security Blog From Malwarebytes | Malwarebytes Labs</A>
<DT><A HREF="https://www.zerofox.com/blog/">zerofox.com</A>
<DT><A HREF="https://www.mandiant.com/resources/blog">Cyber Security Blog | Mandiant Cyber Threat Research</A>
<DT><A HREF="https://www.bitdefender.com/blog/">Bitdefender 网络安全博客:新闻、观点和见解 --- Bitdefender Cybersecurity Blogs: News, Views and Insights</A>
<DT><A HREF="https://www.tenable.com/blog">Exposure Management Blog</A>
<DT><A HREF="https://www.wiz.io/blog">维兹博客 |有关云安全的最新故事 --- Wiz Blog | Latest stories about Cloud Security</A>
<DT><A HREF="https://www.mcafee.com/blogs/">Cybersecurity News and Insights to Stay Safe Online | McAfee Blog</A>
<DT><A HREF="https://www.securonix.com/blog/">Blog - Securonix</A>
<DT><A HREF="https://www.ncsc.gov.uk/section/keep-up-to-date/malware-analysis-reports">恶意软件分析报告 - NCSC.GOV.UK --- Malware analysis reports - NCSC.GOV.UK</A>
<DT><A HREF="https://www.guidepointsecurity.com/blog/">The Guiding Point | GuidePoint Security</A>
<DT><A HREF="https://www.reliaquest.com/threat-research-team/">ReliaQuest Threat Research</A>
<DT><A HREF="https://www.esecurityplanet.com/">eSecurity Planet: Latest Cybersecurity News for IT Professionals</A>
<DT><A HREF="https://www.welivesecurity.com/en/eset-research/">ESET Research – security research and expert analysis from ESET Research Labs</A>
<DT><A HREF="https://www.reversinglabs.com/blog">Blog | ReversingLabs</A>
<DT><A HREF="https://www.zerodayinitiative.com/blog/">Zero Day Initiative — Blog</A>
<DT><A HREF="https://www.cysecurity.news/">CySecurity News - Latest Information Security and Hacking Incidents</A>
<DT><A HREF="https://www.team-cymru.com/blog">龙新闻博客|威尔士队 --- Dragon News Blog | Team Cymru</A>
<DT><A HREF="https://www.welivesecurity.com/en/">Award-winning news, views, and insight from the ESET security community</A>
<DT><A HREF="https://securelist.com/">Securelist | Kaspersky’s threat research and reports</A>
<DT><A HREF="https://www.netcraft.com/resources/?type=blog">Blog, case studies and resources | Netcraft</A>
<DT><A HREF="https://www.menlosecurity.com/blog-categories/threat-trends-research">威胁趋势与研究博客文章 |门洛安全 --- Threat Trends & Research blog posts | Menlo Security</A>
<DT><A HREF="https://www.sans.org/blog/">Cyber Security Blog | SANS Institute</A>
<DT><A HREF="https://www.synacktiv.com/en/publications">刊物 --- Publications</A>
<DT><A HREF="https://sansec.io/research">Sansec 威胁研究与新闻 --- Sansec Threat Research & News</A>
<DT><A HREF="https://www.esentire.com/resources/blog">eSentire | Blog</A>
<DT><A HREF="https://www.foregenix.com/blog">Cybersecurity Insights | Blog | Foregenix</A>
<DT><A HREF="https://marcoramilli.com/">Marco Ramilli Web Corner</A>
<DT><A HREF="https://thedfirreport.com/">The DFIR Report - Real Intrusions by Real Attackers, The Truth Behind the Intrusion</A>
<DT><A HREF="https://blog.sekoia.io/#pll_switcher">Sekoia.io 博客 - 有关威胁情报的新闻和分析 --- Sekoia.io Blog - News and analyses about threat intelligence</A>
<DT><A HREF="https://www.mwrcybersec.com/technical-research">技术研究 – MWR CyberSec</A>
<DT><A HREF="https://www.fortinet.com/blog/threat-research">FortiGuard 实验室威胁研究 --- FortiGuard Labs Threat Research</A>
<DT><A HREF="https://0x00sec.org/">0x00sec - The Home of the Hacker</A>
<DT><A HREF="https://bughunters.google.com/blog">谷歌错误猎人 - 谷歌错误猎人</A>
<DT><A HREF="https://www.slcyber.io/blog/">Dark Web Intelligence & Cybersecurity Blog - Searchlight Cyber</A>
<DT><A HREF="https://sensepost.com/blog/">感邮 | 博客</A>
<DT><A HREF="https://www.kroll.com/en">克罗尔 |风险和财务咨询解决方案 --- Kroll | Risk and Financial Advisory Solutions</A>
<DT><A HREF="https://www.cybereason.com/blog/category/research">研究| 恶意生活网| 网络理性</A>
<DT><A HREF="https://blog.barracuda.com/">旅程笔记 - 通往更安全道路的指南</A>
<DT><A HREF="https://darktrace.com/blog">Blog | Darktrace</A>
<DT><A HREF="https://www.recordedfuture.com/research">Insikt Group Research | Recorded Future</A>
<DT><A HREF="https://www.sentinelone.com/labs/">SentinelLabs - We are hunters, reversers, exploit developers, and tinkerers shedding light on the world of malware, exploits, APTs, and cybercrime across all platforms.</A>
<DT><A HREF="https://perception-point.io/blog/category/attack-trends/">Ransomware Protection | Perception Point</A>
<DT><A HREF="https://asec.ahnlab.com/ko/">ASEC 博客 - AhnLab</A>
<DT><A HREF="https://any.run/cybersecurity-blog/">ANY.RUN&#39;s Cybersecurity Blog</A>
<DT><A HREF="https://www.cybereason.com/blog">Cybereason Blog | Cybersecurity News and Analysis</A>
<DT><A HREF="https://checkmarx.com/blog/">专家见解、论文和观点 | Checkmarx 博客</A>
<DT><A HREF="https://www.rapid7.com/blog/posts/">Rapid7 网络安全博客 - 所有帖子</A>
<DT><A HREF="https://app.tidalcyber.com/">Tidal Cyber - Community Edition</A>
<DT><A HREF="https://socprime.com/blog/">SOC Prime 博客</A>
<DT><A HREF="https://blog.lumen.com/">Blog – Home | News & Insights on Next-Gen Technologies - Lumen</A>
<DT><A HREF="https://www.humansecurity.com/learn/blog">HUMAN Blog</A>
<DT><A HREF="https://www.nextron-systems.com/blog/">Blog - Nextron Systems</A>
<DT><A HREF="https://www.recordedfuture.com/resources">Threat Intelligence Resources | Recorded Future</A>
<DT><A HREF="https://flashpoint.io/blog/">Threat Intelligence Blog | Flashpoint</A>
<DT><A HREF="https://www.horizon3.ai/category/attack-blogs/">攻击博客 – Horizon3.ai</A>
<DT><A HREF="https://www.deepinstinct.com/blog">Deep Learning Blog & Use Cases | Deep Instinct</A>
<DT><A HREF="https://www.schneier.com/essays/">Schneier on Security: Essays</A>
<DT><A HREF="https://securityintelligence.com/">安全情报 - 网络安全分析和洞察</A>
<DT><A HREF="https://threatresearch.ext.hp.com/blog/">HP Wolf Security Blog | Cyber Threat Insights and Reports</A>
<DT><A HREF="https://blog.phylum.io/tag/research/">研究 - 门</A>
<DT><A HREF="https://packetstormsecurity.com/">数据包风暴</A>
<DT><A HREF="https://asec.ahnlab.com/en/">ASEC BLOG - AhnLab</A>
<DT><A HREF="https://www.mcafee.com/blogs/other-blogs/mcafee-labs/">McAfee Labs | McAfee Blogs</A>
<DT><A HREF="https://news.sophos.com/en-us/category/threat-research/">Threat Research – Sophos News</A>
<DT><A HREF="https://medium.com/">Medium</A>
<DT><A HREF="https://malware.news/">Malware Analysis, News and Indicators</A>
<DT><A HREF="https://github.com/joshhighet/ransomwatch/blob/main/docs/INDEX.md">ransomwatch/docs/INDEX.md at main · joshhighet/ransomwatch</A>
<DT><A HREF="https://www.secjuice.com/">酸汁|非营利网络善良</A>
<DT><A HREF="https://decoded.avast.io/">Avast Threat Labs - Uncovering Tactics, Techniques and Procedures of malicious actors</A>
<DT><A HREF="https://news.sophos.com/en-us/">Sophos News – The Sophos Blog</A>
<DT><A HREF="https://www.cyfirma.com/resources/">资源 - 网络情报和外部威胁监控 | CYFIRMA</A>
<DT><A HREF="https://www.genians.co.kr/blog/threat_intelligence">威胁分析报告-genians</A>
<DT><A HREF="https://cert.gov.ua/articles">CERT-UA</A>
<DT><A HREF="https://labs.withsecure.com/home">WithSecure™ Labs | WithSecure™ Labs</A>
<DT><A HREF="https://bi.zone/expertise/blog/">技术文章</A>
<DT><A HREF="https://0dayfans.com/">0dayfans.com</A>
<DT><A HREF="https://blog.intigriti.com/">Intigriti - Bug Bounty & Agile Pentesting Platform</A>
<DT><A HREF="https://tierzerosecurity.co.nz/blog.html">Blog | Penetration Testing - Red Teaming - Purple Teaming - Security Training | Tier Zero Security, New Zealand</A>
<DT><A HREF="https://blog.sonicwall.com/en-us/">SonicWall Blog | Cybersecurity News and Announcements</A>
<DT><A HREF="https://blogs.infoblox.com/">Infoblox Company Blogs, Support Central, and Community Info</A>
<DT><A HREF="https://meterpreter.org/category/information-security/">Information Security • InfoTech & InfoSec News</A>
<DT><A HREF="https://outpost24.com/blog/">Cybersecurity Blog & News - Outpost24</A>
<DT><A HREF="https://blog.oversecured.com/">News, Techniques & Guides | Oversecured Blog</A>
<DT><A HREF="https://www.cyfirma.com/cyber-research/">网络威胁情报报告|风险研究|带外</A>
<DT><A HREF="https://www.leviathansecurity.com/blog">Blog — Leviathan Security Group - Penetration Testing, Security Assessment, Risk Advisory</A>
<DT><A HREF="https://blog.cyber5w.com/">CYBER 5W</A>
<DT><A HREF="https://blog.projectdiscovery.io/">ProjectDiscovery.io | Blog</A>
<DT><A HREF="https://cloud.google.com/blog">谷歌云博客 |新闻、专题和公告</A>
<DT><A HREF="https://fortiguard.fortinet.com/">FortiGuard Labs</A>
<DT><A HREF="https://www.sprocketsecurity.com/resources">Cybersecurity Blog | Sprocket Security</A>
<DT><A HREF="https://blog.sekoia.io/category/research-threat-intelligence/">Research & Threat Intelligence Archives - Sekoia.io Blog</A>
<DT><A HREF="https://labs.jumpsec.com/">Published | JUMPSEC LABS</A>
<DT><A HREF="https://cyble.com/blog/">Expert Cybersecurity Insights And Analysis | Cyble Blog</A>
<DT><A HREF="https://www.facct.ru/blog/">Блог | F.A.С.С.T.</A>
<DT><A HREF="https://blog.phylum.io/">Phylum | Research Blog</A>
<DT><A HREF="https://sysdig.com/blog/">Blog | Sysdig</A>
<DT><A HREF="https://www.secureworks.com/blog">Secureworks Blog | Secureworks</A>
<DT><A HREF="https://www.netscout.com/blog">NETSCOUT Blog | NETSCOUT</A>
<DT><A HREF="https://www.aquasec.com/blog/">Aqua Cloud Native Blog - Aqua</A>
<DT><A HREF="https://labs.watchtowr.com/">watchTowr Labs - Blog</A>
<DT><A HREF="https://www.kaspersky.com/blog/">Kaspersky official blog</A>
<DT><A HREF="https://blog-en.itochuci.co.jp/">Researcher Blog - ITOCHU Cyber & Intelligence Inc.</A>
<DT><A HREF="https://www.elastic.co/security-labs">Elastic Security Labs</A>
<DT><A HREF="https://www.cisecurity.org/insights/white-papers">白皮书</A>
<DT><A HREF="https://abnormalsecurity.com/blog">电子邮件安全博客 |异常</A>
<DT><A HREF="https://www.embeeresearch.io/">Malware Analysis and Threat Intelligence Research</A>
<DT><A HREF="https://blogs.blackberry.com/en/home">BlackBerry Blog</A>
<DT><A HREF="https://www.elladodelmal.com/">Un informático en el lado del mal</A>
<DT><A HREF="https://niebezpiecznik.pl/">-- Niebezpiecznik.pl --</A>
<DT><A HREF="https://www.ptsecurity.com/ww-en/analytics/">Positive Technologies 分析</A>
<DT><A HREF="https://blog.thalium.re/">THALIUM</A>
<DT><A HREF="https://portswigger.net/research/articles">所有文章 - PortSwigger 研究</A>
<DT><A HREF="https://devco.re/en/blog/">DEVCORE</A>
<DT><A HREF="https://www.ambionics.io/blog/">Security Blog | Ambionics Security</A>
<DT><A HREF="https://www.huntress.com/blog">Huntress Blog | Huntress</A>
<DT><A HREF="https://mantodeasecurity.de/en/blog/">Blog - Mantodea Security</A>
<DT><A HREF="https://redcanary.com/blog/">The Red Canary Blog: Information Security Insights</A>
<DT><A HREF="https://lab52.io/blog/dll-side-loading-through-iobit-against-colombia/">DLL Side Loading through IObit against Colombia</A>
<DT><A HREF="https://blog.0daylabs.com/">Blog - 0daylabs | Security | Training | Testing</A>
<DT><A HREF="https://www.reliaquest.com/blog/">ReliaQuest Blog - Threat Hunting, Security Operations, and More</A>
<DT><A HREF="https://www.resecurity.com/blog">Resecurity | Blog</A>
<DT><A HREF="https://devco.re/blog/">最新讯息News | DEVCORE 戴夫寇尔</A>
<DT><A HREF="https://blog.sucuri.net/">网站安全新闻 | Sucuri 博客</A>
<DT><A HREF="https://blog.huntr.com/">Huntr Blog</A>
<DT><A HREF="https://blog.morphisec.com/">Morphisec Breach Prevention Blog</A>
<DT><A HREF="https://blog.securelayer7.net/">Penetration Testing and CyberSecurity Solution - SecureLayer7 -</A>
<DT><A HREF="https://redfoxsec.com/blog/">Blogs - Redfox Security</A>
<DT><A HREF="https://www.zerodayinitiative.com/blog">Zero Day Initiative — Blog</A>
<DT><A HREF="https://summoning.team/blog/">Blogs</A>
<DT><A HREF="https://www.outflank.nl/blog/">Publications | Outflank</A>
<DT><A HREF="https://purplesec.us/">托管网络安全服务 | PurpleSec</A>
<DT><A HREF="https://research.nccgroup.com/category/public-reports/">NCC Group Research Blog | Making the world safer and more secure</A>
<DT><A HREF="https://www.certego.net/blog/">Blog</A>
<DT><A HREF="https://www.ox.security/blog/">The Ultimate App Security Blog | OX Security</A>
<DT><A HREF="https://blog.bushidotoken.net/">@BushidoToken 威胁英特尔 --- @BushidoToken Threat Intel</A>
<DT><A HREF="https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog">SpiderLabs 博客</A>
<DT><A HREF="https://www.gdatasoftware.com/blog/techblog">Techblog | G DATA SECURITY BLOG</A>
<DT><A HREF="https://securitylabs.datadoghq.com/articles/">Article Listing | Datadog Security Labs</A>
<DT><A HREF="https://www.sygnia.co/blog/">Latest Cybersecurity Insights & Trends | Sygnia Blog</A>
<DT><A HREF="https://bc-security.org/blog/">Blog – BC Security</A>
<DT><A HREF="https://claroty.com/team82/research?utm_campaign=%5BSocial%5D%20Team82%20-%20OPC%20UA%20Deep%20Dive%20Series&utm_content=297581316&utm_medium=social&utm_source=twitter&hss_channel=tw-18252252">Team82 - XIoT Cybersecurity Research | Claroty</A>
<DT><A HREF="https://www.ptsecurity.com/ww-en/analytics/pt-esc-threat-intelligence/">PT ESC Threat Intelligence</A>
<DT><A HREF="https://juggernaut-sec.com/blog/">Blog – Latest Posts - Juggernaut Pentesting Blog</A>
<DT><A HREF="https://www.mobile-hacker.com/2024/06/24/monitoring-android-file-system-with-fsmon/#">Monitoring Android file system with fsmon</A>
<DT><A HREF="https://wpscan.com/blog/">Blog | WPScan</A>
<DT><A HREF="https://labs.nettitude.com/blog/">Blog Archives - LRQA Nettitude Labs</A>
<DT><A HREF="https://security.humanativaspa.it/category/news/">News Archives - hn security</A>
<DT><A HREF="https://www.elttam.com/blog/#content">Research Blog</A>
<DT><A HREF="https://www.cleafy.com/labs">Cleafy Labs | Threat Intelligence feeds and fraud detection</A>
<DT><A HREF="https://lab.wallarm.com/">Wallarm - Cloud-Native Application and API Security</A>
<DT><A HREF="https://www.cisa.gov/news-events/cybersecurity-advisories?f%5B0%5D=advisory_type%3A93">Cybersecurity Alerts & Advisories | CISA</A>
<DT><A HREF="https://sandflysecurity.com/blog/">Posts | Blog | Sandfly Security</A>
<DT><A HREF="https://jfrog.com/blog/">From the Frog&#39;s mouth - JFrog Blog</A>
<DT><A HREF="https://www.cadosecurity.com/blog">Cloud Incident Response Blog | Cado Security</A>
<DT><A HREF="https://labs.k7computing.com/">Lab Blog - K7 Labs</A>
<DT><A HREF="https://linuxsecurity.com/">热门 Linux 新闻、公告、操作指南和功能发布</A>
<DT><A HREF="https://hunt.io/blog">Threat Hunting Blog | Hunt.io</A>
<DT><A HREF="https://www.trustwave.com/en-us/resources/blogs/trustwave-blog">Trustwave Blog</A>
<DT><A HREF="https://intezer.com/blog/">Intezer - Blog</A>
<DT><A HREF="https://ssd-disclosure.com/advisories/">SSD Secure Disclosure Security Advisories - SSD Secure Disclosure</A>
<DT><A HREF="https://www.uptycs.com/blog">Uptycs Blog | Cloud Security Insights for Linux and Containers</A>
<DT><A HREF="https://tantosec.com/blog/">Tanto Blog</A>
<DT><A HREF="https://cyberthint.io/resources/">Resources - Cyberthint</A>
<DT><A HREF="https://slashnext.com/blog/">SlashNext Blog | Multi-Channel Phishing Protection & Cyber Security</A>
<DT><A HREF="https://blogs.infoblox.com/category/security/">Security Blog - Infoblox Experts Community</A>
<DT><A HREF="https://trustedsec.com/blog">TrustedSec | Blog</A>
<DT><A HREF="https://blogs.jpcert.or.jp/en/incident/">List of “Incident” - JPCERT/CC Eyes | JPCERT Coordination Center official Blog</A>
<DT><A HREF="https://blog.barracuda.com/category/research">Research</A>
<DT><A HREF="https://www.darkrelay.com/blog">Cybersecurity Research Blogs | DarkRelay</A>
<DT><A HREF="https://www.validin.com/blog/">Threat Hunting with Validin - Blog | Validin</A>
<DT><A HREF="https://objective-see.org/blog.html">目标-查看:博客</A>
<DT><A HREF="https://salt.security/blog">API Security Blog - API Attack Prevention Strategy Guides</A>
<DT><A HREF="https://www.zdnet.com/topic/security/">安全|中电网络</A>
<DT><A HREF="https://claroty.com/team82/research">Team82 - XIoT 网络安全研究 | Claroty</A>
<DT><A HREF="https://www.cyberark.com/resources/threat-research-blog">Threat Research Blog</A>
<DT><A HREF="https://securitylabs.datadoghq.com/">Home | Datadog Security Labs</A>
<DT><A HREF="https://www.crowdfense.com/blog/">博客 - Crowdfense</A>
<DT><A HREF="https://www.oligo.security/resources/blog?category=All">Runtime application security blog | Oligo Security</A>
<DT><A HREF="https://www.team-cymru.com/blog/categories/threat-research">Threat Research</A>
<DT><A HREF="https://www.runzero.com/blog/runzero-research/">runZero Research</A>
<DT><A HREF="https://ironscales.com/blog">Blog</A>
<DT><A HREF="https://analyst1.com/category/blog/">博客档案 | 分析师 1%</A>
<DT><A HREF="https://cybenari.com/blog/">Latest Blog Posts - Cybenari</A>
<DT><A HREF="https://globalcyberalliance.org/blog/">GCA 博客 - 全球网络联盟</A>
<DT><A HREF="https://ioactive.com/resources/blogs/">RESOURCES – IOActive</A>
<DT><A HREF="https://www.0xpolar.com/blog">Blog | MOHAMMED ADEL</A>
<DT><A HREF="https://blog.syss.com/">SySS Tech Blog</A>
<DT><A HREF="https://reasonlabs.com/research">ReasonLabs 研究</A>
<DT><A HREF="https://blog.scrt.ch/">SCRT Team Blog – Orange Cyberdefense Switzerland&#39;s technical blog</A>
<DT><A HREF="https://www.dragos.com/blog/">Dragos Blog</A>
<DT><A HREF="https://tetrelsec.com/posts/">Posts · Tetrel Security</A>
<DT><A HREF="https://iverify.io/blog">Download Showcase.apk Vulnerability Disclosure</A>
<DT><A HREF="https://intel471.com/blog">Blog: Stay Ahead of Cyber Threats | Intel471</A>
<DT><A HREF="https://threatmon.io/blog/">ThreatMon 博客</A>
<DT><A HREF="https://www.paloaltonetworks.com/blog/network-security/">网络安全 - Palo Alto Networks 博客</A>
<DT><A HREF="https://www.akamai.com/blog">Blog Posts | Akamai</A>
<DT><A HREF="https://www.perimeter81.com/blog?accountid=2597329217&utm_source=google&utm_medium=cpc&utm_campaign=17072827859&utm_adgroup=135575893109&utm_target=kwd-415398361840&utm_matchtype=e&utm_network=g&utm_device=c&utm_creative=676810550877&utm_term=perimeter%2081&utm_adposition=&utm_content=&utm_placement=&utm_campaigntype=performance&gclid=Cj0KCQjw9vqyBhCKARIsAIIcLMFwgQdyVGMIMfwaCq490U-y0PqPOHTqFdZvFisiwbgL7zWshpAaXYYaAuwmEALw_wcB">Cybersecurity Blog | Perimeter 81</A>
<DT><A HREF="https://www.perimeter81.com/blog">Cybersecurity Blog | Perimeter 81</A>
<DT><A HREF="https://www.offsec.com/blog/">Blog | OffSec</A>
<DT><A HREF="https://www.crowdsec.net/blog">Blog | CrowdSec</A>
<DT><A HREF="https://www.armosec.io/blog/">CloudSec Blog by ARMO</A>
<DT><A HREF="https://www.safebreach.com/blog/">Breach and Attack Simulation Articles | SafeBreach Blog</A>
<DT><A HREF="https://www.gdatasoftware.com/blog/">G DATA SECURITY BLOG</A>
<DT><A HREF="https://www.sonatype.com/blog">News and Notes from the Makers of Nexus | Sonatype Blog</A>
<DT><A HREF="https://sector7.computest.nl/">Sector 7</A>
<DT><A HREF="https://www.kandji.io/blog/">Kandji Blog | Apple Device Management - Mac Management</A>
<DT><A HREF="https://cyberint.com/blog/">Blog - Cyberint</A>
<DT><A HREF="https://www.pandasecurity.com/en/mediacenter/">Panda Security Mediacenter - All the info about your cybersecurity</A>
<DT><A HREF="https://www.s2w.inc/ko/resource">리소스 | S2W</A>
<DT><A HREF="https://www.miggo.io/resources">应用程序检测和响应 (ADR) 博客 | Miggo</A>
<DT><A HREF="https://www.cloudsek.com/blog">CloudSEK Blog - Cybersecurity Insights</A>
<DT><A HREF="https://jp.security.ntt/tech_blog">NTT 安全技术博客 | 安全控股</A>
<DT><A HREF="https://perception-point.io/blog/">Blog - Perception Point</A>
<DT><A HREF="https://blog.convisoappsec.com/en/">Application Security Blog - Conviso AppSec</A>
<DT><A HREF="https://versa-networks.com/blog/">The Versa Networks Blog - The Versa Networks Blog</A>
<DT><A HREF="https://www.gendigital.com/blog">Gen Blogs | Home</A>
<DT><A HREF="https://www.securonix.com/blog">Latest Cybersecurity Insights, Statistics, Trends, and Articles</A>
<DT><A HREF="https://globalsecurelayer.com/blog">Blog | Global Secure Layer</A>
<DT><A HREF="https://www.truesec.com/hub/blog">Insights - Truesec</A>
<DT><A HREF="https://www.upguard.com/blog">UpGuard Blog | UpGuard</A>
<DT><A HREF="https://www.cyfirma.com/research/">Out of Band Archive - CYFIRMA</A>
<DT><A HREF="https://www.pixiepointsecurity.com/blog/">Blog | PixiePoint Security</A>
<DT><A HREF="https://www.criticalstart.com/criticalstart-blog/?blog-category=technical-blogs">Our Blog - Critical Start</A>
<DT><A HREF="https://www.newsguardtech.com/reports/">NewsGuard Special Reports - NewsGuard</A>
<DT><A HREF="https://fortgale.com/blog/">Fortgale | Cybersecurity and Cyber Threat Intelligence Blog</A>
<DT><A HREF="https://zengo.com/blog/">Blog - Zengo</A>
<DT><A HREF="https://socket.dev/blog">Blog - Socket</A>
<DT><A HREF="https://www.threatdown.com/blog/">Cybersecurity Blog - ThreatDown by Malwarebytes</A>
<DT><A HREF="https://arcticwolf.com/resources/blog/">Blog - Arctic Wolf</A>
<DT><A HREF="https://aws.amazon.com/cn/blogs/security/">AWS Security Blog</A>
<DT><A HREF="https://blog.includesecurity.com/">Include Security Research Blog - Team Research blog</A>
<DT><A HREF="https://s2w.inc/en/resource">Resources | S2W</A>
<DT><A HREF="https://www.mend.io/blog/">The Mend.io AppSec Blog</A>
<DT><A HREF="https://www.binarydefense.com/resources/blog/">网络安全博客 | 二进制防御</A>
<DT><A HREF="https://www.greynoise.io/blog">GreyNoise Intelligence | 网络安全博客</A>
<DT><A HREF="https://www.cobalt.io/resources">资源:重新思考应用程序安全性 | 钴</A>
<DT><A HREF="https://blog.cerbero.io/">Cerbero 博客</A>
<DT><A HREF="https://www.horizon3.ai/attack-research/">Attack Research – Horizon3.ai</A>
<DT><A HREF="https://constella.ai/blog/">身份威胁情报博客 | Constella Intelligence</A>
<DT><A HREF="https://www.cloudflare.com/threat-intelligence/research/">Threat Intelligence - Research page | Cloudflare</A>
<DT><A HREF="https://www.fox-it.com/nl-en/resource-hub/">资源中心 - Fox IT</A>
<DT><A HREF="https://falconforce.nl/blogs/">博客 - FalconForce</A>
<DT><A HREF="https://www.assetnote.io/resources/research">研究笔记</A>
<DT><A HREF="https://www.cloudflare.com/en-gb/threat-intelligence/">威胁情报中心 | Cloudflare</A>
<DT><A HREF="https://cloud.google.com/blog/topics/threat-intelligence/">威胁情报 | Google Cloud 博客</A>
<DT><A HREF="https://blogs.jpcert.or.jp/ja/">JPCERT/CC Eyes | JPCERT 协调中心官方博客</A>
<DT><A HREF="https://www.binarly.io/articles">Security Research & Insights | BINARLY</A>
<DT><A HREF="https://www.varonis.com/blog">Varonis Blog | All Things Data Security</A>
<DT><A HREF="https://arcticwolf.com/resources/category/blog-uk/">Blog - UK Archives - Arctic Wolf</A>
<DT><A HREF="https://www.sonarsource.com/blog/">Clean Code Blog | SonarSource | Sonar</A>
<DT><A HREF="https://securitylab.amnesty.org/">Home - Amnesty International Security Lab</A>
<DT><A HREF="https://www.nozominetworks.com/blog">The OT Cybersecurity Blog</A>
<DT><A HREF="https://jscrambler.com/blog">Jscrambler Blog: JavaScript protection, app security & more</A>
<DT><A HREF="https://www.avanan.com/blog">Avanan | Blog</A>
<DT><A HREF="https://www.zimperium.com/blog/">Blogs Archive - Zimperium</A>
<DT><A HREF="https://netlas.io/blog/">博客 - Netlas</A>
<DT><A HREF="https://tcm-sec.com/blog/">Blog - TCM Security</A>
<DT><A HREF="https://www.r-tec.net/news-events.html">新闻 - r-tec 网络安全</A>
<DT><A HREF="https://offsec.almond.consulting/">All articles - Almond Offensive Security Blog</A>
<DT><A HREF="https://www.netskope.com/blog/category/netskope-threat-labs">Threat Labs - Netskope</A>
<DT><A HREF="https://www.enablesecurity.com/blog/">Real-time communications security – Enable Security</A>
<DT><A HREF="https://sec-consult.com/blog/">SEC Consult Blog - Information Security and Company News - SEC Consult</A>
<DT><A HREF="https://www.intrinsec.com/blog/">博客 - IT 安全专家的所有见解</A>
<DT><A HREF="https://0din.ai/blog">The GenAI Bug Bounty Program | 0din.ai</A>
<DT><A HREF="https://www.cyber.gc.ca/en">Canadian Centre for Cyber Security</A>
<DT><A HREF="https://blog.0patch.com/">0patch Blog</A>
<DT><A HREF="https://specopssoft.com/blog/">Specops 软件博客 - Specops 软件</A>
<DT><A HREF="https://ccb.belgium.be/en/cert">网络应急响应小组 (CERT) | 比利时网络安全中心</A>
<DT><A HREF="https://guard.io/blog/">Browser Protection | Data & Privacy Security | Guardio Personal Blog</A>
<DT><A HREF="https://www.breachsense.com/blog/">Data breach monitoring - the blog</A>
<DT><A HREF="https://zeropath.com/blog">ZeroPath 博客 - Web 应用程序安全见解</A>
<DT><A HREF="https://www.synacktiv.com/publications">Publications</A>
<DT><A HREF="https://www.deep-kondah.com/spring-webflux-static-resource-access-vulnerability-cve-2024-38821-explained/">Spring WebFlux Authorization Bypass: CVE-2024-38821 Explained</A>
<DT><A HREF="https://www.midnightblue.nl/knowledge">Knowledge - Midnight Blue</A>
<DT><A HREF="https://www.trugard.ai/blogs">Blogs</A>
<DT><A HREF="https://www.techrepublic.com/topic/security/">安全 | TechRepublic</A>
<DT><A HREF="https://heimdalsecurity.com/blog/">网络安全博客 - Heimdal Security</A>
<DT><A HREF="https://phishcloud.com/resources/">资源-PhishCloud</A>
<DT><A HREF="https://www.securityrunners.io/blog">网络安全博客 | 安全跑者</A>
<DT><A HREF="https://projectdiscovery.io/blog">Blog — ProjectDiscovery</A>
<DT><A HREF="https://www.clearskysec.com/blog/">博客 – ClearSky 网络安全</A>
<DT><A HREF="https://icinga.com/blog/">Icinga » Blog</A>
<DT><A HREF="https://laburity.com/blog/">Blog - Laburity</A>
<DT><A HREF="https://escape.tech/blog/">Escape - The API Security Blog</A>
<DT><A HREF="https://pulsesecurity.co.nz/articles">Pulse Security</A>
<DT><A HREF="https://www.lineaje.com/blog">Lineaje - Blogs</A>
<DT><A HREF="https://blog.google/threat-analysis-group/">Official news and updates on Google&#39;s Threat Analysis Group | Google Blog</A>
<DT><A HREF="https://www.sonicwall.com/blog">SonicWall Blog | Cybersecurity News and Announcements</A>
<DT><A HREF="https://www.zafran.io/learn">Zafran Security | Learn more about Risk Mitigation</A>
<DT><A HREF="https://moonlock.com/blog">The Moonlock Blog: Cybersecurity blog for humans</A>
<DT><A HREF="https://www.lookout.com/threat-intelligence">威胁情报</A>
<DT><A HREF="https://www.jamf.com/blog/">Jamf Blog. Apple Device Management (MDM) & Security | Jamf</A>
<DT><A HREF="https://flatt.tech/research/">Flatt Security Research</A>
<DT><A HREF="https://www.oasis.security/blog">Non-Human Identity Management Blog</A>
<DT><A HREF="https://dfi.kaspersky.com/">Kaspersky Digital Footprint Intelligence</A>
<DT><A HREF="https://www.contrastsecurity.com/security-influencers">Application Security Blog - AppSec news, trends, tips and insights</A>
<DT><A HREF="https://www.ptsecurity.com/ru-ru/research/knowledge-base/">知识库</A>
<DT><A HREF="https://citizenlab.ca/">公民实验室-多伦多大学</A>
<DT><A HREF="https://threatconnect.com/blog/">Threat Intelligence and Cybersecurity Insights | Blog</A>
<DT><A HREF="https://www.recordedfuture.com/blog">Threat Intelligence Blog | Recorded Future</A>
<DT><A HREF="https://www.netscout.com/asert/blog">ASERT 安全工程和威胁博客 | NETSCOUT</A>
<DT><A HREF="https://heimdalsecurity.com/blog/posts/">帖子 - Heimdal 安全博客</A>
<DT><A HREF="https://www.imperva.com/blog/">Imperva Blog | Cyber Security Research, News & Insights</A>
<DT><A HREF="https://www.forcepoint.com/blog">Forcepoint Security Insights | Forcepoint</A>
<DT><A HREF="https://cofense.com/blog/">网络钓鱼预防和电子邮件安全博客 | Cofense</A>
<DT><A HREF="https://www.crowdstrike.com/en-us/blog/">Cybersecurity Blog | CrowdStrike</A>
<DT><A HREF="https://preossec.com/blog/">PreOS Security – Firmware Security For Enterprise And Forensics</A>
<DT><A HREF="https://blog.unit221b.com/dont-read-this-blog">Don&#39;t Read This Blog</A>
<DT><A HREF="https://www.beyondtrust.com/blog">Blog | BeyondTrust</A>
</DL><p>
<DT><H3 FOLDED>国内安全实验室</H3>
<DL><p>
<DT><A HREF="https://cloudsec.tencent.com/info/list.html">【每日云安全资讯】- 云鼎实验室 2023-11-10</A>
<DT><A HREF="https://m.qq.com/security_lab/">腾讯手机管家官网</A>
<DT><A HREF="https://tianwen.qianxin.com/blog">[ 星图实验室 ]</A>
<DT><A HREF="https://redbu1l.github.io/index.html">红日安全实验室 | sec-redclub.com</A>
<DT><A HREF="https://keenlab.tencent.com/zh/">腾讯科恩实验室官方博客</A>
<DT><A HREF="https://blog.xlab.qianxin.com/">奇安信 X 实验室</A>
<DT><A HREF="https://blog.nsfocus.net/author/fuying-lab/">伏影实验室 – 绿盟科技技术博客</A>
<DT><A HREF="https://360.net/research/team/#menu">安全团队_360数字安全</A>
<DT><A HREF="https://vul.360.net/">360漏洞研究院</A>
<DT><A HREF="https://ti.aliyun.com/#/overview">阿里云恶意文件检测平台 - 首页</A>
<DT><A HREF="https://starmap.dbappsecurity.com.cn/blog/">安全星图平台</A>
<DT><A HREF="https://ti.qianxin.com/blog/">奇安信威胁情报中心</A>
<DT><A HREF="https://www.goupsec.com/">GoUpSec - 升华安全佳- GoUpSec.com</A>
<DT><A HREF="https://blog.sekoia.io/">Sekoia.io 博客 - 有关威胁情报的新闻和分析</A>
<DT><A HREF="https://tiangonglab.github.io/blog/archive">历史博文 | 破壳漏洞挖掘平台</A>
<DT><A HREF="https://www.iceswordlab.com/archives/">Archives | IceSword Lab</A>
<DT><A HREF="https://sec.sangfor.com.cn/wiki-safe-events">风险监测平台</A>
<DT><A HREF="https://www.wangsu.com/news/blog-list">技术博客-网宿科技</A>
<DT><A HREF="https://cert.360.cn/">360CERT - 360网络安全响应中心官网</A>
<DT><A HREF="https://blog.topsec.com.cn/">天融信阿尔法实验室</A>
<DT><A HREF="https://devco.re/">具備駭客思維的紅隊演練專家 | DEVCORE 戴夫寇爾</A>
<DT><A HREF="https://www.darknavy.org/zh/">DARKNAVY</A>
<DT><A HREF="https://www.sangfor.com/farsight-labs-threat-intelligence/cybersecurity">Cyber Security | FarSight Labs Threat Intelligence | Sangfor</A>
<DT><A HREF="https://sec.sangfor.com.cn/security-vulnerability">深信服安全中心</A>
<DT><A HREF="https://jiwo.org/">机窝安全——全姿势|一站式|业界最全的安全分析防护平台!安全窝!</A>
<DT><A HREF="https://sectoday.tencent.com/info-today">SecToday Next</A>
</DL><p>
<DT><H3 FOLDED>安全文库</H3>
<DL><p>
<DT><A HREF="https://wy.zone.ci/">乌云(WooYun.org)历史漏洞查询---http://WY.ZONE.CI</A>
<DT><A HREF="https://www.hacking8.com/bug-web/">常见CMS 漏洞的目录</A>
<DT><A HREF="https://vuls.info/">Vuls Wiki</A>
<DT><A HREF="https://ninjia.gitbook.io/secskill/">Introduction - secskill</A>
</DL><p>
<DT><H3 FOLDED>web3</H3>
<DL><p>
<DT><A HREF="https://www.wtf.academy/learning-center">WTF Academy</A>
<DT><A HREF="https://github.com/slowmist/Web3-Project-Security-Practice-Requirements">slowmist/Web3-Project-Security-Practice-Requirements</A>
<DT><A HREF="https://github.com/Quillhash/Web3-Security-Tools">Quillhash/Web3-Security-Tools: This repository contains a list of the most popular and widely used tools in web3 security. If you find any tools missing, you can create a pull request and be a contribute the project.</A>
<DT><A HREF="https://github.com/razzorsec/AuditorsRoadmap">razzorsec/AuditorsRoadmap</A>
<DT><A HREF="https://github.com/transmissions11/solcurity">transmissions11/solcurity: Opinionated security and code quality standard for Solidity smart contracts.</A>
<DT><A HREF="https://github.com/SunWeb3Sec/DeFiHackLabs">SunWeb3Sec/DeFiHackLabs: Reproduce DeFi hacked incidents using Foundry.</A>
<DT><A HREF="https://darkhandbook.io/">DarkHandBook - Blockchain dark forest selfguard handbook - Master these, master the security of your cryptocurrency.</A>
</DL><p>
<DT><H3 FOLDED>国家标准网站</H3>
<DL><p>
<DT><A HREF="http://www.upbz.net/index.html">UPBZ免费标准下载网</A>
<DT><A HREF="https://www.freebuf.com/articles/security-management/224380.html">如何规范有效的进行风险评估? - FreeBuf网络安全行业门户</A>
<DT><A HREF="http://openstd.samr.gov.cn/bzgk/gb/;jsessionid=34B6627305AFAA56DBA19457E2AB6D1A">国家标准全文公开</A>
</DL><p>
<DT><H3 FOLDED>以图搜图</H3>
<DL><p>
<DT><A HREF="https://tineye.com/">TinEye Reverse Image Search</A>
<DT><A HREF="https://yandex.com/images?">Yandex Images: search for images online, image search</A>
<DT><A HREF="https://www.google.com/">Google</A>
<DT><A HREF="https://picfind.top/">imageSearch-最好用的以图搜图聚合站</A>
</DL><p>
</DL><p>
<DT><H3 FOLDED>每日安全推送</H3>
<DL><p>
<DT><H3 FOLDED>国外安全聚合网站</H3>
<DL><p>
<DT><A HREF="https://www.trukno.com/dashboard/news">TruKno | Real-World Threat Intelligence</A>
<DT><A HREF="https://www.reddit.com/r/netsec/new/">技术信息安全内容与讨论</A>
<DT><A HREF="https://securityaffairs.com/">安全事务 - 阅读、思考、分享......安全是每个人的责任</A>
<DT><A HREF="https://www.bleepingcomputer.com/">电脑发出响声网络安全、技术新闻和支持 --- BleepingComputer | Cybersecurity, Technology News and Support</A>
<DT><A HREF="https://thehackernews.com/">The Hacker News | #1 Trusted Cybersecurity News Site</A>
<DT><A HREF="https://www.secureworld.io/industry-news">安全世界新闻</A>
<DT><A HREF="https://www.securityweek.com/">网络安全新闻、见解和分析 |安全周刊 --- Cybersecurity News, Insights and Analysis | SecurityWeek</A>
<DT><A HREF="https://www.infosecurity-magazine.com/">Infosecurity Magazine - 信息安全和 IT 安全新闻和资源</A>
<DT><A HREF="https://cybernews.com/">Cyber Security News Today - Latest Updates & Research - Cybernews</A>
<DT><A HREF="https://securityboulevard.com/">Home - Security Boulevard</A>
</DL><p>
<DT><H3 FOLDED>CVE&POC</H3>
<DL><p>
<DT><A HREF="https://inthewild.io/feed">Vulnerability feed</A>
<DT><A HREF="https://www.cveshield.com/">CVEShield</A>
<DT><A HREF="https://attackerkb.com/activity-feed">活动提要 | AttackerKB</A>
<DT><A HREF="https://vuldb.com/zh/?">漏洞数据库 🛡</A>
<DT><A HREF="https://www.wordfence.com/threat-intel/vulnerabilities">WordPress Vulnerability Database</A>
<DT><A HREF="https://cxsecurity.com/">CXSECURITY.COM Free Security List</A>
<DT><A HREF="https://www.zerodayinitiative.com/advisories/published/">Published | Zero Day Initiative</A>
<DT><A HREF="https://vulert.com/vuln-db/">Vulert Vulnerability Database</A>
<DT><A HREF="https://www.northinfosec.com/">NorthInfosec</A>
<DT><A HREF="https://0day.today/">0day.today Exploit Database : vulnerability : 0day : new exploits : buy and sell private exploit : shellcode by 0day Today Team</A>
<DT><A HREF="https://security.snyk.io/vuln">Vulnerability DB | Snyk</A>
<DT><A HREF="https://attackerkb.com/topics">Topics | AttackerKB</A>
<DT><A HREF="https://jvn.jp/">日本漏洞说明</A>
<DT><A HREF="https://vulmon.com/">Vulmon - 漏洞情报搜索引擎</A>
<DT><A HREF="https://feedly.com/cve">Current Common Vulnerabilities and Exposures</A>
<DT><A HREF="https://exploitfinder.com/dbexploit/#exploits">ExploitFinder - Enterprise Vulnerability Intelligence Platform</A>
<DT><A HREF="https://cvecrowd.com/">CVE 人群 |目前 Fediverse 中讨论的 CVE</A>
</DL><p>
<DT><H3 FOLDED>其他</H3>
<DL><p>
<DT><A HREF="https://sec.today/pulses/">动态 - 每日安全</A>
<DT><A HREF="https://github.com/ufofly/yarb/blob/main/today.md">yarb/today.md at main · ufofly/yarb</A>
<DT><A HREF="https://hackmanac.com/news">新闻 - Hackmanac</A>
<DT><A HREF="https://dashboard.shadowserver.org/">仪表板 · Shadowserver 基金会</A>
<DT><A HREF="https://www.kitploit.com/">KitPloit - 渗透测试和黑客工具 --- KitPloit - PenTest & Hacking Tools</A>
<DT><A HREF="https://cisoseries.com/category/podcast/cyber-security-headlines/">网络安全头条新闻存档 - CISO 系列</A>
<DT><A HREF="https://www.computersecuritynews.it/">Computer Security News (BLOG) - Education improves awareness</A>
<DT><A HREF="https://www.ghacks.net/">gHacks Technology News and Advice</A>
<DT><A HREF="https://cispa.de/en">家</A>
<DT><A HREF="https://meterpreter.org/">渗透测试工具 •</A>
<DT><A HREF="https://www.antiycloud.com/#/antiy/safenotice">安天威胁情报中心</A>
<DT><A HREF="https://arxiv.org/">arXiv.org e-Print archive</A>
<DT><A HREF="https://betanews.com/">Technology News and Analysis - BetaNews</A>
<DT><A HREF="https://www.punto-informatico.it/sicurezza/">安全:每日新闻 - Punto Informatico 在线新闻</A>
<DT><A HREF="https://huntersinternational.su/companies/6513791368">HUNTERS INTERNATIONAL</A>
<DT><A HREF="https://hide01.ir/">HideZeroOne - مرجع دانلود دوره های تست نفوذ و امنیتHideZeroOne</A>
<DT><A HREF="https://www.securitynewspaper.com/">Information Security News|Cyber Security|Hacking Tutorial</A>
<DT><A HREF="https://hackway.rents.ac/">Магазин аккаунтов VK [АКТИВ] ВЫСОЧАЙШЕГО качества! ТОП категории в наличии! ✅15-17 | 18-25 | 25-60 | Москва 18-30✅</A>
<DT><A HREF="https://bewildcard.com/service">WildCard | 一分钟注册,轻松订阅海外软件服务</A>
</DL><p>
<DT><A HREF="https://securityonline.info/">渗透测试 • 信息安全</A>
<DT><A HREF="https://www.scmagazine.com/">Cybersecurity News, Awards, Webinars, eSummits, Research | SC Media</A>
<DT><A HREF="https://www.helpnetsecurity.com/">Help Net Security - Cybersecurity News</A>
<DT><A HREF="https://hackread.com/">Hackread - Latest Cybersecurity News, Press Releases & Technology Today</A>
<DT><A HREF="https://www.securitylab.ru/">安全实验室.ru</A>
<DT><A HREF="https://www.cybersecuritydive.com/">Cybersecurity News and Analysis | Cybersecurity Dive</A>
<DT><A HREF="https://www.itsec.ru/">首页 | ITSec.Ru</A>
<DT><A HREF="https://weekly.infosecwriteups.com/">The Infosec Newsletter</A>
<DT><A HREF="https://dailydarkweb.net/">Daily Dark Web</A>
<DT><A HREF="https://cybersecuritynews.com/">Cyber Security News - Latest Hacker and Security News Today</A>
<DT><A HREF="https://www.cyberdaily.au/">Cyber Daily - 网络新闻和分析</A>
<DT><A HREF="https://www.theregister.com/security/">安全新闻 • The Register</A>
<DT><A HREF="https://www.threatable.io/">有威胁的饲料</A>
<DT><A HREF="https://www.securityinfo.it/">主页 - Securityinfo.it</A>
<DT><A HREF="https://securityexpress.info/category/security/">Security Archives - The Information Technology Daily</A>
<DT><A HREF="https://morningstarsecurity.com/news">安全新闻 - 晨星安全</A>
<DT><A HREF="https://cyberpress.org/">网络新闻:最新网络安全新闻与分析</A>
<DT><A HREF="https://darkwebinformer.com/">Dark Web Informer - Coming Soon</A>
<DT><A HREF="https://doingfedtime.com/">DoingFedTime</A>
<DT><A HREF="https://www.inforisktoday.com/">信息风险管理新闻、培训、教育 - InfoRiskToday</A>
<DT><A HREF="https://thecyberexpress.com/">Cyber Express #1 值得信赖的网络安全新闻警报网站</A>
<DT><A HREF="https://techcrunch.com/category/security/">安全新闻 | TechCrunch</A>
<DT><A HREF="https://www.darkreading.com/">Dark Reading | Security | Protect The Business</A>
<DT><A HREF="https://arstechnica.com/security/">Security | Ars Technica</A>
<DT><A HREF="https://stegaops.com/">Stega Cyber Ops – 主动网络威胁情报的网络攻击</A>
<DT><A HREF="https://platform.whiteintel.io/dashboard">White Intel</A>
<DT><A HREF="https://www.cyber.gov.au/about-us/view-all-content/alerts-and-advisories">Alerts and Advisories | Cyber.gov.au</A>
<DT><A HREF="https://hackerdose.com/">Hackerdose | 今天解密明天</A>
<DT><A HREF="https://gbhackers.com/">网络安全新闻 - 最新安全新闻 |安全杂志</A>
<DT><A HREF="https://www.404media.co/">404 媒体</A>
<DT><A HREF="https://www.dbdigest.com/">Data Breaches Digest</A>
<DT><A HREF="https://therecord.media/">The Record from Recorded Future News</A>
<DT><A HREF="https://www.infostealers.com/learn-info-stealers/">Articles | InfoStealers</A>
<DT><A HREF="https://latesthackingnews.com/">最新黑客新闻 | 网络安全新闻、黑客工具和渗透测试课程 - LHN 为道德黑客、渗透测试人员、IT 安全专家以及基本上任何对网络安全世界感兴趣的人提供最新的黑客新闻、渗透测试工具和网络安全课程</A>
<DT><A HREF="https://venturebeat.com/category/security/">安全新闻 | VentureBeat</A>
<DT><A HREF="https://www.cybersecurity-insiders.com/">News - Cybersecurity Insiders</A>
<DT><A HREF="https://www.cyberdefensemagazine.com/">Cyber Defense Magazine | Cybersecurity Magazine - Daily News</A>
<DT><A HREF="https://www.trellix.com/blogs/research/">Research | Trellix Stories</A>
<DT><A HREF="https://www.journalofcybersec.com/CN/home">网络空间安全科学学报</A>
<DT><A HREF="https://sectoday.tencent.com/">SecToday Next</A>
<DT><A HREF="https://www.comparitech.com/ransomware-attack-map/">美国地图上显示最近的勒索软件攻击</A>
<DT><A HREF="https://infosec.exchange/explore">关于 - Infosec Exchange</A>
<DT><A HREF="https://www.exploit-db.com/">Exploit Database - Exploits for Penetration Testers, Researchers, and Ethical Hackers</A>
<DT><A HREF="https://www.ransomfeed.it/stats.php?page=country-list&country=China&y=0">勒索信息</A>
<DT><A HREF="https://www.openwall.com/lists/oss-security/">oss-security mailing list</A>
<DT><A HREF="https://www.ransomware.live/map/CN">Ransomware.live - Victims from China</A>
<DT><A HREF="https://securitylab.github.com/advisories/">Advisories | GitHub Security Lab</A>
<DT><A HREF="https://www.incibe.es/incibe-cert/alerta-temprana/avisos-sci">SCI 公告 | INCIBE-CERT |意大利国际商业教育协会</A>
<DT><A HREF="https://32x33.institute/">32x33 Institute</A>
<DT><A HREF="https://news.ycombinator.com/news">Hacker News</A>
<DT><A HREF="https://zeli.app/zh">Zeli - 用中文阅读Hacker News和AI论文</A>
<DT><A HREF="https://cyberscoop.com/">CyberScoop | 突发网络安全新闻、公共部门威胁</A>
<DT><A HREF="https://www.cert-in.org.in/">Indian - Computer Emergency Response Team</A>
<DT><A HREF="https://www.v2ex.com/go/security">V2EX › 信息安全</A>
<DT><A HREF="https://socradar.io/blog/">Blog - SOCRadar® Cyber Intelligence Inc.</A>
<DT><A HREF="https://databreaches.net/">DataBreaches.Net – 安全不足的办公室</A>
<DT><A HREF="https://community.opentextcybersecurity.com/">OpenText 网络安全 | Webroot 社区</A>
<DT><A HREF="https://lists.apache.org/list.html?dev@tomcat.apache.org">dev@tomcat.apache.org, past month - Apache Mail Archives</A>
<DT><A HREF="https://netzpolitik.org/">netzpolitik.org</A>
<DT><A HREF="https://www.dailydot.com/topics/debug/">技术</A>
<DT><A HREF="https://www.socinvestigation.com/">Home - Security Investigation</A>
<DT><A HREF="https://securitybrief.com.au/">SecurityBrief Australia - 为 CISO 和网络安全决策者提供技术新闻</A>
<DT><A HREF="https://www.websiteplanet.com/news/">消息</A>
<DT><A HREF="https://www.csoonline.com/">CSO Online | 以业务速度保障安全</A>
<DT><A HREF="https://dept.one/">首页 - 第一部门</A>
<DT><A HREF="https://www.computerweekly.com/">Computer Weekly | Information Technology (IT) News, UK IT Jobs, Industry News</A>
<DT><A HREF="https://cybersecuritynews.com/amp/">Cyber Security News</A>
<DT><A HREF="https://isc.sans.edu/diaryarchive.html">InfoSec Diary Blog Archive - SANS Internet Storm Center</A>
<DT><A HREF="https://www.securitymagazine.com/">安全杂志 | 面向安全高管的商业杂志</A>
<DT><A HREF="https://securityreviewmag.com/">Security Review Magazine - We bring you the latest from the IT and physical security industry in the Middle East and Africa region.</A>
<DT><A HREF="https://osint10x.com/">首页 - Osint10x</A>
<DT><A HREF="https://news.hackreports.com/">Hack Reports - Latest Cybersecurity News, Trends & Updates</A>
<DT><A HREF="https://www.spiegel.de/netzwelt/">Netzwelt - DER SPIEGEL明镜周刊</A>
<DT><A HREF="https://badcyber.com/">BadCyber——让信息安全新闻再次伟大!</A>
<DT><A HREF="https://www.malwarepatrol.net/onpatrol4malware-blog/">Malware Patrol Blog | Malware Patrol</A>
<DT><A HREF="https://www.ccc.de/en/">CCC | 主页</A>
<DT><A HREF="https://hackhunting.com/">HACKHUNTING – 最新网络安全新闻和安全事件</A>
<DT><A HREF="https://dailysecurityreview.com/">Latest news Breaches, Hacks, & Protection Tips - Daily Security Review</A>
</DL><p>
<DT><H3 FOLDED>攻防知识库</H3>
<DL><p>
<DT><H3 FOLDED>个人网络安全白手册</H3>
<DL><p>
<DT><A HREF="https://www.cyber.gov.au/sites/default/files/2023-03/personal_cyber_security_guide_first_steps_simplified_chinese.pdf">ACSC - Home User Guide - FIRST STEPS</A>
<DT><A HREF="https://digital-defense.io/?ref=32x33.institute">数字防御</A>
<DT><A HREF="https://ssd.eff.org/?ref=32x33.institute">监视自卫</A>
</DL><p>
<DT><A HREF="https://www.hackingarticles.in/">Hacking Articles - Raj Chandel&#39;s Blog</A>
<DT><A HREF="https://wintrysec.github.io/">项目主页 | 网络安全知识库</A>
<DT><A HREF="https://wiki.timlzh.com/">Web武器库</A>
<DT><A HREF="https://peiqi.wgpsec.org/">PeiQi文库</A>
<DT><A HREF="https://wiki.ckcsec.cn/">CKCsec安全研究院 | 面向网络安全从业者的知识文库</A>
<DT><A HREF="https://github.com/meirwah/awesome-incident-response/blob/master/README_ch.md#%E4%B9%A6%E7%B1%8D">数字取证与应急响应(DFIR)</A>
<DT><A HREF="https://blue.y1ng.org/">index - 攻防对抗·蓝队清单</A>
<DT><A HREF="https://book.hacktricks.xyz/v/cn">HackTricks | Chinese - Ht | HackTricks</A>
<DT><A HREF="https://www.kanxue.com/chm.htm">看雪学苑-看雪-安全培训|安全招聘|www.kanxue.com</A>
<DT><A HREF="https://www.kancloud.cn/noahs/src_hacker/2120640">src导航站 · 白帽与安全 · 看云</A>
<DT><A HREF="https://ninjia.gitbook.io/secskill">Introduction | secskill</A>
<DT><A HREF="https://baizesec.github.io/bylibrary/">首页 - 白阁文库</A>
<DT><A HREF="https://wiki.wgpsec.org/">狼组安全团队公开知识库</A>
<DT><A HREF="https://wiki.teamssix.com/">T Wiki</A>
<DT><A HREF="https://www.ired.team/">What is ired.team notes? | Red Team Notes</A>
<DT><A HREF="https://gtfobins.github.io/">GTFOBins</A>
<DT><A HREF="https://defcon.org/">DEF CON® 黑客大会主页</A>
<DT><A HREF="https://drootkit.github.io/">Introduction · GitBook</A>
<DT><A HREF="https://swisskyrepo.github.io/PayloadsAllTheThings/">Payloads All The Things</A>
<DT><A HREF="https://netlas.io/blog/google_dorking_in_cybersecurity/">Google Dorking 在网络安全中 - Netlas 博客</A>
<DT><A HREF="https://iq.thc.org/">Knowledge Base</A>
<DT><A HREF="https://tib3rius.com/">主页 | Tib3rius</A>
<DT><A HREF="https://book.hacktricks.xyz/">HackTricks | HackTricks</A>
<DT><A HREF="https://pentestbook.six2dez.com/">/home/six2dez/.pentest-book | Pentest Book</A>
<DT><A HREF="https://gowthams.gitbook.io/bughunter-handbook">Introduction | Bug Hunter Handbook</A>
<DT><A HREF="https://swisskyrepo.github.io/InternalAllTheThings/">Internal All The Things</A>
<DT><A HREF="https://oreobiscuit.gitbook.io/introduction">Introduction to Biscuit&#39;s Bug Bounty Playbook | Biscuit&#39;s Bug Bounty Playbook</A>
<DT><A HREF="https://workbook.securityboat.net/Pentesting/">Pentesting - SecurityBoat Workbook</A>
<DT><A HREF="https://s0cm0nkey.gitbook.io/s0cm0nkeys-security-reference-guide">All of the Best Links and Resources on Cyber Security. | s0cm0nkey&#39;s Security Reference Guide</A>
<DT><A HREF="https://gowsundar.gitbook.io/book-of-bugbounty-tips">Introduction | Book of BugBounty Tips</A>
<DT><A HREF="https://sallam.gitbook.io/sec-88/api-sec">API-Sec | Sec-88</A>
<DT><A HREF="https://uestc.feishu.cn/docx/FrIQduzecoB6plxC9hecENkMnMg">网络安全攻防期末复习 - 飞书云文档</A>
<DT><A HREF="https://www.henry-blog.life/henry-blog">CobaltStrike系列 | Henry&#39;s Blog</A>
<DT><A HREF="https://github.com/Threekiii/Awesome-Redteam">Threekiii/Awesome-Redteam: 一个攻防知识仓库 Red Teaming and Offensive Security</A>
<DT><A HREF="http://www.uinio.com/">UinIO.com 电子技术实验室</A>
<DT><A HREF="https://iotsecurity.cxaqhq.cn/#/">IoT Vulnerability Wiki</A>
<DT><A HREF="https://eieio.games/">eieio.games</A>
<DT><A HREF="https://link.beishanxueyuan.com/">link.beishanxueyuan.com</A>
<DT><A HREF="https://github.com/SexyBeast233/SecBooks/blob/main/%E3%80%90%E5%86%85%E7%BD%91%E7%B3%BB%E5%88%97%E3%80%91intranet/%E6%9C%80%E5%A5%BD%E7%94%A8%E7%9A%84%E5%86%85%E7%BD%91%E7%A9%BF%E9%80%8F%E5%B7%A5%E5%85%B7%E5%90%88%E9%9B%86.md">SecBooks/【内网系列】intranet/最好用的内网穿透工具合集.md at main · SexyBeast233/SecBooks</A>
<DT><A HREF="https://github.com/SexyBeast233/SecBooks/tree/main">SexyBeast233/SecBooks: 安全类各家文库大乱斗</A>
<DT><A HREF="https://arthurchiao.art/articles-zh/">Articles (cn-zh)</A>
<DT><A HREF="https://tryhackme.com/">TryHackMe | Cyber Security Training</A>
</DL><p>
<DT><H3 FOLDED>SRC</H3>
<DL><p>
<DT><H3 FOLDED>src</H3>
<DL><p>
<DT><A HREF="http://tsrc.tidesec.com/dashboard">Tsrc</A>
<DT><A HREF="http://wy.zone.ci/index.php">乌云(WooYun.org)历史漏洞查询---http://WY.ZONE.CI</A>
<DT><A HREF="http://www.newsrc.cn/">SRC导航 – 网络安全平台导航 | SRC平台 | 漏洞提交 | 安全应急响应中心 | 漏洞平台 | 众测平台</A>
<DT><A HREF="https://src.sjtu.edu.cn/">主页 | 教育漏洞报告平台(EDUSRC)</A>
<DT><A HREF="https://www.first.org/">FIRST - Improving Security Together</A>
<DT><A HREF="https://taksec.github.io/google-dorks-bug-bounty/">Google Dorks for Bug Bounty</A>
</DL><p>
<DT><A HREF="https://r0yanx.com/2024/02/01/BurpSuite%E5%BF%BD%E7%95%A5%E5%BF%83%E8%B7%B3%E5%8C%85%E7%9A%84%E4%BC%98%E9%9B%85%E8%A7%A3%E6%B3%95/">BurpSuite 忽略心跳包的优雅解法 | r0yanx&#39;s Blog</A>
<DT><A HREF="https://huntr.com/">huntr - The world’s first bug bounty platform for AI/ML</A>
<DT><A HREF="https://github.com/juice-shop/juice-shop?tab=readme-ov-file">juice-shop/juice-shop: OWASP Juice Shop: Probably the most modern and sophisticated insecure web application</A>
<DT><A HREF="https://pentester.land/">Pentester Land - Offensive InfoSec</A>
<DT><A HREF="https://github.com/en0th/ElectricRat?tab=readme-ov-file">en0th/ElectricRat: 电气鼠靶场系统是一种带有漏洞的Web应用程序,旨在为Web安全渗透测试学习者提供学习和实践的机会。The Electrical Mouse Target Range System is a web application with vulnerabilities designed to provide learning and practice opportunities for web security penetration testing learners.</A>
<DT><A HREF="https://sanshiok.com/img/HackTools/index.html">HackTools</A>
</DL><p>
<DT><H3 FOLDED>CVE&POC</H3>
<DL><p>
<DT><A HREF="https://inthewild.io/feed">Vulnerability feed</A>
<DT><A HREF="https://www.cveshield.com/">CVEShield</A>
<DT><A HREF="https://attackerkb.com/activity-feed">活动提要 | AttackerKB</A>
<DT><A HREF="https://vuldb.com/zh/?">漏洞数据库 🛡</A>
<DT><A HREF="https://www.wordfence.com/threat-intel/vulnerabilities">WordPress Vulnerability Database</A>
<DT><A HREF="https://cxsecurity.com/">CXSECURITY.COM Free Security List</A>
<DT><A HREF="https://www.zerodayinitiative.com/advisories/published/">Published | Zero Day Initiative</A>
<DT><A HREF="https://vulert.com/vuln-db/">Vulert Vulnerability Database</A>
<DT><A HREF="https://www.northinfosec.com/">NorthInfosec</A>
<DT><A HREF="https://0day.today/">0day.today Exploit Database : vulnerability : 0day : new exploits : buy and sell private exploit : shellcode by 0day Today Team</A>
<DT><A HREF="https://security.snyk.io/vuln">Vulnerability DB | Snyk</A>
<DT><A HREF="https://attackerkb.com/topics">Topics | AttackerKB</A>
<DT><A HREF="https://jvn.jp/">日本漏洞说明</A>
<DT><A HREF="https://vulmon.com/">Vulmon - 漏洞情报搜索引擎</A>
<DT><A HREF="https://feedly.com/cve">Current Common Vulnerabilities and Exposures</A>
<DT><A HREF="https://exploitfinder.com/dbexploit/#exploits">ExploitFinder - Enterprise Vulnerability Intelligence Platform</A>
<DT><A HREF="https://cvecrowd.com/">CVE 人群 |目前 Fediverse 中讨论的 CVE</A>
</DL><p>
</DL><p>
</DL><p>