5050
5151[ Python PyYAML反序列化漏洞实验和payload构造] ( http://www.code2sec.com/2017/09/22/python-pyyaml%E5%8F%8D%E5%BA%8F%E5%88%97%E5%8C%96%E6%BC%8F%E6%B4%9E%E5%AE%9E%E9%AA%8C%E5%92%8Cpayload%E6%9E%84%E9%80%A0/ )
5252
53+ [ Exploiting Python Deserialization Vulnerabilities] ( https://crowdshield.com/blog.php?name=exploiting-python-deserialization-vulnerabilities )
54+
5355
5456
5557### 代码审计
@@ -62,16 +64,16 @@ https://xianzhi.aliyun.com/forum/read/301.html
6264https://xianzhi.aliyun.com/forum/read/300.html
6365https://xianzhi.aliyun.com/forum/read/274.html
6466
67+ [ 廖新喜大佬的python代码审计工具] ( https://github.com/shengqi158/pyvulhunter )
68+
6569
6670
67- ### python web 框架
71+ ### Django相关
6872
6973[ Django debug page XSS漏洞(CVE-2017 -12794)分析] ( https://www.leavesongs.com/PENETRATION/django-debug-page-xss.html )
7074
7175[ Django DeleteView without confirmation template, but with CSRF attack] ( https://www.leavesongs.com/PYTHON/django-deleteView-without-confirmation-template.html )
7276
73- [ 谈一谈如何在Python开发中拒绝SSRF漏洞] ( https://www.leavesongs.com/PYTHON/defend-ssrf-vulnerable-in-python.html )
74-
7577[ Django安全机制] ( http://xxlegend.com/2015/04/01/Django%E5%AE%89%E5%85%A8%E6%9C%BA%E5%88%B6/ )
7678
7779[ 从Django的SECTET_KEY到代码执行] ( http://xxlegend.com/2015/04/01/%E4%BB%8EDjango%E7%9A%84SECTET_KEY%E5%88%B0%E4%BB%A3%E7%A0%81%E6%89%A7%E8%A1%8C/ )
@@ -82,6 +84,10 @@ https://xianzhi.aliyun.com/forum/read/274.html
8284
8385[ Python 格式化字符串漏洞(Django为例)] ( https://www.leavesongs.com/PENETRATION/python-string-format-vulnerability.html )
8486
87+ [ Django 安全最佳实践] ( http://www.atjiang.com/2scoopsdjango1.8-26-security-best-practices/ )
88+
89+ [ 从Pwnhub诞生聊Django安全编码] ( https://www.leavesongs.com/PYTHON/django-coding-experience-from-pwnhub.html )
90+
8591
8692
8793### package钓鱼
@@ -90,6 +96,8 @@ https://xianzhi.aliyun.com/forum/read/274.html
9096
9197[ 被忽视的攻击面:Python package 钓鱼] ( https://paper.seebug.org/326/ )
9298
99+ https://www.pytosquatting.org/
100+
93101
94102
95103### LDAP注入
@@ -98,20 +106,28 @@ https://xianzhi.aliyun.com/forum/read/274.html
98106
99107
100108
109+ ### SSRF
110+
111+ [ 谈一谈如何在Python开发中拒绝SSRF漏洞] ( https://www.leavesongs.com/PYTHON/defend-ssrf-vulnerable-in-python.html )
112+
113+ [ Python安全 - 从SSRF到命令执行惨案] ( https://www.leavesongs.com/PENETRATION/getshell-via-ssrf-and-redis.html )
114+
115+
116+
101117### 其他
102118
103119[ 如何判断目标站点是否为Django开发] ( https://www.leavesongs.com/PENETRATION/detect-django.html )
104120
105121[ Supervisord远程命令执行漏洞(CVE-2017 -11610)] ( https://www.leavesongs.com/PENETRATION/supervisord-RCE-CVE-2017-11610.html )
106122
107- [ Python安全 - 从SSRF到命令执行惨案] ( https://www.leavesongs.com/PENETRATION/getshell-via-ssrf-and-redis.html )
108-
109- [ 从Pwnhub诞生聊Django安全编码] ( https://www.leavesongs.com/PYTHON/django-coding-experience-from-pwnhub.html )
110-
111123[ python富文本XSS过滤器] ( https://www.leavesongs.com/PYTHON/python-xss-filter.html )
112124
113125[ 基于mezzanine的攻防比赛环境搭建及XXE漏洞构造/] ( http://xxlegend.com/2016/04/01/%E5%9F%BA%E4%BA%8Emezzanine%E7%9A%84%E6%94%BB%E9%98%B2%E6%AF%94%E8%B5%9B%E7%8E%AF%E5%A2%83%E6%90%AD%E5%BB%BA%E5%8F%8AXXE%E6%BC%8F%E6%B4%9E%E6%9E%84%E9%80%A0/ )
114126
127+ [ Python Waf黑名单过滤下的一些Bypass思路] ( http://www.0aa.me/index.php/archives/123/ )
128+
129+ [ Pwnhub Web题Classroom题解与分析] ( https://www.leavesongs.com/PENETRATION/pwnhub-web-classroom-django-sql-injection.html )
130+
115131
116132
117133### 安全工具
@@ -122,3 +138,12 @@ https://xianzhi.aliyun.com/forum/read/274.html
122138
123139[ Python多线程端口扫描工具] ( https://www.leavesongs.com/PYTHON/PortScanner.html )
124140
141+ [ Python JSON Fuzzer: PyJFuzz] ( https://n0where.net/python-json-fuzzer-pyjfuzz/ )
142+
143+ https://github.com/smartFlash/pySecurity
144+
145+
146+
147+ ### 对象注入
148+
149+ [ DEFENCELY CLARIFIES PYTHON OBJECT INJECTION EXPLOITATION] ( https://defencely.com/blog/defencely-clarifies-python-object-injection-exploitation/ )
0 commit comments