
  <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
    <channel>
      <title>Guge&#39;sBlog</title>
      <link>https://gugesay.com/blog</link>
      <description>骨哥说事公众号首发地</description>
      <language>zh-CN</language>
      <managingEditor>undefined (Guge)</managingEditor>
      <webMaster>undefined (Guge)</webMaster>
      <lastBuildDate>Tue, 19 Aug 2025 06:02:55 GMT</lastBuildDate>
      <atom:link href="https://gugesay.com/tags/漏洞利用/feed.xml" rel="self" type="application/rss+xml"/>
      
  <item>
    <guid>https://gugesay.com/blog/【20k】隐藏api参数如何泄露youtube创作者邮箱？</guid>
    <title>【$20,000】隐藏API参数如何泄露YouTube创作者邮箱？</title>
    <link>https://gugesay.com/blog/【20k】隐藏api参数如何泄露youtube创作者邮箱？</link>
    undefined
    <pubDate>Tue, 19 Aug 2025 06:02:55 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>youtube</category><category>信息泄漏</category><category>漏洞利用</category><category>白帽故事</category>
  </item>

  <item>
    <guid>https://gugesay.com/blog/深入解析ssti：像专家一样发现与利用服务器端模板</guid>
    <title>深入解析SSTI：像专家一样发现与利用服务器端模板注入漏洞</title>
    <link>https://gugesay.com/blog/深入解析ssti：像专家一样发现与利用服务器端模板</link>
    undefined
    <pubDate>Mon, 18 Aug 2025 06:10:17 GMT</pubDate>
    <author>undefined (Guge)</author>
    <category>SSTI</category><category>服务器端模板注入</category><category>漏洞利用</category><category>白帽故事</category><category>网络安全</category><category>远程代码执行（RCE）</category>
  </item>

    </channel>
  </rss>
