<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/" version="2.0"><channel><title>舟涯</title><link>https://blog.zhx47.top/</link><atom:link href="https://blog.zhx47.top/rss.xml" rel="self" type="application/rss+xml"/><description>无聊写写</description><generator>Halo v2.22.10</generator><language>zh-cn</language><image><url>https://img.zhx47.top/i/2022/07/31/62e68ca494925.png</url><title>舟涯</title><link>https://blog.zhx47.top/</link></image><lastBuildDate>Sun, 15 Mar 2026 02:47:46 GMT</lastBuildDate><item><title><![CDATA[某东签名算法 jsvmp 插桩法的纯算还原《笔记》]]></title><link>https://blog.zhx47.top/archives/1762148186443</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E6%9F%90%E4%B8%9C%E7%AD%BE%E5%90%8D%E7%AE%97%E6%B3%95%20jsvmp%20%E6%8F%92%E6%A1%A9%E6%B3%95%E7%9A%84%E7%BA%AF%E7%AE%97%E8%BF%98%E5%8E%9F%E3%80%8A%E7%AC%94%E8%AE%B0%E3%80%8B&amp;url=/archives/1762148186443" width="1" height="1" alt="" style="opacity:0;">本文系统分享了京东h5st签名算法中jsvmp插桩法的逆向还原流程。作者通过对老版本h5st代码的分析，结合jsvmp（JavaScript虚拟机保护）混淆技术，详细拆解了签名的关键环节，包括时间戳格式化、fp指纹、appId、动态及本地token加密、业务参数签名和env环境信息加密等核心模块。文中重点讲解了对京东魔改的MD5算法的还原思路，结合插桩调试分析了jsvmp虚拟机执行流程和栈操作，揭示了加密数据处理的内在逻辑，最终推导出分段求和后映射字符附加到明文的加盐逻辑。作者强调逆向经验积累和对加密算法特征的敏感性是理解流程的关键。文章还分享了请求接口时需注意的token、tls指纹、请求头、cookie验证等安全点，提醒开发者合法使用，避免触发京东安全机制。全文旨在经验分享，不提供完整工具，帮助研究者理解h5st加密签名机制。]]></description><guid isPermaLink="false">/archives/1762148186443</guid><dc:creator>我几岁了哎</dc:creator><category>京东</category><pubDate>Mon, 3 Nov 2025 06:10:33 GMT</pubDate></item><item><title><![CDATA[K米本地会员破解]]></title><link>https://blog.zhx47.top/archives/1748864253500</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=K%E7%B1%B3%E6%9C%AC%E5%9C%B0%E4%BC%9A%E5%91%98%E7%A0%B4%E8%A7%A3&amp;url=/archives/1748864253500" width="1" height="1" alt="" style="opacity:0;">本文提供了针对安卓平台的“K米”应用绕过会员验证的三种补丁版本，包括无Root直装版、Xposed版和通用VPN代理版。无Root版（5.3.8）通过绕过360加固实现，但兼容性较差，可能闪退；Xposed版同样基于5.3.8，但因代码混淆未写成通用模块；VPN版利用黄鸟开源本地代理，通过安装系统证书实现流量拦截与修改，绕过爱加密企业版加固，仅针对两个关键接口修改会员状态和到期时间，安全性较高且易于使用。文中附有关键代码截图及详细下载链接和密码，方便用户根据需求选择合适版本进行安装和使用。整体方案实现了无需Root且安全高效的会员功能解锁。]]></description><guid isPermaLink="false">/archives/1748864253500</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F06%2F02%2F683d89adbe3f0.png&amp;size=m" type="image/jpeg" length="29185"/><category>逆向</category><pubDate>Mon, 2 Jun 2025 11:47:00 GMT</pubDate></item><item><title><![CDATA[OpenWrt 编译 PostgresSQL 插件]]></title><link>https://blog.zhx47.top/archives/1733071442104</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=OpenWrt%20%E7%BC%96%E8%AF%91%20PostgresSQL%20%E6%8F%92%E4%BB%B6&amp;url=/archives/1733071442104" width="1" height="1" alt="" style="opacity:0;">本文详细介绍了在OpenWrt系统中，为支持Lobe Chat服务端所需的PostgreSQL数据库及pgvector插件的编译与安装过程。作者因OpenWrt自带Postgres不支持pgvector，采用iStoreOS源码及官方feeds配置，在虚拟机中编译PostgreSQL。为集成pgvector插件，作者参考pgvector仓库关闭的PR，将插件源码放入PostgreSQL contrib目录并修改Makefile，实现插件随主程序一同编译。初次启用插件时出现“Illegal instruction”错误，经过调整pgvector的Makefile删减编译优化选项成功解决。最终通过修改PostgreSQL的OpenWrt打包配置，在编译过程中自动解压并集成pgvector插件，实现插件正常加载。文章附带了完整的PostgreSQL Makefile与详细步骤，为在嵌入式系统中集成特定Postgres插件提供了实用参考，尽管过程较为复杂但成功解决了功能扩展的难题。]]></description><guid isPermaLink="false">/archives/1733071442104</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F683988d032c02.png&amp;size=m" type="image/jpeg" length="66150"/><category>学习笔记</category><pubDate>Sun, 1 Dec 2024 16:45:00 GMT</pubDate></item><item><title><![CDATA[京东H5ST算法接口]]></title><link>https://blog.zhx47.top/archives/1719150000000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E4%BA%AC%E4%B8%9CH5ST%E7%AE%97%E6%B3%95%E6%8E%A5%E5%8F%A3&amp;url=/archives/1719150000000" width="1" height="1" alt="" style="opacity:0;">京东H5ST算法逆向接口，目前已支持H5ST4.2.0,H5ST4.3.1,H5ST4.3.3,H5ST4.4.0,H5ST4.7.1,H5ST4.7.2,H5ST4.7.3,H5ST4.7.4,H5ST4.8.1,H5ST4.8.2,H5ST4.9.1,XCX3.1.0,XCX4.2.0,XCX4.7.1,XCX4.9.1]]></description><guid isPermaLink="false">/archives/1719150000000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F6839b60ea363e.png&amp;size=m" type="image/jpeg" length="15839"/><category>京东</category><pubDate>Sun, 23 Jun 2024 13:40:00 GMT</pubDate></item><item><title><![CDATA[使用OpenAI代替Copilot]]></title><link>https://blog.zhx47.top/archives/1716298800000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E4%BD%BF%E7%94%A8OpenAI%E4%BB%A3%E6%9B%BFCopilot&amp;url=/archives/1716298800000" width="1" height="1" alt="" style="opacity:0;">本文介绍了如何使用OpenAI的gpt-3.5-turbo-instruct模型替代GitHub Copilot，实现代码补全功能。项目源码托管在GitHub（https://github.com/linux-do/override），并提供了免费签到的代理站点供调用API。服务端通过Docker Compose构建镜像，配置文件需修改代理API地址（需带/v1路径）、绑定地址为0.0.0.0及对应密钥。容器启动后，用户需在本地IDE中安装Copilot插件，并修改验证域名为cocopilot.org以通过登录验证，再通过脚本替换插件地址为本地部署地址。文中附示例截图展示代码补全与聊天功能实际效果及日志情况。此方案适合在代理环境下或自行搭建服务，灵活调用OpenAI模型，实现更低成本和更自由的代码生成体验。文末还推荐了结合Azure OpenAI使用的扩展教程。整体流程简洁，适合有Docker和代理需求的开发者参考部署。]]></description><guid isPermaLink="false">/archives/1716298800000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F68398f68a67d2.png&amp;size=m" type="image/jpeg" length="31837"/><category>学习笔记</category><pubDate>Tue, 21 May 2024 13:40:00 GMT</pubDate></item><item><title><![CDATA[京东试用重新修复]]></title><link>https://blog.zhx47.top/archives/1713705060000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E4%BA%AC%E4%B8%9C%E8%AF%95%E7%94%A8%E9%87%8D%E6%96%B0%E4%BF%AE%E5%A4%8D&amp;url=/archives/1713705060000" width="1" height="1" alt="" style="opacity:0;">伙伴们，江湖再见！！！]]></description><guid isPermaLink="false">/archives/1713705060000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F6839bb1e7653f.png&amp;size=m" type="image/jpeg" length="18970"/><pubDate>Sun, 21 Apr 2024 13:11:00 GMT</pubDate></item><item><title><![CDATA[PikPak网盘刷邀请]]></title><link>https://blog.zhx47.top/archives/1711707060000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=PikPak%E7%BD%91%E7%9B%98%E5%88%B7%E9%82%80%E8%AF%B7&amp;url=/archives/1711707060000" width="1" height="1" alt="" style="opacity:0;">本文作者重新整理了PikPak注册流程的抓包与分析，重点攻克了新增的图形验证码校验环节。通过抓包和代码逆向，分析并复现了验证码的规则和验证逻辑，发现其实现相对简单，无混淆，滑块验证码位置由固定数组描述，验证请求体格式清晰。作者进一步解密了关键参数如`client_id`、`x-device-id`及新增的`devicesign`和`captcha_sign`的生成方案，利用SHA-1、MD5及特定盐值文件等方法实现参数签名。最终整理了完整的注册接口调用顺序，包括验证码获取与提交、注册以及邀请码激活，还补充了登录接口以避免邀请失效问题。文章配合实测代码和流程细节，提供了一个较为完整的自动化注册解决方案。相关脚本代码已开源发布于GitHub，便于开发者参考和使用。]]></description><guid isPermaLink="false">/archives/1711707060000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F06%2F02%2F683c7b149bbbf.png&amp;size=m" type="image/jpeg" length="24643"/><category>逆向</category><pubDate>Fri, 29 Mar 2024 10:11:00 GMT</pubDate></item><item><title><![CDATA[Nginx HTPP/HTTPS 使用相同的非标准端口]]></title><link>https://blog.zhx47.top/archives/1708164660000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=Nginx%20HTPP%2FHTTPS%20%E4%BD%BF%E7%94%A8%E7%9B%B8%E5%90%8C%E7%9A%84%E9%9D%9E%E6%A0%87%E5%87%86%E7%AB%AF%E5%8F%A3&amp;url=/archives/1708164660000" width="1" height="1" alt="" style="opacity:0;">本文介绍了在无法使用常规端口进行项目部署时，如何利用Nginx实现非标准端口上的无感HTTP到HTTPS跳转。通过添加Nginx的`stream`模块，定义基于协议的流量映射，将用户暴露的非标准端口（如8888）上的请求，根据是否开启SSL自动转发到HTTP（如80端口）或HTTPS（如443端口）后端，实现协议无感知跳转。示例中，`stream`模块配置了upstream和映射规则，主配置则为常规的80和443端口HTTPS站点配置，包含标准的SSL证书及安全策略。此方法特别适用于特定场景下的项目升级或备案前阶段，既保证用户体验的无缝切换，也支持后续恢复常规端口访问，兼具灵活性和实用性。]]></description><guid isPermaLink="false">/archives/1708164660000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F06%2F02%2F683c7cba8499f.png&amp;size=m" type="image/jpeg" length="26725"/><category>学习笔记</category><pubDate>Sat, 17 Feb 2024 10:11:00 GMT</pubDate></item><item><title><![CDATA[某东H5ST4.3成品源码]]></title><link>https://blog.zhx47.top/archives/1703610660000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E6%9F%90%E4%B8%9CH5ST4.3%E6%88%90%E5%93%81%E6%BA%90%E7%A0%81&amp;url=/archives/1703610660000" width="1" height="1" alt="" style="opacity:0;">京东H5st4.3算法逆向分析，提供Demo脚本，已通过抽千元红包自测。]]></description><guid isPermaLink="false">/archives/1703610660000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F6839b8772df90.png&amp;size=m" type="image/jpeg" length="15658"/><category>京东</category><pubDate>Tue, 26 Dec 2023 17:11:00 GMT</pubDate></item><item><title><![CDATA[自定义ChatGPT代理接口]]></title><link>https://blog.zhx47.top/archives/1702195080000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E8%87%AA%E5%AE%9A%E4%B9%89ChatGPT%E4%BB%A3%E7%90%86%E6%8E%A5%E5%8F%A3&amp;url=/archives/1702195080000" width="1" height="1" alt="" style="opacity:0;">本文介绍了PandoraNext项目因停止更新，推荐用户转向使用新的Ninja项目来搭建ChatGPT代理服务。PandoraNext的搭建流程已失效，不再维护；其依赖的公开fakeopen API代理也已成为历史，需要自行搭建代理接口。作者提供了Ninja项目的Docker安装方法，支持通过容器快速部署，仅能实现Access Token获取及GPT3.5聊天功能，涉及登录和GPT4功能需要额外验证码配置。 此外，文中说明了如何使用Docker自建专属网络，确保bncr插件能够稳定访问Ninja容器，规避重启后IP变动问题。并详细指导如何修改bncr插件中的ChatGPT接口地址，替换为Ninja的访问地址和固定端口（7999），以完成代理连接。最后，作者还提到Ninja支持Session Token和Refresh Token机制，可实现Access Token自动更新，提升插件自动化和稳定性。整体内容适合有一定Docker和网络配置基础的用户快速迁移至Ninja方案。]]></description><guid isPermaLink="false">/archives/1702195080000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F06%2F01%2F683c78c8c959d.png&amp;size=m" type="image/jpeg" length="38306"/><category>学习笔记</category><pubDate>Sun, 10 Dec 2023 07:58:00 GMT</pubDate></item><item><title><![CDATA[某东H5ST4.2成品源码]]></title><link>https://blog.zhx47.top/archives/1698420120000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E6%9F%90%E4%B8%9CH5ST4.2%E6%88%90%E5%93%81%E6%BA%90%E7%A0%81&amp;url=/archives/1698420120000" width="1" height="1" alt="" style="opacity:0;">京东H5st4.2算法逆向分析，提供Demo脚本，已通过店铺首页自测。]]></description><guid isPermaLink="false">/archives/1698420120000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F6839b8cda693a.png&amp;size=m" type="image/jpeg" length="15549"/><category>京东</category><pubDate>Fri, 27 Oct 2023 15:22:00 GMT</pubDate></item><item><title><![CDATA[京东试用 DEMO脚本 + H5ST3.1]]></title><link>https://blog.zhx47.top/archives/1697273700000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E4%BA%AC%E4%B8%9C%E8%AF%95%E7%94%A8%20DEMO%E8%84%9A%E6%9C%AC%20%2B%20H5ST3.1&amp;url=/archives/1697273700000" width="1" height="1" alt="" style="opacity:0;">一份基于H5st3.1纯本地算法的京东试用Demo脚本，完成率较低，伴随大量403]]></description><guid isPermaLink="false">/archives/1697273700000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F6839ba7c646cb.png&amp;size=m" type="image/jpeg" length="17452"/><category>京东</category><pubDate>Sat, 14 Oct 2023 08:55:00 GMT</pubDate></item><item><title><![CDATA[分享一个自动收集美团优惠券信息的FD脚本]]></title><link>https://blog.zhx47.top/archives/1696929120000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E5%88%86%E4%BA%AB%E4%B8%80%E4%B8%AA%E8%87%AA%E5%8A%A8%E6%94%B6%E9%9B%86%E7%BE%8E%E5%9B%A2%E4%BC%98%E6%83%A0%E5%88%B8%E4%BF%A1%E6%81%AF%E7%9A%84FD%E8%84%9A%E6%9C%AC&amp;url=/archives/1696929120000" width="1" height="1" alt="" style="opacity:0;">作者为简化美团外卖活动页优惠券信息的收集，编写了一个Fiddler脚本，实现自动显示和收集优惠券数据。脚本通过拦截和修改特定接口的响应数据，完成以下功能： 1. 修改服务器时间接口响应，确保优惠券时间有效； 2. 自动将优惠券状态设置为“可用”，使页面自动显示所有优惠券； 3. 拦截优惠券详情请求，修改状态为可用，并收集优惠券的ID、页面ID、描述等信息，方便后续手动管理和使用。 脚本结合Fiddler的OnBeforeResponse事件，自动处理响应内容，减少手动操作，提高了收集优惠券的效率。最终实现页面直观展示所有可用优惠券，用户只需手动点击领取，极大简化了工作流程。附带的代码示例和截图展示了脚本的具体实现效果和用户界面展示。]]></description><guid isPermaLink="false">/archives/1696929120000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F31%2F683b250d9bc0c.png&amp;size=m" type="image/jpeg" length="23841"/><pubDate>Tue, 10 Oct 2023 09:12:00 GMT</pubDate></item><item><title><![CDATA[京东2023 618拆快递H5ST 4.1算法]]></title><link>https://blog.zhx47.top/archives/1685844540000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E4%BA%AC%E4%B8%9C2023%20618%E6%8B%86%E5%BF%AB%E9%80%92H5ST%204.1%E7%AE%97%E6%B3%95&amp;url=/archives/1685844540000" width="1" height="1" alt="" style="opacity:0;">京东H5st4.1算法逆向分析，提供Demo脚本，已通过618拆快递自测。]]></description><guid isPermaLink="false">/archives/1685844540000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F6839b7e48952a.png&amp;size=m" type="image/jpeg" length="15294"/><category>京东</category><pubDate>Wed, 14 Jun 2023 02:09:00 GMT</pubDate></item><item><title><![CDATA[某东log校验--炸年兽最后一块拼图 基础Cookie]]></title><link>https://blog.zhx47.top/archives/1674477480000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E6%9F%90%E4%B8%9Clog%E6%A0%A1%E9%AA%8C--%E7%82%B8%E5%B9%B4%E5%85%BD%E6%9C%80%E5%90%8E%E4%B8%80%E5%9D%97%E6%8B%BC%E5%9B%BE%20%E5%9F%BA%E7%A1%80Cookie&amp;url=/archives/1674477480000" width="1" height="1" alt="" style="opacity:0;">伙伴们，江湖再见！！！]]></description><guid isPermaLink="false">/archives/1674477480000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F6839b9cd8e117.png&amp;size=m" type="image/jpeg" length="20406"/><pubDate>Mon, 23 Jan 2023 12:38:00 GMT</pubDate></item><item><title><![CDATA[某东log校验--解密log]]></title><link>https://blog.zhx47.top/archives/1674474720000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E6%9F%90%E4%B8%9Clog%E6%A0%A1%E9%AA%8C--%E8%A7%A3%E5%AF%86log&amp;url=/archives/1674474720000" width="1" height="1" alt="" style="opacity:0;">伙伴们，江湖再见！！！]]></description><guid isPermaLink="false">/archives/1674474720000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2025%2F05%2F30%2F6839b6722ace5.png&amp;size=m" type="image/jpeg" length="18434"/><pubDate>Mon, 23 Jan 2023 11:52:00 GMT</pubDate></item><item><title><![CDATA[某东log校验--应用参数获取]]></title><link>https://blog.zhx47.top/archives/1674215940000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E6%9F%90%E4%B8%9Clog%E6%A0%A1%E9%AA%8C--%E5%BA%94%E7%94%A8%E5%8F%82%E6%95%B0%E8%8E%B7%E5%8F%96&amp;url=/archives/1674215940000" width="1" height="1" alt="" style="opacity:0;">伙伴们，江湖再见！！！]]></description><guid isPermaLink="false">/archives/1674215940000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2023%2F01%2F20%2F63ca86034176b.png&amp;size=m" type="image/jpeg" length="20384"/><pubDate>Fri, 20 Jan 2023 11:59:00 GMT</pubDate></item><item><title><![CDATA[某东log校验--blog参数获取]]></title><link>https://blog.zhx47.top/archives/1673882760000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E6%9F%90%E4%B8%9Clog%E6%A0%A1%E9%AA%8C--blog%E5%8F%82%E6%95%B0%E8%8E%B7%E5%8F%96&amp;url=/archives/1673882760000" width="1" height="1" alt="" style="opacity:0;">伙伴们，江湖再见！！！]]></description><guid isPermaLink="false">/archives/1673882760000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2023%2F01%2F16%2F63c56c78d6f28.png&amp;size=m" type="image/jpeg" length="20845"/><pubDate>Mon, 16 Jan 2023 15:26:00 GMT</pubDate></item><item><title><![CDATA[Xposed破解飞鸟助手VIP]]></title><link>https://blog.zhx47.top/archives/1673877840000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=Xposed%E7%A0%B4%E8%A7%A3%E9%A3%9E%E9%B8%9F%E5%8A%A9%E6%89%8BVIP&amp;url=/archives/1673877840000" width="1" height="1" alt="" style="opacity:0;">失效！！！ 对应软件已经跑路了！！！]]></description><guid isPermaLink="false">/archives/1673877840000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2023%2F01%2F16%2F63c55bc5b4467.png&amp;size=m" type="image/jpeg" length="22826"/><pubDate>Mon, 16 Jan 2023 14:04:00 GMT</pubDate></item><item><title><![CDATA[某东log校验--jdkey参数获取]]></title><link>https://blog.zhx47.top/archives/1673795220000</link><description><![CDATA[<img src="https://blog.zhx47.top/plugins/feed/assets/telemetry.gif?title=%E6%9F%90%E4%B8%9Clog%E6%A0%A1%E9%AA%8C--jdkey%E5%8F%82%E6%95%B0%E8%8E%B7%E5%8F%96&amp;url=/archives/1673795220000" width="1" height="1" alt="" style="opacity:0;">伙伴们，江湖再见！！！]]></description><guid isPermaLink="false">/archives/1673795220000</guid><dc:creator>我几岁了哎</dc:creator><enclosure url="https://blog.zhx47.top/apis/api.storage.halo.run/v1alpha1/thumbnails/-/via-uri?uri=https%3A%2F%2Fimg.zhx47.top%2Fi%2F2023%2F01%2F15%2F63c416810440a.png&amp;size=m" type="image/jpeg" length="20949"/><pubDate>Sun, 15 Jan 2023 15:07:00 GMT</pubDate></item></channel></rss>