https://studygolang.com/articles/16985
https://studygolang.com/articles/19458
http://www.r9it.com/20190611/go-mod-use-dev-package.html
https://mp.weixin.qq.com/s?__biz=MzIwMTM5MjUwMg==&mid=506104436&idx=1&sn=85a95ea7bbf29c33020464355e0a8ed1&chksm=0d30826d3a470b7bca9c6a273700dd7f19c3473d29a5b4ee5f22787d88502697ea8efca8d757&scene=18&ascene=7&devicetype=android-29&version=2700123b&nettype=ctnet&abtest_cookie=AAACAA%3D%3D&lang=zh_CN&exportkey=AdQ5Uo%2BWodfisFK7jv1UJWE%3D&pass_ticket=WLUgzE9Cysjcr57CPpuES0xBx%2BR827RDlksBF6rCec6jJiwBSWOSsg0h45TBz4vX&wx_header=1
https://mp.weixin.qq.com/s/ypwInF6Yk07Oe9CrxrMqFw
https://mp.weixin.qq.com/s/EiXSI_s0f6hyED9hNfihmw
OVS
https://mp.weixin.qq.com/s/2KaHYOxyvZw1B6PhmjN_vw
https://mp.weixin.qq.com/s/p-_ygYnOwSbFSx3fsD7iTQ
cve-2019-5736
https://x3fwy.bitcron.com/post/runc-malicious-container-escape
docker
https://mp.weixin.qq.com/s/7o8QxGydMTUe4Q7Tz46Diw
openstack
https://mp.weixin.qq.com/s/g-bKZqRFUGXDghIfGJ16_g
https://mp.weixin.qq.com/s/QtdMkt9giEEnvFTQzO9u7g
反射
http://ifeve.com/java-reflection/
kali
URL跳转反向shell
https://mp.weixin.qq.com/s/9yfAXT2slibEcnuow-jhQg
CSRF获取secret