Dev Resource Hub
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  1. Home
  2. Cybersecurity
  3. Article list
Garbage Code in Reverse Engineering: Core Principles, 8 Implementation Methods & Removal Techniques

Cybersecurity Garbage Code in Reverse Engineering: Core Principles, 8 Implementation Methods & Removal Techniques

A comprehensive guide to garbage code (anti-disassembly instructions) – core principles, 8 practical implementations with full code, IDA disassembly detection, and dynamic debugging removal tips for security researchers and reverse engineers. Introduction In the field of reverse engineering and software protection, garbage code is a “classic technique” to counter disassembly tools. By constructing special instruction…

38 Views 0 Comments
Cybersecurity 6 days ago
HTTP vs HTTPS vs SSL/TLS: A Comprehensive Guide to Web Security Protocols (with HTTPS Deployment Steps)

Cybersecurity HTTP vs HTTPS vs SSL/TLS: A Comprehensive Guide to Web Security Protocols (with HTTPS Deployment Steps)

Have you ever noticed the difference between “http://” and “https://” when typing a URL? What does the small lock icon next to the address bar signify when you make a payment on an e-commerce platform or log into a social media account? In internet communications, terms like HTTP, HTTPS, and SSL/TLS appear frequently—they are not…

64 Views 0 Comments
Cybersecurity 2025-11-06
Deep Dive into Fastjson Deserialization Vulnerabilities: From Principles to Practical Defense

Cybersecurity Deep Dive into Fastjson Deserialization Vulnerabilities: From Principles to Practical Defense

As one of the most widely used JSON parsing libraries in the Java ecosystem, Fastjson is favored for its high performance. However, its deserialization vulnerabilities—especially CVE-2022-25845—have repeatedly led to large-scale security incidents. Attackers only need to construct malicious JSON strings to achieve Remote Code Execution (RCE) and take full control of servers. This article breaks…

55 Views 0 Comments
Cybersecurity 2025-11-05
NGINX Technical Practice: Configuration Guide for TCP Layer 4 Port Proxy and mTLS Mutual Encryption Authentication

Cybersecurity NGINX Technical Practice: Configuration Guide for TCP Layer 4 Port Proxy and mTLS Mutual Encryption Authentication

This article systematically breaks down the complete implementation of Nginx TCP Layer 4 port proxy and mTLS mutual encryption authentication. It covers core technical principles (TLS/mTLS mechanisms), certificate generation (root CA/server/client workflows), Nginx configuration (Stream module, SSL parameter optimization), and function verification (valid/invalid connection testing) with practical commands. It helps DevOps engineers and developers quickly…

69 Views 0 Comments
Cybersecurity 2025-11-04
Practical Guide to Dynamic IP Blocking in Nginx

Cybersecurity Practical Guide to Dynamic IP Blocking in Nginx

Blocking IPs dynamically in Nginx can effectively protect websites or applications from malicious requests, crawlers, or DDoS attacks. Compared to the traditional static method of modifying the configuration file and reloading Nginx, dynamic IP blocking can automatically identify and block malicious IPs in real-time, greatly enhancing security and operational efficiency. This article will elaborate on…

70 Views 0 Comments
Cybersecurity 2025-11-02
Nginx Defends HTTP Host Header Attacks Vulnerability: Practical Configuration Guide

Cybersecurity Nginx Defends HTTP Host Header Attacks Vulnerability: Practical Configuration Guide

As a web developer, have you ever overlooked the Host header in HTTP requests? This seemingly ordinary field, once exploited by attackers, can lead to serious security issues such as password reset hijacking, cache poisoning, and even Server-Side Request Forgery (SSRF). This article will start from the vulnerability principle and share 3 battle-tested Nginx defense…

73 Views 0 Comments
Cybersecurity 2025-11-01
In-depth Analysis of Core EDR Evasion Techniques: From Image Loading to Driver Callback Hijacking

Cybersecurity In-depth Analysis of Core EDR Evasion Techniques: From Image Loading to Driver Callback Hijacking

In the landscape of cybersecurity confrontation, Endpoint Detection and Response (EDR) tools remain a critical line of defense for defenders. They monitor key behaviors such as process creation, thread activity, and registry modifications to detect and block malicious attacks in a timely manner,Last time we discussed process creation and thread notifications in ‘How Does Windows…

129 Views 0 Comments
Cybersecurity 2025-10-27
How Does Windows EDR Block Programs via Callback Mechanisms? A Detailed Guide to 3 Evasion Methods & Defense Strategies

Cybersecurity How Does Windows EDR Block Programs via Callback Mechanisms? A Detailed Guide to 3 Evasion Methods & Defense Strategies

In the Windows security field, many developers and security researchers encounter a common issue: the programs they write (even test samples) get blocked by EDR (Endpoint Detection and Response) tools as soon as they launch. Behind this, EDR’s “sharp eyes” don’t come out of nowhere—they rely on a special privilege granted by the Windows system:…

134 Views 0 Comments
Cybersecurity 2025-10-26
Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking

Cybersecurity Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking

In the field of Windows security offense and defense, Function Hooking is a core technology for EDR (Endpoint Detection and Response) to monitor process behavior and for attackers to bypass protections. To counter modern EDR interception, the first step is to master the operating mechanism of function hooking in user mode. Centered on the framework of “FUNCTION-HOOKING…

118 Views 0 Comments
Cybersecurity 2025-10-25
XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

Cybersecurity XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

In penetration testing, XXL-Job vulnerabilities are often highlighted for their convenience in direct reverse shell attacks. However, real-world scenarios frequently involve “non-outbound networks” or “missing scheduler panels,” which pose greater challenges. This article breaks down the version detection, command execution, and multiple memory shell injection methods for the XXL-Job Executor default token vulnerability, using practical…

243 Views 0 Comments
Cybersecurity 2025-10-23
  • 1
  • 2
  • »
Search Article
Popular Articles
XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

In penetration testing, XXL-Job vulnerabilities are often highlighted for their convenience in direct reverse shell attacks. However, real-world scenarios frequently involve “non-outbound networks” or “missing scheduler panels,” which pose greater challenges. This article breaks down the version detection, command execution, and multiple memory shell injection methods for the XXL-Job Executor default token vulnerability, using practical...
Building a Local MCP Service from Scratch: A Complete Guide to STDIO Mode Implementation and LLM Integration

Building a Local MCP Service from Scratch: A Complete Guide to STDIO Mode Implementation and LLM Integration

This article will start with the working principles of MCP, take the STDIO transmission mode as an example, and provide a comprehensive walkthrough of building a local MCP service, testing it, and integrating it with an LLM (using Cursor as an example), helping developers quickly master the practical application of the MCP protocol. We’ve already...
MCP (Model Context Protocol): A Complete Guide to Solving LLM Application Development Pain Points

MCP (Model Context Protocol): A Complete Guide to Solving LLM Application Development Pain Points

In the fast-paced world of AI development, building applications based on Large Language Models (LLMs) has become an industry focus. However, before the advent of MCP (Model Context Protocol), developers faced a host of tricky challenges when building LLM applications. These issues not only slowed down development efficiency but also limited the practical implementation of...
Mousefood Embedded UI Development Guide: From Beginner to Pro, Solving Graphics Challenges in No-Std Environments

Mousefood Embedded UI Development Guide: From Beginner to Pro, Solving Graphics Challenges in No-Std Environments

Technical Dilemmas in Embedded UI Development: From Requirements to Bottlenecks [Essential for Embedded UI Development] In the development of IoT, industrial control, and portable smart devices, how to build efficient graphical UIs in no-std, OS-less environments? Traditional terminal UI libraries are limited by resource constraints and hardware compatibility, becoming a major development pain point. This...
A Deep Dive into Gorm: Architecture, Workflow, Tips, and Troubleshooting for Go’s ORM Framework

A Deep Dive into Gorm: Architecture, Workflow, Tips, and Troubleshooting for Go’s ORM Framework

This article details the internal architecture and SQL execution workflow of Gorm, the popular ORM framework for Go. It shares practical techniques for model definition, querying, and updating, while solving common issues like time zone discrepancies, soft deletion, and transactions. It is tailored for advanced Gorm developers. As the most widely used ORM (Object-Relational Mapping) framework...
About us

About Us | Contact Us | Privacy Policy | Terms of Use X (Twitter)