Dev Resource Hub
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  1. Home
  2. Cybersecurity
  3. Article list
Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking

Cybersecurity Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking

In the field of Windows security offense and defense, Function Hooking is a core technology for EDR (Endpoint Detection and Response) to monitor process behavior and for attackers to bypass protections. To counter modern EDR interception, the first step is to master the operating mechanism of function hooking in user mode. Centered on the framework of “FUNCTION-HOOKING…

333 Views 0 Comments
Cybersecurity 2025-10-25
XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

Cybersecurity XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

In penetration testing, XXL-Job vulnerabilities are often highlighted for their convenience in direct reverse shell attacks. However, real-world scenarios frequently involve “non-outbound networks” or “missing scheduler panels,” which pose greater challenges. This article breaks down the version detection, command execution, and multiple memory shell injection methods for the XXL-Job Executor default token vulnerability, using practical…

548 Views 0 Comments
Cybersecurity 2025-10-23
SOC-CERT: AI-Powered Open-Source Threat Intelligence System for Real-Time CVE Monitoring

Cybersecurity SOC-CERT: AI-Powered Open-Source Threat Intelligence System for Real-Time CVE Monitoring

SOC-CERT is an AI-powered open-source threat intelligence system that monitors CVEs from CISA, NIST, CERT-FR & OTX, delivering real-time alerts at zero cost. This is a submission for the AI Agents Challenge powered by n8n and Bright Data 🛡️ What I Built ⚡ TL;DR: 📖 Description: 🚀 Unique Innovation: soc-cert-workflow-architecture.png🏗️ Architecture Overview: ⚡ Complete threat intelligence automation pipeline processing 100+…

1,506 Views 0 Comments
Cybersecurity 2025-08-27
Using C# to steal tokens and gain system permissions

Cybersecurity Using C# to steal tokens and gain system permissions

Intro Grzegorz Tworek recently published some C code demonstrating how to steal and impersonate Windows tokens from a process. The standard way to do this is with the OpenProcess, OpenProcessToken, DuplicateTokenEx, and ImpersonateLoggedOnUser APIs. Grzegorz shows how to achieve the same using Nt* APIs, specifically NtOpenProcess, NtOpenProcessToken, NtDuplicateToken, and NtSetInformationThread. Because I’m a C# junky, I…

472 Views 0 Comments
Cybersecurity 2025-08-20
BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

Cybersecurity BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

What is BadUSB? Using the STM32F407 development board, we’ll study HID device development and implement a low-cost BadUSB. This article uses the development board for testing. Those with the means can also create a PCB prototype and print the enclosure to create a highly realistic BadUSB.BadUSB is an attack that masquerades as a USB HID…

694 Views 0 Comments
Cybersecurity 2025-08-18
MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

Cybersecurity MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

Model Context Protocol (MCP) is gaining traction, but critical security gaps remain. This guide explores common MCP vulnerabilities in the 2025-06-18 release — from misconfigurations and credential leaks to command injection and remote code execution — helping developers secure their MCP deployments. MCP adoption is picking up quickly, so I have been digging into the…

659 Views 0 Comments
Cybersecurity 2025-08-15
Use io_uring to evade security detection and targeted detection.

Cybersecurity Use io_uring to evade security detection and targeted detection.

This article explores how ARMO researchers leveraged the io_uring mechanism to bypass popular Linux security monitoring tools such as Falco and Tetragon. It also demonstrates the workings of the open-source attack tool Curing, explaining its core calls, exploitation process, and potential defense strategies. Background The ARMO research team recently revealed a major flaw in Linux…

510 Views 0 Comments
Cybersecurity 2025-08-10
Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial

Cybersecurity Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial

This article details methods for debugging packaged Electron applications, including main/renderer process debugging techniques, ASAR file extraction and modification, debugging tool installation, and solutions for common issues like WebSockets request errors, ideal for Electron developers troubleshooting applications. Even after an Electron application has been packaged and distributed, it’s still possible to debug it using various…

719 Views 0 Comments
Cybersecurity 2025-05-26
  • «
  • 1
  • 2
Search Article
Popular Articles
CVE-2025-55182 Payload&Fix Guide: Complete Analysis & Mitigation for Next.js/React RSC Vulnerability (CVSS 10.0)

CVE-2025-55182 Payload&Fix Guide: Complete Analysis & Mitigation for Next.js/React RSC Vulnerability (CVSS 10.0)

In the early morning of December 4th, 2025, the global front-end developer community was rocked by an urgent security advisory—React officials confirmed a critical Remote Code Execution (RCE) vulnerability in React Server Components (RSC), tracked as CVE-2025-55182 (with Next.js-specific identifier CVE-2025-66478) and scoring a maximum CVSS 10.0. Following the 2021 Log4Shell vulnerability, this marks another...
Claude Code Router Tutorial: Low-Cost Multi-Model API Integration for Claude Code

Claude Code Router Tutorial: Low-Cost Multi-Model API Integration for Claude Code

If you’re a Claude Code user frustrated by the high API call costs of the official model, or want to try cost-effective code models like Kimi K2 and Qwen3-Coder without ditching your familiar Claude Code workflow—this article is exactly what you need. We’ll walk you through using Claude Code Router to connect Claude Code with...
A Complete Guide to TypeScript Double Assertion (as unknown as): The Right Way to Safely Avoid Type Errors

A Complete Guide to TypeScript Double Assertion (as unknown as): The Right Way to Safely Avoid Type Errors

A detailed explanation of the usage scenarios, principles, and best practices of TypeScript double assertion (as unknown as), comparing differences with as any. Learn how to avoid type errors while maintaining type safety, with real project cases and pitfall avoidance guides. As a developer with years of experience in TypeScript projects, I’m sure many of...
About us

About Us | Contact Us | Privacy Policy | Terms of Use X (Twitter)