Dev Resource Hub
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  1. Home
  2. Cybersecurity
  3. Article list
Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking

Cybersecurity Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking

In the field of Windows security offense and defense, Function Hooking is a core technology for EDR (Endpoint Detection and Response) to monitor process behavior and for attackers to bypass protections. To counter modern EDR interception, the first step is to master the operating mechanism of function hooking in user mode. Centered on the framework of “FUNCTION-HOOKING…

491 Views 0 Comments
Cybersecurity 2025-10-25
XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

Cybersecurity XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

In penetration testing, XXL-Job vulnerabilities are often highlighted for their convenience in direct reverse shell attacks. However, real-world scenarios frequently involve “non-outbound networks” or “missing scheduler panels,” which pose greater challenges. This article breaks down the version detection, command execution, and multiple memory shell injection methods for the XXL-Job Executor default token vulnerability, using practical…

712 Views 0 Comments
Cybersecurity 2025-10-23
SOC-CERT: AI-Powered Open-Source Threat Intelligence System for Real-Time CVE Monitoring

Cybersecurity SOC-CERT: AI-Powered Open-Source Threat Intelligence System for Real-Time CVE Monitoring

SOC-CERT is an AI-powered open-source threat intelligence system that monitors CVEs from CISA, NIST, CERT-FR & OTX, delivering real-time alerts at zero cost. This is a submission for the AI Agents Challenge powered by n8n and Bright Data 🛡️ What I Built ⚡ TL;DR: 📖 Description: 🚀 Unique Innovation: soc-cert-workflow-architecture.png🏗️ Architecture Overview: ⚡ Complete threat intelligence automation pipeline processing 100+…

2,030 Views 0 Comments
Cybersecurity 2025-08-27
Using C# to steal tokens and gain system permissions

Cybersecurity Using C# to steal tokens and gain system permissions

Intro Grzegorz Tworek recently published some C code demonstrating how to steal and impersonate Windows tokens from a process. The standard way to do this is with the OpenProcess, OpenProcessToken, DuplicateTokenEx, and ImpersonateLoggedOnUser APIs. Grzegorz shows how to achieve the same using Nt* APIs, specifically NtOpenProcess, NtOpenProcessToken, NtDuplicateToken, and NtSetInformationThread. Because I’m a C# junky, I…

598 Views 0 Comments
Cybersecurity 2025-08-20
BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

Cybersecurity BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

What is BadUSB? Using the STM32F407 development board, we’ll study HID device development and implement a low-cost BadUSB. This article uses the development board for testing. Those with the means can also create a PCB prototype and print the enclosure to create a highly realistic BadUSB.BadUSB is an attack that masquerades as a USB HID…

873 Views 0 Comments
Cybersecurity 2025-08-18
MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

Cybersecurity MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

Model Context Protocol (MCP) is gaining traction, but critical security gaps remain. This guide explores common MCP vulnerabilities in the 2025-06-18 release — from misconfigurations and credential leaks to command injection and remote code execution — helping developers secure their MCP deployments. MCP adoption is picking up quickly, so I have been digging into the…

823 Views 0 Comments
Cybersecurity 2025-08-15
Use io_uring to evade security detection and targeted detection.

Cybersecurity Use io_uring to evade security detection and targeted detection.

This article explores how ARMO researchers leveraged the io_uring mechanism to bypass popular Linux security monitoring tools such as Falco and Tetragon. It also demonstrates the workings of the open-source attack tool Curing, explaining its core calls, exploitation process, and potential defense strategies. Background The ARMO research team recently revealed a major flaw in Linux…

618 Views 0 Comments
Cybersecurity 2025-08-10
Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial

Cybersecurity Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial

This article details methods for debugging packaged Electron applications, including main/renderer process debugging techniques, ASAR file extraction and modification, debugging tool installation, and solutions for common issues like WebSockets request errors, ideal for Electron developers troubleshooting applications. Even after an Electron application has been packaged and distributed, it’s still possible to debug it using various…

898 Views 0 Comments
Cybersecurity 2025-05-26
  • «
  • 1
  • 2
Search Article
Popular Articles
Top 10 Best React UI Component Libraries in 2026: Developer’s Practical Guide

Top 10 Best React UI Component Libraries in 2026: Developer’s Practical Guide

Discover the top 10 React UI component libraries in 2026. Learn their core strengths, use cases, and selection strategies for enterprise, Next.js, and accessible projects. Practical developer guide. As a front-end engineer with 8 years of hands-on React experience, I’ve seen firsthand how the right React UI component libraries 2026 can cut development time by...
About us

About Us | Contact Us | Privacy Policy | Terms of Use X (Twitter)