Dev Resource Hub
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  1. Home
  2. Cybersecurity
  3. Article list
SOC-CERT: AI-Powered Open-Source Threat Intelligence System for Real-Time CVE Monitoring

Cybersecurity SOC-CERT: AI-Powered Open-Source Threat Intelligence System for Real-Time CVE Monitoring

SOC-CERT is an AI-powered open-source threat intelligence system that monitors CVEs from CISA, NIST, CERT-FR & OTX, delivering real-time alerts at zero cost. This is a submission for the AI Agents Challenge powered by n8n and Bright Data 🛡️ What I Built ⚡ TL;DR: 📖 Description: 🚀 Unique Innovation: soc-cert-workflow-architecture.png🏗️ Architecture Overview: ⚡ Complete threat intelligence automation pipeline processing 100+…

868 Views 0 Comments
Cybersecurity 2025-08-27
Using C# to steal tokens and gain system permissions

Cybersecurity Using C# to steal tokens and gain system permissions

Intro Grzegorz Tworek recently published some C code demonstrating how to steal and impersonate Windows tokens from a process. The standard way to do this is with the OpenProcess, OpenProcessToken, DuplicateTokenEx, and ImpersonateLoggedOnUser APIs. Grzegorz shows how to achieve the same using Nt* APIs, specifically NtOpenProcess, NtOpenProcessToken, NtDuplicateToken, and NtSetInformationThread. Because I’m a C# junky, I…

325 Views 0 Comments
Cybersecurity 2025-08-20
BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

Cybersecurity BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

What is BadUSB? Using the STM32F407 development board, we’ll study HID device development and implement a low-cost BadUSB. This article uses the development board for testing. Those with the means can also create a PCB prototype and print the enclosure to create a highly realistic BadUSB.BadUSB is an attack that masquerades as a USB HID…

458 Views 0 Comments
Cybersecurity 2025-08-18
MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

Cybersecurity MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

Model Context Protocol (MCP) is gaining traction, but critical security gaps remain. This guide explores common MCP vulnerabilities in the 2025-06-18 release — from misconfigurations and credential leaks to command injection and remote code execution — helping developers secure their MCP deployments. MCP adoption is picking up quickly, so I have been digging into the…

453 Views 0 Comments
Cybersecurity 2025-08-15
Use io_uring to evade security detection and targeted detection.

Cybersecurity Use io_uring to evade security detection and targeted detection.

This article explores how ARMO researchers leveraged the io_uring mechanism to bypass popular Linux security monitoring tools such as Falco and Tetragon. It also demonstrates the workings of the open-source attack tool Curing, explaining its core calls, exploitation process, and potential defense strategies. Background The ARMO research team recently revealed a major flaw in Linux…

359 Views 0 Comments
Cybersecurity 2025-08-10
Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial

Cybersecurity Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial

This article details methods for debugging packaged Electron applications, including main/renderer process debugging techniques, ASAR file extraction and modification, debugging tool installation, and solutions for common issues like WebSockets request errors, ideal for Electron developers troubleshooting applications. Even after an Electron application has been packaged and distributed, it’s still possible to debug it using various…

492 Views 0 Comments
Cybersecurity 2025-05-26
  • «
  • 1
  • 2
Search Article
Popular Articles
XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

In penetration testing, XXL-Job vulnerabilities are often highlighted for their convenience in direct reverse shell attacks. However, real-world scenarios frequently involve “non-outbound networks” or “missing scheduler panels,” which pose greater challenges. This article breaks down the version detection, command execution, and multiple memory shell injection methods for the XXL-Job Executor default token vulnerability, using practical...
Building a Local MCP Service from Scratch: A Complete Guide to STDIO Mode Implementation and LLM Integration

Building a Local MCP Service from Scratch: A Complete Guide to STDIO Mode Implementation and LLM Integration

This article will start with the working principles of MCP, take the STDIO transmission mode as an example, and provide a comprehensive walkthrough of building a local MCP service, testing it, and integrating it with an LLM (using Cursor as an example), helping developers quickly master the practical application of the MCP protocol. We’ve already...
MCP (Model Context Protocol): A Complete Guide to Solving LLM Application Development Pain Points

MCP (Model Context Protocol): A Complete Guide to Solving LLM Application Development Pain Points

In the fast-paced world of AI development, building applications based on Large Language Models (LLMs) has become an industry focus. However, before the advent of MCP (Model Context Protocol), developers faced a host of tricky challenges when building LLM applications. These issues not only slowed down development efficiency but also limited the practical implementation of...
Mousefood Embedded UI Development Guide: From Beginner to Pro, Solving Graphics Challenges in No-Std Environments

Mousefood Embedded UI Development Guide: From Beginner to Pro, Solving Graphics Challenges in No-Std Environments

Technical Dilemmas in Embedded UI Development: From Requirements to Bottlenecks [Essential for Embedded UI Development] In the development of IoT, industrial control, and portable smart devices, how to build efficient graphical UIs in no-std, OS-less environments? Traditional terminal UI libraries are limited by resource constraints and hardware compatibility, becoming a major development pain point. This...
A Deep Dive into Gorm: Architecture, Workflow, Tips, and Troubleshooting for Go’s ORM Framework

A Deep Dive into Gorm: Architecture, Workflow, Tips, and Troubleshooting for Go’s ORM Framework

This article details the internal architecture and SQL execution workflow of Gorm, the popular ORM framework for Go. It shares practical techniques for model definition, querying, and updating, while solving common issues like time zone discrepancies, soft deletion, and transactions. It is tailored for advanced Gorm developers. As the most widely used ORM (Object-Relational Mapping) framework...
About us

About Us | Contact Us | Privacy Policy | Terms of Use X (Twitter)