Dev Resource Hub
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  • 🛠️Online Tools
  • 💻DevOps
  • 🥷Cybersecurity
  • 📟Embedded
  • 🤖AI
  • ⚙️System
  • 🗂️Software
  • 👤About
    • About Us
    • Contact Us
    • Privacy Policy
    • Terms of Use
  • English
    • 中文 (中国)
    • English
  1. Home
  2. Cybersecurity
  3. Article list
Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking

Cybersecurity Modern EDR Countermeasures: Fundamentals and Practical Guide to User-Mode Function Hooking

In the field of Windows security offense and defense, Function Hooking is a core technology for EDR (Endpoint Detection and Response) to monitor process behavior and for attackers to bypass protections. To counter modern EDR interception, the first step is to master the operating mechanism of function hooking in user mode. Centered on the framework of “FUNCTION-HOOKING…

238 Views 0 Comments
Cybersecurity 2025-10-25
XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

Cybersecurity XXL-Job Executor Default AccessToken Vulnerability: Exploitation and Memory Shell Injection in Non-Outbound Scenarios

In penetration testing, XXL-Job vulnerabilities are often highlighted for their convenience in direct reverse shell attacks. However, real-world scenarios frequently involve “non-outbound networks” or “missing scheduler panels,” which pose greater challenges. This article breaks down the version detection, command execution, and multiple memory shell injection methods for the XXL-Job Executor default token vulnerability, using practical…

410 Views 0 Comments
Cybersecurity 2025-10-23
SOC-CERT: AI-Powered Open-Source Threat Intelligence System for Real-Time CVE Monitoring

Cybersecurity SOC-CERT: AI-Powered Open-Source Threat Intelligence System for Real-Time CVE Monitoring

SOC-CERT is an AI-powered open-source threat intelligence system that monitors CVEs from CISA, NIST, CERT-FR & OTX, delivering real-time alerts at zero cost. This is a submission for the AI Agents Challenge powered by n8n and Bright Data 🛡️ What I Built ⚡ TL;DR: 📖 Description: 🚀 Unique Innovation: soc-cert-workflow-architecture.png🏗️ Architecture Overview: ⚡ Complete threat intelligence automation pipeline processing 100+…

1,204 Views 0 Comments
Cybersecurity 2025-08-27
Using C# to steal tokens and gain system permissions

Cybersecurity Using C# to steal tokens and gain system permissions

Intro Grzegorz Tworek recently published some C code demonstrating how to steal and impersonate Windows tokens from a process. The standard way to do this is with the OpenProcess, OpenProcessToken, DuplicateTokenEx, and ImpersonateLoggedOnUser APIs. Grzegorz shows how to achieve the same using Nt* APIs, specifically NtOpenProcess, NtOpenProcessToken, NtDuplicateToken, and NtSetInformationThread. Because I’m a C# junky, I…

408 Views 0 Comments
Cybersecurity 2025-08-20
BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

Cybersecurity BadUSB Principles and STM32 HID Tutorial (Source Code and GitHub Link)

What is BadUSB? Using the STM32F407 development board, we’ll study HID device development and implement a low-cost BadUSB. This article uses the development board for testing. Those with the means can also create a PCB prototype and print the enclosure to create a highly realistic BadUSB.BadUSB is an attack that masquerades as a USB HID…

594 Views 0 Comments
Cybersecurity 2025-08-18
MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

Cybersecurity MCP Security Vulnerabilities: Critical Risks Every Developer Must Know

Model Context Protocol (MCP) is gaining traction, but critical security gaps remain. This guide explores common MCP vulnerabilities in the 2025-06-18 release — from misconfigurations and credential leaks to command injection and remote code execution — helping developers secure their MCP deployments. MCP adoption is picking up quickly, so I have been digging into the…

566 Views 0 Comments
Cybersecurity 2025-08-15
Use io_uring to evade security detection and targeted detection.

Cybersecurity Use io_uring to evade security detection and targeted detection.

This article explores how ARMO researchers leveraged the io_uring mechanism to bypass popular Linux security monitoring tools such as Falco and Tetragon. It also demonstrates the workings of the open-source attack tool Curing, explaining its core calls, exploitation process, and potential defense strategies. Background The ARMO research team recently revealed a major flaw in Linux…

450 Views 0 Comments
Cybersecurity 2025-08-10
Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial

Cybersecurity Debugging Packaged Electron Apps | Main Process/Renderer Process Debugging Tips | ASAR File Modification Tutorial

This article details methods for debugging packaged Electron applications, including main/renderer process debugging techniques, ASAR file extraction and modification, debugging tool installation, and solutions for common issues like WebSockets request errors, ideal for Electron developers troubleshooting applications. Even after an Electron application has been packaged and distributed, it’s still possible to debug it using various…

611 Views 0 Comments
Cybersecurity 2025-05-26
  • «
  • 1
  • 2
Search Article
Popular Articles
DDU (Display Driver Uninstaller) | Complete Guide + Safe Usage Tutorial & FAQ

DDU (Display Driver Uninstaller) | Complete Guide + Safe Usage Tutorial & FAQ

How to fully remove NVIDIA/AMD/Intel GPU driver leftovers with DDU? This guide covers Safe Mode setup, driver conflict fixes, and use cases like GPU upgrades or failed installations—plus pro tips to avoid issues. As a tech engineer specializing in PC hardware maintenance for years, I’ve seen countless odd problems caused by leftover drivers: game crashes,...
How to Adjust Power and Sleep Settings in Windows 11

How to Adjust Power and Sleep Settings in Windows 11

As a Windows 11 user, have you ever encountered scenarios like your computer automatically sleeping and causing unsaved documents while working outside, or wanting longer laptop standby time but not knowing how to adjust it? In fact, Windows 11’s sleep mode is designed to balance energy efficiency and convenience, but only by mastering the correct setup...
LangGraph Tutorial: Build an Enterprise-Grade Multi-Agent Intelligent Contract Review & Risk Analysis System (With HITL & Short/Long-Term Memory)

LangGraph Tutorial: Build an Enterprise-Grade Multi-Agent Intelligent Contract Review & Risk Analysis System (With HITL & Short/Long-Term Memory)

In enterprise operations, contract review is a core risk control process—but traditional manual review has long been plagued by three critical pain points: inefficiency (a complex contract can take hours or even days to review), risk omission (reliance on reviewer experience leads to missed hidden compliance issues), and lack of personalization (failure to adapt to...
Complete Guide: Install GitLab on NAS (Synology/TrueNAS/FNOS) + Restore Backups via Docker

Complete Guide: Install GitLab on NAS (Synology/TrueNAS/FNOS) + Restore Backups via Docker

Learn how to deploy GitLab on NAS (FNOS, Synology, TrueNAS) using Docker, fix permission errors, and safely restore backup data. This step-by-step tutorial covers volume mounting, version matching, and migration best practices to build your private DevOps platform effortlessly. Why Install GitLab on a NAS? Most development teams rely on cloud services like GitHub or GitLab.com for...
Step-by-Step Guide: Direct Ethernet Connection for Two Windows PCs – Set Up LAN & Share Internet

Step-by-Step Guide: Direct Ethernet Connection for Two Windows PCs – Set Up LAN & Share Internet

As someone who’s used multiple computers for work long-term and values productivity, I know how essential it is to“control multiple devices with one keyboard and mouse.”But Mouse without Borders (Microsoft’s cross-PC input tool) often hits frustrations like lag and disconnections when used over Wi-Fi. Today, I’m sharing a tested-and-proven solution: build a dedicated local area network (LAN)...
About us

About Us | Contact Us | Privacy Policy | Terms of Use X (Twitter)