
DNSTwist User Guide
DNSTwistUserGuideDNSTwistisatoolusedtodetectdomainvariantsandpotentialphishingattacks....

DLL injection vs. Shellcode injection
DLLinjectionvs.ShellcodeinjectionInthefieldofmoderncomputersecurity,DLLinjectionandShe...

DLL Hijacking
DLLHijacking1.IntroductiontoDLLDLL(DynamicLinkLibrary)filesaredynamiclinklibraryfiles,...
Distributed Storage Technology (Part 2): Analysis of the architecture, principles, characteristics, and advantages and disadvantages of wide-column storage and full-text search engines
Forwrite-intensiveapplicationswithmassivedailywritevolumes,unpredictabledatagrowth,andhi...

Discussion on Zero Trust Network Construction and Some Details (Part Two)
Thisarticleisabout7000words,continuingthecontentofthearticle'DiscussiononZeroTrust...

Disassembly code of liba.so
IntroductiontodynamiclinkingAsmentionedearlier,therearemanyoptimizationsinthestaticlink...
Disable SSL Pinning (ssl_pinning_plugin)
FlutterisGoogle'smobileUIframework,whichcanquicklybuildhigh-qualitynativeuserinterfa...

Different SRC vulnerability discovery approach: Practical case of HTTP request splitting vulnerability
SomeexpertssaythatitisimpossibletofindHTTPrequestsmuggling,splitting,orwebcachepoiso...
Dialogue with the 'three knights' of Cotton Era: How to protect the security of private domain operation?
Inrecentyears,theprivatedomaintrafficpoolhasbecomeamust'create'placeforallenterprise...

Development of Burp plugin for sensitive information detection based on deepseek local large model
Chapter1:DevelopmentBackgroundIntheprocessofpenetrationtesting,traditionalregularexpressi...