20M golang to 1KB shellcode
1.PrefaceGolanghasmanyadvantagesanddisadvantages,butforsecuritypersonnel,Ithinkthebigge...

2025 latest & emulator WeChat mini-program packet capture & mini-program reverse engineering
IntroductionWhydoIwanttowritethis?BecauseIhavebeenworkingrecently,Ididn'texpectthef...
2023 Annual Summary: Data Security Policies, Regulations, Standards, and Reports
2023isboundtobeaspecialyearinthehistoryofChina'sdatadevelopment.Atthenationalstrate...
2021-Digital China Innovation Competition-Huifu Cybersecurity Track-Final-Web-hatenum and source code analysis and payload script analysis
2021-DigitalChinaInnovationCompetition-HuifuCybersecurityTrack-Final-Web-hatenumandsourcecod...

2019 Year-end Summary
Inrecentyears,APPshavebeenincreasinglyseriousinviolatingregulationsbycollectingpersonal...
2.Unauthorized Access of DataNode Node Restful API
I.IntroductionHadoopisadistributedsystemframeworkreleasedbytheApacheFoundation,whichper...
2.Hunting Brute Ratel C4 TeamServer
1.PrefaceInThepreviousarticleInthepreviousarticle,weanalyzedtheHTTP/SBadgerPayloadofBru...
2.8 Continue to click the getTomcatWebServer method, find the initialize () method, and you can see the tomcat.start () method to start the Tomcat service.
Author:LiYanke1BackgroundSpringBootisaframework,anewprogrammingspecification.Itsemergenc...
2.4 CQRS and Eventual Consistency (最终一致性)
CQRSisjustaverysimplepattern(pattern),CQRSitselfisnotastyleofarchitecture,andithas...
2.3 Security vulnerabilities similar to cross-site scripting
WhatisSecurityTestingSecuritytestingisatypeofsoftwaretestingthatcandiscovervulnerabili...