Skip to content

Latest commit

 

History

History
103 lines (83 loc) · 3.1 KB

File metadata and controls

103 lines (83 loc) · 3.1 KB

Blog Tag Standards

Standardized Tags

Windows Internals

  • WindowsInternals - General Windows internals content
  • KernelMode - Kernel-mode programming and concepts
  • MemoryManagement - Memory management internals
  • ProcessInternals - Process/Thread structures
  • SystemCalls - System call mechanisms

Exploitation & Security Research

  • KernelExploitation - Kernel vulnerability exploitation
  • PrivilegeEscalation - Privilege escalation techniques
  • DKOM - Direct Kernel Object Manipulation
  • VulnResearch - Vulnerability research
  • CVEAnalysis - CVE deep dives

Malware & Red Team

  • MalwareDev - Malware development techniques
  • RedTeam - Red team operations and tools
  • Evasion - EDR/AV evasion techniques
  • PELoading - PE loading and injection
  • Persistence - Persistence mechanisms

CTF & Writeups

  • Writeup - CTF/Box writeups
  • CTF - CTF-specific content
  • HTB - HackTheBox challenges
  • PWN - Binary exploitation challenges

Tools & Techniques

  • Reversing - Reverse engineering
  • Debugging - Debugging techniques
  • Forensics - Digital forensics

Tag Usage Examples

Windows Internals Posts

tags: ["WindowsInternals", "KernelMode", "SystemCalls"]

Exploitation Posts

tags: ["KernelExploitation", "PrivilegeEscalation", "DKOM"]

Malware Development Posts

tags: ["MalwareDev", "Evasion", "PELoading"]

CVE Analysis Posts

tags: ["VulnResearch", "CVEAnalysis", "KernelExploitation"]

CTF Writeups

tags: ["Writeup", "CTF", "PWN"]

Applied Tags (Current Posts)

✅ Chuẩn hoá rồi:

  1. WindowsArchitectureDeepDive - ["WindowsInternals", "KernelMode", "SystemCalls"]
  2. WindowsMemoryManagement - ["WindowsInternals", "MemoryManagement", "KernelExploitation"]
  3. ProcessThreadInternals - ["WindowsInternals", "ProcessInternals", "PrivilegeEscalation", "DKOM"]
  4. MeterpreterLifeCycle - ["WindowsInternals", "RedTeam", "MalwareDev"]

🔄 Cần chuẩn hoá:

  1. CVE2024_21338["VulnResearch", "CVEAnalysis", "PrivilegeEscalation"]
  2. RemoteDesktopAppExploit["VulnResearch", "PrivilegeEscalation", "Persistence"]
  3. SelfDelete["WindowsInternals", "MalwareDev", "Evasion"]
  4. SlicetheStackSpottheBug["RedTeam", "Research"]
  5. JuniorHackingTalentsCTF_writeup["Writeup", "CTF"]
  6. Rootme_writeup["Writeup", "Reversing"]
  7. Pwnable.kr_writeup["Writeup", "PWN"]
  8. Devguru, Hackid101, Nullbyte, Photographer["Writeup", "HTB"]

⚠️ Posts cần thêm tags (hiện tại empty):

  • BinaryClass
  • callbackfunction
  • Dropper
  • RemoteInjectPE
  • RunPEInWindows1124H2
  • TheDarkArtsofPELoadinginWindows

Rules

  1. Max 3-4 tags per post - Không quá nhiều
  2. CamelCase - WindowsInternals, not windows-internals
  3. No spaces - MalwareDev, not Malware Dev
  4. Specific over generic - ProcessInternals > WindowsInternals
  5. Consistent naming - Always same spelling

Migration Script

# To apply these changes to all posts, run:
# python scripts/migrate-tags.py