WindowsInternals - General Windows internals content
KernelMode - Kernel-mode programming and concepts
MemoryManagement - Memory management internals
ProcessInternals - Process/Thread structures
SystemCalls - System call mechanisms
Exploitation & Security Research
KernelExploitation - Kernel vulnerability exploitation
PrivilegeEscalation - Privilege escalation techniques
DKOM - Direct Kernel Object Manipulation
VulnResearch - Vulnerability research
CVEAnalysis - CVE deep dives
MalwareDev - Malware development techniques
RedTeam - Red team operations and tools
Evasion - EDR/AV evasion techniques
PELoading - PE loading and injection
Persistence - Persistence mechanisms
Writeup - CTF/Box writeups
CTF - CTF-specific content
HTB - HackTheBox challenges
PWN - Binary exploitation challenges
Reversing - Reverse engineering
Debugging - Debugging techniques
Forensics - Digital forensics
tags : ["WindowsInternals", "KernelMode", "SystemCalls"]
tags : ["KernelExploitation", "PrivilegeEscalation", "DKOM"]
Malware Development Posts
tags : ["MalwareDev", "Evasion", "PELoading"]
tags : ["VulnResearch", "CVEAnalysis", "KernelExploitation"]
tags : ["Writeup", "CTF", "PWN"]
Applied Tags (Current Posts)
WindowsArchitectureDeepDive - ["WindowsInternals", "KernelMode", "SystemCalls"]
WindowsMemoryManagement - ["WindowsInternals", "MemoryManagement", "KernelExploitation"]
ProcessThreadInternals - ["WindowsInternals", "ProcessInternals", "PrivilegeEscalation", "DKOM"]
MeterpreterLifeCycle - ["WindowsInternals", "RedTeam", "MalwareDev"]
CVE2024_21338 → ["VulnResearch", "CVEAnalysis", "PrivilegeEscalation"]
RemoteDesktopAppExploit → ["VulnResearch", "PrivilegeEscalation", "Persistence"]
SelfDelete → ["WindowsInternals", "MalwareDev", "Evasion"]
SlicetheStackSpottheBug → ["RedTeam", "Research"]
JuniorHackingTalentsCTF_writeup → ["Writeup", "CTF"]
Rootme_writeup → ["Writeup", "Reversing"]
Pwnable.kr_writeup → ["Writeup", "PWN"]
Devguru , Hackid101 , Nullbyte , Photographer → ["Writeup", "HTB"]
⚠️ Posts cần thêm tags (hiện tại empty):
BinaryClass
callbackfunction
Dropper
RemoteInjectPE
RunPEInWindows1124H2
TheDarkArtsofPELoadinginWindows
Max 3-4 tags per post - Không quá nhiều
CamelCase - WindowsInternals, not windows-internals
No spaces - MalwareDev, not Malware Dev
Specific over generic - ProcessInternals > WindowsInternals
Consistent naming - Always same spelling
# To apply these changes to all posts, run:
# python scripts/migrate-tags.py