A self-proclaimed \"cybersecurity enthusiast\" and penetration testing guru.
The website of LyShark Security Team (abbreviated as L.S.T.) is a spontaneous non-profit hacking organization in China. The team members are mainly composed of computer enthusiasts who advocate and engage in proactive information security technology research, exchange, collation, and promotion. They popularize security technology and common sense, improve the overall level of network security, and are determined to make a modest contribution to promoting the development of information security in China.
The author of the IDA plugin 'go_parser', no need for further introductions, right? ;)
Focus on threat research for more than ten years.
A hardware hacker ~
"},{"id":"1026_AA70VHJ1TT16F6SVRRDNQM5C3S","category_id":"1026_EO4JOV1TVD715BSKTD7940T0NG","category":"About","title":"About","brief":"A social slave drifting in Beijing.Currently employed in a network security","thumb":{"ext":"png","height":113,"md5":"d2b6cf40b72122e345b59622d79ceed0","name":"thumb","rotate":null,"size":40520,"thumb_source":"_bmVaqipMTadjaZORrHP41Q","type":"image","width":200},"tags":["_control:fullpage","_control:readable_id:about-me"],"create_time":"2000-01-01","modify_time":1706328645,"readable_id":"about-me","body":"
A social slave drifting in Beijing.
Currently employed in a network security company, I have been exposed to network security since junior high school. I still remember that I used to buy every issue of \"Hacker X Archives\", \"Hacker Defense\", and \"Insecurity\". Looking back now, it was the era when China's network security was just starting. In the blink of an eye, I am now in my thirties.
Once I ran into the IRC of 0x557, and at that time, I didn't know the immense scope of things and actually chatted with the big shots in the chat room about technology for a long time.
Just after graduating from university, I successfully joined 360(another network security company in China) through an internal referral from a friend I met in a QQ group. Later, I became colleagues with a certain editor of \"Hacker Defense\" and also got in touch with the founding-level big shots of Green Alliance. I was also fortunate to have met several people from 0x557 (although they may not remember me at all).
It turns out that this world is pretty small...
Technology Stack
- Reverse Engineering: C/C++/ASM
- Backend: Perl/Python/PHP/Typescript
- Frontend: Self-taught frontend developer. Currently limited to using Typescript + Material-UI to create decent-looking websites (this site).
- Others: Research on various topics, though not in-depth in any particular area (Windows kernel, anti-virus, big data, various frameworks, etc.).
Projects
- Micro-framework for PHP: https://github.com/Hacksign/SmallMVC
The backend of this site is built on Synology DSM's NoteStation, while the frontend is written using Typescript + Material-UI.
For site-related inquiries, please contact the following email: ZXZpbHNpZ25AZ21haWwuY29t
"}],"page":{"total":3,"current":3,"max":10},"categories":["Link","Other","About","Reverse","Exploit"],"archives":{"2024-09":1,"2024-08":1,"2023-12":1,"2023-07":1,"2023-05":2,"2023-04":1,"2023-03":1,"2023-01":1,"2022-12":1,"2022-11":1,"2022-10":1,"2022-09":1,"2022-04":1,"2022-03":2,"2022-01":1,"2021-11":2,"2021-09":1,"2021-07":1,"2021-06":1,"2021-05":2,"2021-04":1,"2021-03":1,"2021-02":1,"2020-12":1,"2000-01":2},"endpoint":"http://127.0.0.1:3000","lang":"en-US","languages":["en-US","zh-CN"],"locale":{"Banner":"Debugwar","BTitle":"Watch & Learn","Slogan":"Step in or Step over, this is a problem ...","Index":"Index","Catalog":"Catalog","Archives":"Archives","SwitchLanguage":"Switch language","CopyRight":"CopyRight (c) 2020 - 2025 Debugwar.com","DesignBy":"Designed by Hacksign"}}Watch & Learn
Debugwar Blog
Step in or Step over, this is a problem ...
This article mainly records some problems encountered by the author during t
My Blogging JourneySince high school, I have been tinkering with my blog in
(All characters in this article are fictitious)Alarms“Two tigers love to dan
Pure BASH methodThe /dev/tcp/ip/port in the following text is a virtual file
PrefaceDuring a recent large-scale internet event, as a beleaguered blue team
BackgroundRecently, a notebook that opened 3389 (remote desktop) appeared to be
OverviewIn recent years, electronic payments have greatly facilitated people’s
PrefaceThe “Dive into kernel” series, literally translated as “Deep into the ke
A self-proclaimed "cybersecurity enthusiast" and penetration testing guru.
The website of LyShark Security Team (abbreviated as L.S.T.) is a spontaneous non-profit hacking organization in China. The team members are mainly composed of computer enthusiasts who advocate and engage in proactive information security technology research, exchange, collation, and promotion. They popularize security technology and common sense, improve the overall level of network security, and are determined to make a modest contribution to promoting the development of information security in China.
The author of the IDA plugin 'go_parser', no need for further introductions, right? ;)
Focus on threat research for more than ten years.
A hardware hacker ~
A social slave drifting in Beijing.
Currently employed in a network security company, I have been exposed to network security since junior high school. I still remember that I used to buy every issue of "Hacker X Archives", "Hacker Defense", and "Insecurity". Looking back now, it was the era when China's network security was just starting. In the blink of an eye, I am now in my thirties.
Once I ran into the IRC of 0x557, and at that time, I didn't know the immense scope of things and actually chatted with the big shots in the chat room about technology for a long time.
Just after graduating from university, I successfully joined 360(another network security company in China) through an internal referral from a friend I met in a QQ group. Later, I became colleagues with a certain editor of "Hacker Defense" and also got in touch with the founding-level big shots of Green Alliance. I was also fortunate to have met several people from 0x557 (although they may not remember me at all).
It turns out that this world is pretty small...
Technology Stack
- Reverse Engineering: C/C++/ASM
- Backend: Perl/Python/PHP/Typescript
- Frontend: Self-taught frontend developer. Currently limited to using Typescript + Material-UI to create decent-looking websites (this site).
- Others: Research on various topics, though not in-depth in any particular area (Windows kernel, anti-virus, big data, various frameworks, etc.).
Projects
- Micro-framework for PHP: https://github.com/Hacksign/SmallMVC
The backend of this site is built on Synology DSM's NoteStation, while the frontend is written using Typescript + Material-UI.
For site-related inquiries, please contact the following email: ZXZpbHNpZ25AZ21haWwuY29t
CopyRight (c) 2020 - 2025 Debugwar.com
Designed by Hacksign