Tunneling over QUIC: Modern Network Protocol Implementation in Go
Comprehensive guide to implementing network tunneling using the QUIC protocol in Go, covering proxy-agent architecture, TLS integration, and practical deployment scenarios.
2741 words
|
14 minutes
Windows WMI & System Management: Complete Administrator's Guide
Master Windows Management Instrumentation (WMI), system monitoring, remote management, and advanced PowerShell automation techniques
3094 words
|
15 minutes
A Minimal Scheduler with eBPF, sched_ext and C
A comprehensive tutorial for creating a minimal Linux scheduler using eBPF and sched_ext, implementing a round-robin scheduling algorithm with practical examples and visualization.
1271 words
|
6 minutes
How to Use eBPF for Monitoring Linux Thread Contention
Comprehensive guide to using eBPF for monitoring Linux thread contention, including practical examples with bcc, bpftrace, and custom scripts for performance analysis.
2182 words
|
11 minutes
Unit Testing eBPF Programs: A Comprehensive Guide with XDP Examples
Learn how to effectively unit test eBPF programs using BPF_PROG_RUN and libbpf. Complete guide with XDP examples, best practices, and troubleshooting tips.
2076 words
|
10 minutes
50 Real-World Use Cases for Wazuh MCP Server: From SOC to DevSecOps
Explore 50 practical use cases for Wazuh MCP Server across security operations, incident response, threat hunting, compliance, and DevSecOps with real implementation examples.
5096 words
|
25 minutes
How to Run Code in Kernel Space? eBPF! Complete Guide with XDP Packet Capture
Comprehensive guide to running code in kernel space using eBPF, featuring a complete XDP packet capture implementation with Go integration and practical examples.
3297 words
|
16 minutes
Detecting Illegitimate Crypto Miners on Linux Endpoints with Wazuh
Learn how to detect and prevent illegitimate crypto mining on Linux systems using Wazuh. Implement comprehensive monitoring for SSH access, file integrity, CPU usage, and network connections.
1938 words
|
10 minutes