Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
hacker
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Day 1 - Learning Bug Bounty
Arun kumar G
Arun kumar G
Arun kumar G
Follow
Jan 21
Day 1 - Learning Bug Bounty
#
bugbounty
#
cybersecurity
#
ethicalhacking
#
hacker
Comments
Add Comment
1 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
Tauseef imam
Tauseef imam
Tauseef imam
Follow
Jan 26
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means
#
cybersecurity
#
hacker
#
security
#
infosec
1
 reaction
Comments
2
 comments
5 min read
LiveShell — Interactive Reverse Shell Generator
pwn
pwn
pwn
Follow
Dec 20 '25
LiveShell — Interactive Reverse Shell Generator
#
cybersecurity
#
pwn
#
hacker
#
livepwn
10
 reactions
Comments
1
 comment
2 min read
BYOD or BYOB? Why Bring Your Own Device Often Means Bring Your Own Breach
Henning Lorenzen
Henning Lorenzen
Henning Lorenzen
Follow
Dec 19 '25
BYOD or BYOB? Why Bring Your Own Device Often Means Bring Your Own Breach
#
security
#
it
#
hacker
Comments
Add Comment
2 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account