DEV Community

Cybersecurity

Articles related to cybersecurity and much more

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Tools you need for making your own Linux distribution.

Tools you need for making your own Linux distribution.

14
Comments
3 min read
How a Yubikey works and why you should use one

How a Yubikey works and why you should use one

3
Comments
5 min read
Programing language for hackers

Programing language for hackers

12
Comments 1
3 min read
Manually Exploiting MS17-010 (python2 to python3)

Manually Exploiting MS17-010 (python2 to python3)

3
Comments
2 min read
Validating the PE Signature (My AV Flagged me) [Windows PE Internals]

Validating the PE Signature (My AV Flagged me) [Windows PE Internals]

6
Comments
3 min read
Don't try these commands in linux

Don't try these commands in linux

18
Comments
7 min read
Twint (Twitter Intelligence)- A advanced Twitter Scrapper

Twint (Twitter Intelligence)- A advanced Twitter Scrapper

12
Comments
5 min read
ĂĄngstromCTF Exclusive Cipher

ĂĄngstromCTF Exclusive Cipher

2
Comments
3 min read
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

41
Comments
11 min read
Game Hacking Fundamentals

Game Hacking Fundamentals

7
Comments 2
2 min read
Stackoverflow [Android Internals CTF Ex7]

Stackoverflow [Android Internals CTF Ex7]

5
Comments
3 min read
Fetch Metadata and Isolation Policies

Fetch Metadata and Isolation Policies

6
Comments
8 min read
Off by One [Android Internals CTF Ex8]

Off by One [Android Internals CTF Ex8]

4
Comments
5 min read
Crypto miners are killing free CI

Crypto miners are killing free CI

10
Comments
3 min read
Dissecting the PE Header [Windows PE Internals]

Dissecting the PE Header [Windows PE Internals]

7
Comments
4 min read
Validating the MZ Signature [Windows PE Internals]

Validating the MZ Signature [Windows PE Internals]

7
Comments
3 min read
What Are Sim-Swap Attacks?

What Are Sim-Swap Attacks?

2
Comments 4
1 min read
Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

3
Comments
2 min read
Introducing Tor

Introducing Tor

9
Comments 1
15 min read
Creating a Windows Project in Visual Studio [Windows PE Internals]

Creating a Windows Project in Visual Studio [Windows PE Internals]

9
Comments
1 min read
Happy Birthday Linux!

Happy Birthday Linux!

12
Comments 2
1 min read
ARA CTF Final Round Binary Exploitation Write Up

ARA CTF Final Round Binary Exploitation Write Up

3
Comments
9 min read
Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

3
Comments
6 min read
Using "noopener" and ”noreferrer” against Phishing Attacks

Using "noopener" and ”noreferrer” against Phishing Attacks

10
Comments
1 min read
Inline Function Hooking [Android Internals CTF Ex6]

Inline Function Hooking [Android Internals CTF Ex6]

7
Comments
6 min read
loading...