DEV Community

# cybersecurity

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
Using Empire4 without Kali

Using Empire4 without Kali

Reactions 11 Comments 1
4 min read
Exploiting unverified JWT signatures

Exploiting unverified JWT signatures

Reactions 7 Comments
2 min read
OSI Referans Modeli

OSI Referans Modeli

Reactions 9 Comments
5 min read
How I Bypassed Netflix Profile Lock?

How I Bypassed Netflix Profile Lock?

Reactions 5 Comments 2
3 min read
GraphQL API recon with mitmproxy

GraphQL API recon with mitmproxy

Reactions 6 Comments
1 min read
Create Personalized Blockchain in 60 Minutes

Create Personalized Blockchain in 60 Minutes

Reactions 9 Comments
3 min read
Modifying a site's JavaScript with mitmproxy

Modifying a site's JavaScript with mitmproxy

Reactions 6 Comments
1 min read
Unpacking js.map files

Unpacking js.map files

Reactions 7 Comments
1 min read
Hashing Algorithms and creating a simple file integrity monitor (FIM)

Hashing Algorithms and creating a simple file integrity monitor (FIM)

Reactions 7 Comments
4 min read
What can La Casa De Papel teach you about Cybersecurity

What can La Casa De Papel teach you about Cybersecurity

Reactions 3 Comments
3 min read
Enigma - The Complexity of the Machine

Enigma - The Complexity of the Machine

Reactions 4 Comments
4 min read
El truco para aprender a programar

El truco para aprender a programar

Reactions 2 Comments
2 min read
Hack The Box Writeup: Previse - SSHad0w

Hack The Box Writeup: Previse - SSHad0w

Reactions 4 Comments
15 min read
Please remove that .DS_Store

Please remove that .DS_Store

Reactions 101 Comments 18
2 min read
API Security 101

API Security 101

Reactions 4 Comments
25 min read
Critical Security Areas That Software Engineers Have To Know To Secure Their Solutions

Critical Security Areas That Software Engineers Have To Know To Secure Their Solutions

Reactions 7 Comments
10 min read
API3:2019 - Excessive Data Exposure

API3:2019 - Excessive Data Exposure

Reactions 3 Comments
4 min read
What does 2022 have in store for cybersecurity and cloud security specialists?

What does 2022 have in store for cybersecurity and cloud security specialists?

Reactions 56 Comments
7 min read
Phishing Campaigns And YouTube Creators

Phishing Campaigns And YouTube Creators

Reactions 11 Comments 1
1 min read
All about OSCP - Material

All about OSCP - Material

Reactions 2 Comments
1 min read
How to OSCP Labs Part 1: Getting Started

How to OSCP Labs Part 1: Getting Started

Reactions 8 Comments 1
7 min read
Securing Apps and Systems

Securing Apps and Systems

Reactions 2 Comments
4 min read
To find company admin panels

To find company admin panels

Reactions 3 Comments 1
1 min read
Wireshark ile AÄź Analizi

Wireshark ile AÄź Analizi

Reactions 5 Comments
5 min read
Wireshark Nedir?

Wireshark Nedir?

Reactions 4 Comments
3 min read
TOR🧅- Stay Anonymous In Internet

TOR🧅- Stay Anonymous In Internet

Reactions 3 Comments
2 min read
Log4j Vulnerability Cheatsheet

Log4j Vulnerability Cheatsheet

Reactions 7 Comments
2 min read
Deep dive into MongoDB Aggregation Framework

Deep dive into MongoDB Aggregation Framework

Reactions 1 Comments
1 min read
What is DDoS Attack?

What is DDoS Attack?

Reactions 6 Comments
2 min read
Automating AppSec with Contrast Security

Automating AppSec with Contrast Security

Reactions 11 Comments 2
1 min read
The trick to learning to program

The trick to learning to program

Reactions 4 Comments
2 min read
Things to know before developing your cyber security solution

Things to know before developing your cyber security solution

Reactions 5 Comments
13 min read
Zafiyetli Makine Çözümü

Zafiyetli Makine Çözümü

Reactions 12 Comments
5 min read
A Verdade sobre Cybersegurança e LGPD

A Verdade sobre Cybersegurança e LGPD

Reactions 3 Comments
14 min read
OSINT Nedir?

OSINT Nedir?

Reactions 8 Comments 1
4 min read
Nmap Nedir?

Nmap Nedir?

Reactions 5 Comments
3 min read
Cyber security essentials

Cyber security essentials

Reactions 6 Comments
4 min read
Supply Chain Attacks: 6 Steps to protect your software supply chain

Supply Chain Attacks: 6 Steps to protect your software supply chain

Reactions 3 Comments
11 min read
Are passwords still worth it?

Are passwords still worth it?

Reactions 12 Comments
3 min read
SQL Injection Nedir?

SQL Injection Nedir?

Reactions 8 Comments
2 min read
Looking for contributors (pentest project)

Looking for contributors (pentest project)

Reactions 8 Comments
1 min read
Cybercrimes in Social Media

Cybercrimes in Social Media

Reactions 3 Comments
3 min read
Writeup: HackTheBox Knife - Without Metasploit (OSCP Prep)

Writeup: HackTheBox Knife - Without Metasploit (OSCP Prep)

Reactions 2 Comments
3 min read
Simple Commands in Linux That Will Make You Feel Like a Pro

Simple Commands in Linux That Will Make You Feel Like a Pro

Reactions 161 Comments 1
4 min read
Horrifying Vulnerabilities in the Death/Birth Certificate System

Horrifying Vulnerabilities in the Death/Birth Certificate System

Reactions 4 Comments
2 min read
Hawk pentest tool

Hawk pentest tool

Reactions 5 Comments
1 min read
15 In-Demand Cybersecurity Courses

15 In-Demand Cybersecurity Courses

Reactions 3 Comments
1 min read
8 Most Common Type Of Cyber Attacks

8 Most Common Type Of Cyber Attacks

Reactions 23 Comments 2
3 min read
API1:2019 - Broken Object Level Authorization

API1:2019 - Broken Object Level Authorization

Reactions 3 Comments
2 min read
How does the TOR Browser Work?

How does the TOR Browser Work?

Reactions 5 Comments
2 min read
Contributors needed (Pentest/networking project)

Contributors needed (Pentest/networking project)

Reactions 6 Comments 1
1 min read
EP 02 | Start using Terminal

EP 02 | Start using Terminal

Reactions 5 Comments
6 min read
Data Decryption and Encryption using AES

Data Decryption and Encryption using AES

Reactions 16 Comments
1 min read
Overview of the OWASP Serverless Top 10 [videos]

Overview of the OWASP Serverless Top 10 [videos]

Reactions 6 Comments
1 min read
Writeup: HackTheBox Cap - Without Metasploit (OSCP Prep)

Writeup: HackTheBox Cap - Without Metasploit (OSCP Prep)

Reactions 3 Comments
4 min read
VPS: An Upgrade from Shared Hosting

VPS: An Upgrade from Shared Hosting

Reactions 4 Comments
5 min read
API Security Explained! API Cybersecurity 101

API Security Explained! API Cybersecurity 101

Reactions 6 Comments
6 min read
How to Create Four Types of VPN’s Quickly with Wireguard® and Netmaker

How to Create Four Types of VPN’s Quickly with Wireguard® and Netmaker

Reactions 10 Comments 1
10 min read
Easy breached password detection

Easy breached password detection

Reactions 5 Comments
2 min read
Easy Crack

Easy Crack

Reactions 4 Comments
4 min read
loading...