DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to protect yourself against cyber threats

How to protect yourself against cyber threats

Comments
3 min read
Exploiting SSRF in AWS Metadata

Exploiting SSRF in AWS Metadata

Comments
1 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply

Comments
2 min read
Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences

The Impact of SQL Injection: Understanding the Potential Risks and Consequences

1
Comments
4 min read
Understanding SQL Injection: A Major Security Threat

Understanding SQL Injection: A Major Security Threat

13
Comments
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

How We Removed a Crypto Miner Malware That Exploited Linux File Attributes

1
Comments
2 min read
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG

100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG

38
Comments
20 min read
Code Smell 284 - Encrypted Functions

Code Smell 284 - Encrypted Functions

Comments
5 min read
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!

GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!

70
Comments 6
11 min read
Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
The Complete Guide to Ethical Hacking in 2025

The Complete Guide to Ethical Hacking in 2025

Comments 1
3 min read
You Could Lose All Your Crypto In a Job Interview

You Could Lose All Your Crypto In a Job Interview

2
Comments
3 min read
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)

[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)

1
Comments
8 min read
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)

[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)

2
Comments
8 min read
Day 46: Adversarial Attacks on LLMs

Day 46: Adversarial Attacks on LLMs

1
Comments
2 min read
ARP Request & Replay Attack: How Hackers Hijack Networks

ARP Request & Replay Attack: How Hackers Hijack Networks

1
Comments
4 min read
Understanding Network Hacking

Understanding Network Hacking

Comments
2 min read
The Curious Case of the $15,000 Spam: My Unexpected Investigation

The Curious Case of the $15,000 Spam: My Unexpected Investigation

18
Comments 3
2 min read
Mastering Cyber Security

Mastering Cyber Security

1
Comments
2 min read
Understanding the Basics of ELF Files on Linux

Understanding the Basics of ELF Files on Linux

1
Comments
5 min read
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career

How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career

2
Comments 2
5 min read
Browser request interceptor

Browser request interceptor

1
Comments 2
1 min read
Polyglot solve most of Training XSS Muscles Challenge

Polyglot solve most of Training XSS Muscles Challenge

Comments
3 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
loading...