Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
hacking
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How to protect yourself against cyber threats
Daniel Lăcătuș
Daniel Lăcătuș
Daniel Lăcătuș
Follow
Feb 8
How to protect yourself against cyber threats
#
cybersecurity
#
hacking
#
phishing
#
ransomware
Comments
Add Comment
3 min read
Exploiting SSRF in AWS Metadata
Blue Byte
Blue Byte
Blue Byte
Follow
Jan 31
Exploiting SSRF in AWS Metadata
#
hacking
#
cloud
#
aws
#
ssrf
Comments
Add Comment
1 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply
Richard Chamberlain
Richard Chamberlain
Richard Chamberlain
Follow
Jan 31
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply
#
security
#
hacking
#
linux
#
cybersecurity
Comments
Add Comment
2 min read
Path traversal via alias misconfiguration in Nginx
Blue Byte
Blue Byte
Blue Byte
Follow
Jan 19
Path traversal via alias misconfiguration in Nginx
#
nginx
#
hacking
#
bugbounty
Comments
Add Comment
1 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Feb 4
The Impact of SQL Injection: Understanding the Potential Risks and Consequences
#
cybersecurity
#
sqlinjection
#
hacking
#
websecurity
1
reaction
Comments
Add Comment
4 min read
Understanding SQL Injection: A Major Security Threat
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Feb 3
Understanding SQL Injection: A Major Security Threat
#
cybersecurity
#
sqlinjection
#
hacking
#
websecurity
13
reactions
Comments
Add Comment
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes
sachinravindran
sachinravindran
sachinravindran
Follow
Feb 3
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes
#
hacking
#
security
#
linux
1
reaction
Comments
Add Comment
2 min read
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG
Jane Ori
Jane Ori
Jane Ori
Follow
Jan 17
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG
#
css
#
webdev
#
hacking
#
svg
38
reactions
Comments
Add Comment
20 min read
Code Smell 284 - Encrypted Functions
Maxi Contieri
Maxi Contieri
Maxi Contieri
Follow
Dec 21 '24
Code Smell 284 - Encrypted Functions
#
webdev
#
programming
#
security
#
hacking
Comments
Add Comment
5 min read
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!
Jane Ori
Jane Ori
Jane Ori
Follow
Jan 6
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!
#
css
#
webdev
#
hacking
#
api
70
reactions
Comments
6
comments
11 min read
Common Cybersecurity Misconceptions and How to Avoid Them
Aditya Raj
Aditya Raj
Aditya Raj
Follow
Jan 2
Common Cybersecurity Misconceptions and How to Avoid Them
#
cybersecurity
#
hacking
#
security
Comments
Add Comment
2 min read
The Complete Guide to Ethical Hacking in 2025
Daksh Kataria
Daksh Kataria
Daksh Kataria
Follow
Nov 28 '24
The Complete Guide to Ethical Hacking in 2025
#
coding
#
ethicalhacking
#
hacking
#
ethicalhackingcourse
Comments
1
comment
3 min read
You Could Lose All Your Crypto In a Job Interview
Eduardo Zepeda
Eduardo Zepeda
Eduardo Zepeda
Follow
Dec 16 '24
You Could Lose All Your Crypto In a Job Interview
#
opinion
#
hacking
#
cybersecurity
#
crypto
2
reactions
Comments
Add Comment
3 min read
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)
StealthC
StealthC
StealthC
Follow
Dec 11 '24
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)
#
frida
#
reverse
#
typescript
#
hacking
1
reaction
Comments
Add Comment
8 min read
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)
StealthC
StealthC
StealthC
Follow
Dec 11 '24
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)
#
frida
#
reverse
#
typescript
#
hacking
2
reactions
Comments
Add Comment
8 min read
Day 46: Adversarial Attacks on LLMs
Naresh Nishad
Naresh Nishad
Naresh Nishad
Follow
Dec 5 '24
Day 46: Adversarial Attacks on LLMs
#
llm
#
75daysofllm
#
hacking
1
reaction
Comments
Add Comment
2 min read
ARP Request & Replay Attack: How Hackers Hijack Networks
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 18 '24
ARP Request & Replay Attack: How Hackers Hijack Networks
#
cybersecurity
#
networking
#
hacking
#
arp
1
reaction
Comments
Add Comment
4 min read
Understanding Network Hacking
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 5 '24
Understanding Network Hacking
#
network
#
hacking
#
networkhacking
Comments
Add Comment
2 min read
The Curious Case of the $15,000 Spam: My Unexpected Investigation
Boopathi
Boopathi
Boopathi
Follow
Nov 2 '24
The Curious Case of the $15,000 Spam: My Unexpected Investigation
#
hacking
#
webdev
#
aws
#
chatgpt
18
reactions
Comments
3
comments
2 min read
Mastering Cyber Security
Dan
Dan
Dan
Follow
Oct 15 '24
Mastering Cyber Security
#
cybersecurity
#
security
#
cyber
#
hacking
1
reaction
Comments
Add Comment
2 min read
Understanding the Basics of ELF Files on Linux
Sandipan Roy
Sandipan Roy
Sandipan Roy
Follow
Oct 14 '24
Understanding the Basics of ELF Files on Linux
#
security
#
linux
#
hacking
#
malware
1
reaction
Comments
Add Comment
5 min read
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 11 '24
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career
#
hacking
#
ethicalhacker
2
reactions
Comments
2
comments
5 min read
Browser request interceptor
Le Vuong
Le Vuong
Le Vuong
Follow
Oct 8 '24
Browser request interceptor
#
requestinterceptor
#
browser
#
debugging
#
hacking
1
reaction
Comments
2
comments
1 min read
Polyglot solve most of Training XSS Muscles Challenge
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Follow
Sep 14 '24
Polyglot solve most of Training XSS Muscles Challenge
#
xss
#
javascript
#
ctf
#
hacking
Comments
Add Comment
3 min read
What is a polyglot in Hacking
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Follow
Sep 13 '24
What is a polyglot in Hacking
#
security
#
xss
#
pentest
#
hacking
Comments
Add Comment
2 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account