DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
"Shinobi Rokugu" — What a Ninja's Everyday Carry Teaches Us About Physical Security

"Shinobi Rokugu" — What a Ninja's Everyday Carry Teaches Us About Physical Security

Comments
3 min read
I just wanted a desk clock I accidentally built a Home Assistant dashboard

I just wanted a desk clock I accidentally built a Home Assistant dashboard

1
Comments
11 min read
The Coinbase Breach Explained: Insider Social Engineering Attack

The Coinbase Breach Explained: Insider Social Engineering Attack

1
Comments
5 min read
🥷 CloudGoat: SNS Secrets: Write-up: Exploiting SNS subscriptions to leak API keys

🥷 CloudGoat: SNS Secrets: Write-up: Exploiting SNS subscriptions to leak API keys

Comments
3 min read
🥷 CloudGoat: Data Secrets: Write-up: Exploiting EC2 User Data and IMDS to escalate privileges

🥷 CloudGoat: Data Secrets: Write-up: Exploiting EC2 User Data and IMDS to escalate privileges

Comments
7 min read
Stolen iPhone Hacking Tools Compromise Security: Urgent Measures Needed to Prevent Further Proliferation

Stolen iPhone Hacking Tools Compromise Security: Urgent Measures Needed to Prevent Further Proliferation

Comments
8 min read
🥷 CloudGoat: Beanstalk Secrets (Pacu): Write-up: From low-privilege user to admin (Pacu approach)

🥷 CloudGoat: Beanstalk Secrets (Pacu): Write-up: From low-privilege user to admin (Pacu approach)

Comments
4 min read
What Is a "Cyber Ninja"? — The World of Full-Stack Hacking

What Is a "Cyber Ninja"? — The World of Full-Stack Hacking

1
Comments
4 min read
OWASP Top 10 Explained Simply — With Real Examples

OWASP Top 10 Explained Simply — With Real Examples

1
Comments
6 min read
THM - Systems as Attack Vectors

THM - Systems as Attack Vectors

1
Comments
3 min read
AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk

AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk

1
Comments
6 min read
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

Comments
6 min read
Claude Didn't Just Get Jailbroken. It Ran a 6-Week Cyberattack on an Entire Country.

Claude Didn't Just Get Jailbroken. It Ran a 6-Week Cyberattack on an Entire Country.

Comments
9 min read
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

Comments
5 min read
Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation

Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.