Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
hacking
Follow
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Overpass 2 - Hacked - TryHackMe writeup
Mateusz Jasiński
Mateusz Jasiński
Mateusz Jasiński
Follow
Jun 4
Overpass 2 - Hacked - TryHackMe writeup
#
tutorial
#
tryhackme
#
hacking
#
ctf
Comments
Add Comment
6 min read
Security Fest 2023 - Badge CTF writeup
Jonathan B.
Jonathan B.
Jonathan B.
Follow
Jun 1
Security Fest 2023 - Badge CTF writeup
#
securityfest
#
ctf
#
hardwarehacking
#
hacking
Comments
Add Comment
8 min read
15 Top Platforms for Learning Cybersecurity
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
May 28
15 Top Platforms for Learning Cybersecurity
#
cybersecurity
#
security
#
cloudcomputing
#
hacking
10
reactions
Comments
Add Comment
9 min read
5 Way to Prevent Out of Bounds Write
Sandipan Roy
Sandipan Roy
Sandipan Roy
Follow
May 11
5 Way to Prevent Out of Bounds Write
#
security
#
cpp
#
hacking
#
development
Comments
Add Comment
6 min read
How to Prevent Out of Bounds Read
Sandipan Roy
Sandipan Roy
Sandipan Roy
Follow
May 11
How to Prevent Out of Bounds Read
#
security
#
cpp
#
hacking
#
development
Comments
Add Comment
4 min read
A Theoretically Devastating Cyber Attack on America’s Gas Stations:
RoseSecurity
RoseSecurity
RoseSecurity
Follow
May 3
A Theoretically Devastating Cyber Attack on America’s Gas Stations:
#
cybersecurity
#
hacking
#
go
#
python
Comments
Add Comment
3 min read
Common Misconceptions About TryHackMe
Rake
Rake
Rake
Follow
Apr 28
Common Misconceptions About TryHackMe
#
tryhackme
#
pentesting
#
cybersecurity
#
hacking
1
reaction
Comments
Add Comment
2 min read
TryHackMe WriteUp: RootMe
Incuerd0
Incuerd0
Incuerd0
Follow
Apr 3
TryHackMe WriteUp: RootMe
#
hacking
#
ethical
#
root
Comments
Add Comment
11 min read
What is Dark Web?Hidden World Revealed
Pannaga Perumal
Pannaga Perumal
Pannaga Perumal
Follow
Apr 21
What is Dark Web?Hidden World Revealed
#
darkweb
#
hacking
#
beginners
#
computerscience
7
reactions
Comments
Add Comment
4 min read
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?
Jsquared
Jsquared
Jsquared
Follow
Apr 17
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?
#
cybersecurity
#
security
#
penetrationtesting
#
hacking
7
reactions
Comments
Add Comment
4 min read
Hacking 101: Common Attacks and How to Stop Them
Magerman714
Magerman714
Magerman714
Follow
Mar 5
Hacking 101: Common Attacks and How to Stop Them
#
hacking
#
security
#
database
#
sql
1
reaction
Comments
Add Comment
5 min read
Get Network Passwords
Muhammad Usman
Muhammad Usman
Muhammad Usman
Follow
Mar 19
Get Network Passwords
#
hacking
#
network
2
reactions
Comments
Add Comment
2 min read
Hack WiFi using Kali Linux
Nitin Kumar
Nitin Kumar
Nitin Kumar
Follow
Feb 6
Hack WiFi using Kali Linux
#
kalilinux
#
wifi
#
hackwifi
#
hacking
Comments
Add Comment
3 min read
$350 XSS in 15 minutes
Anton
Anton
Anton
Follow
Dec 28 '22
$350 XSS in 15 minutes
#
cybersecurity
#
hacking
#
xss
#
bugbounty
1
reaction
Comments
Add Comment
3 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 1]
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Jan 26
Protegendo sua API NodeJs contra ReDos Attack[Parte 1]
#
node
#
security
#
hacking
#
api
1
reaction
Comments
Add Comment
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Jan 26
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]
#
node
#
security
#
hacking
#
api
1
reaction
Comments
Add Comment
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 2]
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Jan 26
Protegendo sua API NodeJs contra ReDos Attack[Parte 2]
#
node
#
security
#
hacking
#
api
1
reaction
Comments
Add Comment
6 min read
ChatGPT can be used to hack you — Experts warn
Ibrahim Zahir
Ibrahim Zahir
Ibrahim Zahir
Follow
Jan 15
ChatGPT can be used to hack you — Experts warn
#
chatgpt
#
cybersecurity
#
openai
#
hacking
2
reactions
Comments
Add Comment
6 min read
Learn Ethical hacking in 2023 (detailed overview)
Md Shihab Shumon
Md Shihab Shumon
Md Shihab Shumon
Follow
Dec 26 '22
Learn Ethical hacking in 2023 (detailed overview)
#
hacking
#
programming
#
python
#
hacktoberfest
19
reactions
Comments
1
comment
3 min read
Portuguese Cybersecurity Competition CTF Write-up
JP Dias
JP Dias
JP Dias
Follow
Dec 14 '22
Portuguese Cybersecurity Competition CTF Write-up
#
security
#
ctf
#
hackrocks
#
hacking
5
reactions
Comments
Add Comment
9 min read
Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”
JohnnyTime 🤓
JohnnyTime 🤓
JohnnyTime 🤓
Follow
Dec 2 '22
Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”
#
ethereum
#
solidity
#
blockchain
#
hacking
6
reactions
Comments
Add Comment
4 min read
How to setup Metasploitable in a Mac with M1 chip
merlos
merlos
merlos
Follow
Nov 30 '22
How to setup Metasploitable in a Mac with M1 chip
#
security
#
mac
#
tutorial
#
hacking
6
reactions
Comments
4
comments
5 min read
Replaying network requests on puppeteer
sametcodes
sametcodes
sametcodes
Follow
Nov 28 '22
Replaying network requests on puppeteer
#
puppeteer
#
javascript
#
headless
#
hacking
2
reactions
Comments
Add Comment
3 min read
What is JSON with padding?
sametcodes
sametcodes
sametcodes
Follow
Nov 27 '22
What is JSON with padding?
#
javascript
#
webdev
#
json
#
hacking
3
reactions
Comments
Add Comment
2 min read
Certificate Parsing with `domain-recon`
Ervin Szilagyi
Ervin Szilagyi
Ervin Szilagyi
Follow
Nov 5 '22
Certificate Parsing with `domain-recon`
#
rust
#
dns
#
opensource
#
hacking
12
reactions
Comments
Add Comment
6 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Nov 1 '22
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
#
security
#
hacking
#
github
#
opensource
9
reactions
Comments
1
comment
4 min read
Using DNS as C2 Communication - Evasive Techniques (Part 3)
Dimitar
Dimitar
Dimitar
Follow
Oct 30 '22
Using DNS as C2 Communication - Evasive Techniques (Part 3)
#
security
#
dns
#
hacking
#
malware
2
reactions
Comments
Add Comment
3 min read
Thinking Like a Hacker: AWS Keys in Private Repos
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Oct 26 '22
Thinking Like a Hacker: AWS Keys in Private Repos
#
security
#
hacking
#
aws
#
github
5
reactions
Comments
Add Comment
5 min read
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
Oct 10 '22
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
#
hacking
#
cybersecurity
#
remote
#
ethicalhacks
1
reaction
Comments
2
comments
4 min read
Logging with the administrator's user account OWASP Juice shop
I Am A Hacker
I Am A Hacker
I Am A Hacker
Follow
Sep 18 '22
Logging with the administrator's user account OWASP Juice shop
#
hacking
#
owasptop10
#
juiceshop
#
linux
4
reactions
Comments
Add Comment
5 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
Dimitar
Dimitar
Dimitar
Follow
Oct 8 '22
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
#
malware
#
hacking
#
linux
#
devjournal
6
reactions
Comments
Add Comment
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
for
Hackmamba
Oct 5 '22
Top 5 Tools and Practical Steps in Checking Website Vulnerability
#
cybersecurity
#
hacking
#
cyber
#
security
7
reactions
Comments
Add Comment
5 min read
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
Ajeet Singh Raina
Ajeet Singh Raina
Ajeet Singh Raina
Follow
for
Docker
Sep 24 '22
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
#
hacktoberfest
#
developer
#
docker
#
hacking
8
reactions
Comments
Add Comment
3 min read
Breaking Down Another Phishing Attempt
Aaron Powell
Aaron Powell
Aaron Powell
Follow
Aug 25 '22
Breaking Down Another Phishing Attempt
#
security
#
hacking
Comments
Add Comment
7 min read
From App User to Tenant Admin
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 19 '22
From App User to Tenant Admin
#
opensource
#
hacking
#
bugbounty
#
api
1
reaction
Comments
Add Comment
3 min read
The best hacking tools in 2022
Bartosz Wójcik
Bartosz Wójcik
Bartosz Wójcik
Follow
Sep 16 '22
The best hacking tools in 2022
#
hacking
#
security
#
cybersecurity
#
reversing
7
reactions
Comments
Add Comment
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Sep 12 '22
Thinking Like a Hacker: Abusing Stolen Private Keys
#
security
#
hacking
#
docker
#
rsa
7
reactions
Comments
Add Comment
4 min read
Ferramentas não-devs pra fazer sua carreira decolar
Fabiana Rodrigues
Fabiana Rodrigues
Fabiana Rodrigues
Follow
Sep 5 '22
Ferramentas não-devs pra fazer sua carreira decolar
#
beginners
#
tips
#
hacking
4
reactions
Comments
1
comment
3 min read
Commenting == Account Takeover
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 3 '22
Commenting == Account Takeover
#
hacking
#
security
#
bugbounty
#
lowcode
5
reactions
Comments
Add Comment
4 min read
Linux: The Commands to Know
DevManas13
DevManas13
DevManas13
Follow
Aug 25 '22
Linux: The Commands to Know
#
linux
#
beginners
#
tutorial
#
hacking
11
reactions
Comments
Add Comment
3 min read
How to hack a .NET Core game
Oskar Mendel
Oskar Mendel
Oskar Mendel
Follow
Aug 16 '22
How to hack a .NET Core game
#
hacking
#
cpp
#
netcore
#
memory
5
reactions
Comments
2
comments
12 min read
Write-up: Git Exposed, weak password reset and account takeover.
José Vitor Alves Pignataro
José Vitor Alves Pignataro
José Vitor Alves Pignataro
Follow
Aug 2 '22
Write-up: Git Exposed, weak password reset and account takeover.
#
security
#
cybersecurity
#
hacking
#
informationsecurity
3
reactions
Comments
Add Comment
4 min read
Cracking a hashed password with hashcat
wrongbyte
wrongbyte
wrongbyte
Follow
Jun 16 '22
Cracking a hashed password with hashcat
#
security
#
hacking
13
reactions
Comments
Add Comment
2 min read
Spending spring days crafting packets at NahamCon 2022
f0rked
f0rked
f0rked
Follow
for
Stack Labs
May 30 '22
Spending spring days crafting packets at NahamCon 2022
#
ctf
#
security
#
networking
#
hacking
4
reactions
Comments
Add Comment
20 min read
What is Penetration Testing ?
Ehtisham-sudo
Ehtisham-sudo
Ehtisham-sudo
Follow
May 30 '22
What is Penetration Testing ?
#
linux
#
hacking
#
security
4
reactions
Comments
1
comment
2 min read
Trends at Blackhat Asia 2022
Miguel
Miguel
Miguel
Follow
for
Sysdig
May 25 '22
Trends at Blackhat Asia 2022
#
news
#
blackhat
#
security
#
hacking
8
reactions
Comments
Add Comment
4 min read
Setting up reconftw
darkmage
darkmage
darkmage
Follow
May 19 '22
Setting up reconftw
#
hacking
#
infosec
#
bugbounty
#
linux
12
reactions
Comments
Add Comment
9 min read
How Can You Hack Into An Android Device 📱 In 2022?
Raghav Mrituanjaya
Raghav Mrituanjaya
Raghav Mrituanjaya
Follow
May 10 '22
How Can You Hack Into An Android Device 📱 In 2022?
#
hacking
#
cybersecurity
#
webdev
#
beginners
9
reactions
Comments
1
comment
4 min read
Insomni’Hack : un résumé des confs que nous avons vu
jeanstacklabs
jeanstacklabs
jeanstacklabs
Follow
for
Stack Labs
Apr 8 '22
Insomni’Hack : un résumé des confs que nous avons vu
#
security
#
hacking
4
reactions
Comments
Add Comment
3 min read
A Beginner's Guide to Penetration Testing (Part 2)
Hjalte Abelskov
Hjalte Abelskov
Hjalte Abelskov
Follow
for
IT Minds
May 4 '22
A Beginner's Guide to Penetration Testing (Part 2)
#
beginners
#
penetrationtesting
#
hacking
#
hackthebox
7
reactions
Comments
Add Comment
6 min read
TryHackMe(THM)-Mrrobot Writeup
Ionut
Ionut
Ionut
Follow
Apr 21 '22
TryHackMe(THM)-Mrrobot Writeup
#
security
#
cybersecurity
#
hacking
#
tryhackme
8
reactions
Comments
Add Comment
4 min read
A Beginner's Guide to Penetration Testing (Part 1)
Hjalte Abelskov
Hjalte Abelskov
Hjalte Abelskov
Follow
for
IT Minds
Apr 21 '22
A Beginner's Guide to Penetration Testing (Part 1)
#
beginners
#
penetrationtesting
#
hacking
8
reactions
Comments
Add Comment
5 min read
CTF Writeup: picoCTF 2022
Lena
Lena
Lena
Follow
Apr 4 '22
CTF Writeup: picoCTF 2022
#
ctf
#
security
#
writeup
#
hacking
10
reactions
Comments
1
comment
40 min read
🚀 Space Heroes 2022 CTF write-up
Krypton
Krypton
Krypton
Follow
Apr 4 '22
🚀 Space Heroes 2022 CTF write-up
#
challenge
#
ctf
#
hacking
#
space
6
reactions
Comments
Add Comment
17 min read
CTF Writeup: VishwaCTF 2022
Lena
Lena
Lena
Follow
Mar 25 '22
CTF Writeup: VishwaCTF 2022
#
ctf
#
security
#
hacking
#
writeup
6
reactions
Comments
Add Comment
19 min read
OverTheWire Bandit Levels 19-34 Hints and Notes
Yulin Chen
Yulin Chen
Yulin Chen
Follow
Mar 24 '22
OverTheWire Bandit Levels 19-34 Hints and Notes
#
ctf
#
overthewire
#
hacking
#
security
5
reactions
Comments
Add Comment
12 min read
API10:2019 - Insufficient Logging & Monitoring
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Mar 19 '22
API10:2019 - Insufficient Logging & Monitoring
#
security
#
hacking
#
api
#
owasp
4
reactions
Comments
Add Comment
3 min read
CTF Writeup: UTCTF 2022
Lena
Lena
Lena
Follow
Mar 18 '22
CTF Writeup: UTCTF 2022
#
ctf
#
writeup
#
security
#
hacking
5
reactions
Comments
Add Comment
21 min read
CTF Writeup: 1337UP CTF 2022
Lena
Lena
Lena
Follow
Mar 18 '22
CTF Writeup: 1337UP CTF 2022
#
ctf
#
writeup
#
security
#
hacking
5
reactions
Comments
Add Comment
4 min read
One-click attack nima?
Wahid Abduhakimov
Wahid Abduhakimov
Wahid Abduhakimov
Follow
Mar 16 '22
One-click attack nima?
#
hacking
#
dotnet
#
uzbek
#
beginners
10
reactions
Comments
6
comments
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account