Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
hacking
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Replaying network requests on puppeteer
sametcodes
sametcodes
sametcodes
Follow
Nov 28 '22
Replaying network requests on puppeteer
#
puppeteer
#
javascript
#
headless
#
hacking
2
reactions
Comments
Add Comment
3 min read
What is JSON with padding?
sametcodes
sametcodes
sametcodes
Follow
Nov 27 '22
What is JSON with padding?
#
javascript
#
webdev
#
json
#
hacking
3
reactions
Comments
Add Comment
2 min read
Certificate Parsing with `domain-recon`
Ervin Szilagyi
Ervin Szilagyi
Ervin Szilagyi
Follow
for
recon-tools
Nov 5 '22
Certificate Parsing with `domain-recon`
#
rust
#
dns
#
opensource
#
hacking
12
reactions
Comments
Add Comment
6 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Nov 1 '22
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
#
security
#
hacking
#
github
#
opensource
9
reactions
Comments
1
comment
4 min read
Using DNS as C2 Communication - Evasive Techniques (Part 3)
Dimitar
Dimitar
Dimitar
Follow
Oct 30 '22
Using DNS as C2 Communication - Evasive Techniques (Part 3)
#
security
#
dns
#
hacking
#
malware
2
reactions
Comments
Add Comment
3 min read
Thinking Like a Hacker: AWS Keys in Private Repos
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Oct 26 '22
Thinking Like a Hacker: AWS Keys in Private Repos
#
security
#
hacking
#
aws
#
github
5
reactions
Comments
Add Comment
5 min read
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
Oct 10 '22
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
#
hacking
#
cybersecurity
#
remote
#
ethicalhacks
1
reaction
Comments
2
comments
4 min read
Logging with the administrator's user account OWASP Juice shop
I Am A Hacker
I Am A Hacker
I Am A Hacker
Follow
Sep 18 '22
Logging with the administrator's user account OWASP Juice shop
#
hacking
#
owasptop10
#
juiceshop
#
linux
4
reactions
Comments
Add Comment
5 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
Dimitar
Dimitar
Dimitar
Follow
Oct 8 '22
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
#
malware
#
hacking
#
linux
#
devjournal
6
reactions
Comments
Add Comment
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
for
Hackmamba
Oct 5 '22
Top 5 Tools and Practical Steps in Checking Website Vulnerability
#
cybersecurity
#
hacking
#
cyber
#
security
7
reactions
Comments
Add Comment
5 min read
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
Ajeet Singh Raina
Ajeet Singh Raina
Ajeet Singh Raina
Follow
for
Docker
Sep 24 '22
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
#
hacktoberfest
#
developer
#
docker
#
hacking
8
reactions
Comments
Add Comment
3 min read
From App User to Tenant Admin
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 19 '22
From App User to Tenant Admin
#
opensource
#
hacking
#
bugbounty
#
api
1
reaction
Comments
Add Comment
3 min read
The best hacking tools in 2022
Bartosz Wójcik
Bartosz Wójcik
Bartosz Wójcik
Follow
Sep 16 '22
The best hacking tools in 2022
#
hacking
#
security
#
cybersecurity
#
reversing
7
reactions
Comments
Add Comment
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Sep 12 '22
Thinking Like a Hacker: Abusing Stolen Private Keys
#
security
#
hacking
#
docker
#
rsa
7
reactions
Comments
Add Comment
4 min read
Ferramentas não-devs pra fazer sua carreira decolar
Fabiana Rodrigues
Fabiana Rodrigues
Fabiana Rodrigues
Follow
Sep 5 '22
Ferramentas não-devs pra fazer sua carreira decolar
#
beginners
#
tips
#
hacking
4
reactions
Comments
Add Comment
3 min read
Commenting == Account Takeover
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 3 '22
Commenting == Account Takeover
#
hacking
#
security
#
bugbounty
#
lowcode
5
reactions
Comments
Add Comment
4 min read
Linux: The Commands to Know
DevManas13
DevManas13
DevManas13
Follow
Aug 25 '22
Linux: The Commands to Know
#
linux
#
beginners
#
tutorial
#
hacking
11
reactions
Comments
Add Comment
3 min read
Breaking Down Another Phishing Attempt
Aaron Powell
Aaron Powell
Aaron Powell
Follow
Aug 25 '22
Breaking Down Another Phishing Attempt
#
security
#
hacking
Comments
Add Comment
7 min read
How to hack a .NET Core game
Oskar Mendel
Oskar Mendel
Oskar Mendel
Follow
Aug 16 '22
How to hack a .NET Core game
#
hacking
#
cpp
#
netcore
#
memory
5
reactions
Comments
2
comments
12 min read
Write-up: Git Exposed, weak password reset and account takeover.
José Vitor Alves Pignataro
José Vitor Alves Pignataro
José Vitor Alves Pignataro
Follow
Aug 2 '22
Write-up: Git Exposed, weak password reset and account takeover.
#
security
#
cybersecurity
#
hacking
#
informationsecurity
4
reactions
Comments
Add Comment
4 min read
Cracking a hashed password with hashcat
wrongbyte
wrongbyte
wrongbyte
Follow
Jun 16 '22
Cracking a hashed password with hashcat
#
security
#
hacking
13
reactions
Comments
Add Comment
2 min read
Spending spring days crafting packets at NahamCon 2022
f0rked
f0rked
f0rked
Follow
for
Stack Labs
May 30 '22
Spending spring days crafting packets at NahamCon 2022
#
ctf
#
security
#
networking
#
hacking
4
reactions
Comments
Add Comment
20 min read
What is Penetration Testing ?
Ehtisham-sudo
Ehtisham-sudo
Ehtisham-sudo
Follow
May 30 '22
What is Penetration Testing ?
#
linux
#
hacking
#
security
4
reactions
Comments
1
comment
2 min read
Trends at Blackhat Asia 2022
Miguel
Miguel
Miguel
Follow
for
Sysdig
May 25 '22
Trends at Blackhat Asia 2022
#
news
#
blackhat
#
security
#
hacking
8
reactions
Comments
Add Comment
4 min read
Setting up reconftw
darkmage
darkmage
darkmage
Follow
May 19 '22
Setting up reconftw
#
hacking
#
infosec
#
bugbounty
#
linux
12
reactions
Comments
Add Comment
9 min read
How Can You Hack Into An Android Device 📱 In 2022?
Raghav Mrituanjaya
Raghav Mrituanjaya
Raghav Mrituanjaya
Follow
May 10 '22
How Can You Hack Into An Android Device 📱 In 2022?
#
hacking
#
cybersecurity
#
webdev
#
beginners
9
reactions
Comments
1
comment
4 min read
Insomni’Hack : un résumé des confs que nous avons vu
jeanstacklabs
jeanstacklabs
jeanstacklabs
Follow
for
Stack Labs
Apr 8 '22
Insomni’Hack : un résumé des confs que nous avons vu
#
security
#
hacking
4
reactions
Comments
Add Comment
3 min read
A Beginner's Guide to Penetration Testing (Part 2)
Hjalte Abelskov
Hjalte Abelskov
Hjalte Abelskov
Follow
for
IT Minds
May 4 '22
A Beginner's Guide to Penetration Testing (Part 2)
#
beginners
#
penetrationtesting
#
hacking
#
hackthebox
7
reactions
Comments
Add Comment
6 min read
TryHackMe(THM)-Mrrobot Writeup
Ionut
Ionut
Ionut
Follow
Apr 21 '22
TryHackMe(THM)-Mrrobot Writeup
#
security
#
cybersecurity
#
hacking
#
tryhackme
8
reactions
Comments
Add Comment
4 min read
A Beginner's Guide to Penetration Testing (Part 1)
Hjalte Abelskov
Hjalte Abelskov
Hjalte Abelskov
Follow
for
IT Minds
Apr 21 '22
A Beginner's Guide to Penetration Testing (Part 1)
#
beginners
#
penetrationtesting
#
hacking
8
reactions
Comments
Add Comment
5 min read
CTF Writeup: picoCTF 2022
Lena
Lena
Lena
Follow
Apr 4 '22
CTF Writeup: picoCTF 2022
#
ctf
#
security
#
writeup
#
hacking
10
reactions
Comments
1
comment
40 min read
🚀 Space Heroes 2022 CTF write-up
Krypton
Krypton
Krypton
Follow
Apr 4 '22
🚀 Space Heroes 2022 CTF write-up
#
challenge
#
ctf
#
hacking
#
space
6
reactions
Comments
Add Comment
17 min read
CTF Writeup: VishwaCTF 2022
Lena
Lena
Lena
Follow
Mar 25 '22
CTF Writeup: VishwaCTF 2022
#
ctf
#
security
#
hacking
#
writeup
6
reactions
Comments
Add Comment
19 min read
OverTheWire Bandit Levels 19-34 Hints and Notes
Yulin Chen
Yulin Chen
Yulin Chen
Follow
Mar 24 '22
OverTheWire Bandit Levels 19-34 Hints and Notes
#
ctf
#
overthewire
#
hacking
#
security
5
reactions
Comments
Add Comment
12 min read
API10:2019 - Insufficient Logging & Monitoring
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Mar 19 '22
API10:2019 - Insufficient Logging & Monitoring
#
security
#
hacking
#
api
#
owasp
4
reactions
Comments
Add Comment
3 min read
CTF Writeup: UTCTF 2022
Lena
Lena
Lena
Follow
Mar 18 '22
CTF Writeup: UTCTF 2022
#
ctf
#
writeup
#
security
#
hacking
5
reactions
Comments
Add Comment
21 min read
CTF Writeup: 1337UP CTF 2022
Lena
Lena
Lena
Follow
Mar 18 '22
CTF Writeup: 1337UP CTF 2022
#
ctf
#
writeup
#
security
#
hacking
5
reactions
Comments
Add Comment
4 min read
One-click attack nima?
Wahid Abduhakimov
Wahid Abduhakimov
Wahid Abduhakimov
Follow
Mar 16 '22
One-click attack nima?
#
hacking
#
dotnet
#
uzbek
#
beginners
10
reactions
Comments
6
comments
1 min read
OverTheWire Bandit Levels 0-18 Hints and Notes
Yulin Chen
Yulin Chen
Yulin Chen
Follow
Mar 10 '22
OverTheWire Bandit Levels 0-18 Hints and Notes
#
ctf
#
overthewire
#
hacking
#
linux
5
reactions
Comments
Add Comment
8 min read
How I hacked My Neighbor's Wi-Fi 📶
Ansari
Ansari
Ansari
Follow
Mar 8 '22
How I hacked My Neighbor's Wi-Fi 📶
#
challenge
#
hacking
#
linux
#
tutorial
6
reactions
Comments
Add Comment
3 min read
API9:2019 - Improper Assets Management
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Mar 5 '22
API9:2019 - Improper Assets Management
#
api
#
security
#
owasp
#
hacking
4
reactions
Comments
Add Comment
2 min read
Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng
Thijs Boelman
Thijs Boelman
Thijs Boelman
Follow
Feb 27 '22
Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng
#
cybersecurity
#
ethicalhacking
#
hacking
#
linux
4
reactions
Comments
1
comment
3 min read
Node.js Vulnerability Cheatsheet
Vickie Li
Vickie Li
Vickie Li
Follow
for
ShiftLeft
Feb 24 '22
Node.js Vulnerability Cheatsheet
#
hacking
#
webdev
#
cybersecurity
#
node
2
reactions
Comments
Add Comment
16 min read
Security Information and Event Management (SIEM) using Microsoft Sentinel.
OULD AMARA Amine
OULD AMARA Amine
OULD AMARA Amine
Follow
Feb 17 '22
Security Information and Event Management (SIEM) using Microsoft Sentinel.
#
hacking
#
siem
#
microsoft
#
soc
9
reactions
Comments
Add Comment
15 min read
Essential linux commands for CTF, ethical hacking
Flavio Campelo
Flavio Campelo
Flavio Campelo
Follow
Feb 16 '22
Essential linux commands for CTF, ethical hacking
#
ctf
#
hacking
#
ethical
#
linux
6
reactions
Comments
Add Comment
2 min read
Useful BadUSBs: Making a brute force password cracker on Arduino
Lena
Lena
Lena
Follow
Feb 10 '22
Useful BadUSBs: Making a brute force password cracker on Arduino
#
tutorial
#
arduino
#
security
#
hacking
8
reactions
Comments
1
comment
5 min read
Npm packages hacking
Dhanush N
Dhanush N
Dhanush N
Follow
Feb 6 '22
Npm packages hacking
#
javascript
#
npm
#
node
#
hacking
5
reactions
Comments
Add Comment
3 min read
SSTI Method Confusion in Go.
pirateducky
pirateducky
pirateducky
Follow
Feb 4 '22
SSTI Method Confusion in Go.
#
go
#
hacking
#
ctf
4
reactions
Comments
Add Comment
5 min read
[ Theme ] How to customise Termux terminal
H4Ck3R
H4Ck3R
H4Ck3R
Follow
Jan 29 '22
[ Theme ] How to customise Termux terminal
#
termux
#
linux
#
termuxtheme
#
hacking
8
reactions
Comments
Add Comment
1 min read
Reverse engineering a chrome extension
Justin Garrison
Justin Garrison
Justin Garrison
Follow
Jan 27 '22
Reverse engineering a chrome extension
#
hacking
#
newsletter
#
chrome
2
reactions
Comments
Add Comment
3 min read
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns
Tobias Urban
Tobias Urban
Tobias Urban
Follow
Jan 5 '22
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns
#
tryhackme
#
hacking
#
security
#
tutorial
5
reactions
Comments
Add Comment
6 min read
Wifi-Hunter By Dark hunter 141
Ashrafi Abir
Ashrafi Abir
Ashrafi Abir
Follow
Jan 22 '22
Wifi-Hunter By Dark hunter 141
#
python
#
wifi
#
hacking
#
developer
7
reactions
Comments
Add Comment
2 min read
Unpacking js.map files
fx2301
fx2301
fx2301
Follow
Jan 14 '22
Unpacking js.map files
#
ethicalhacking
#
hacking
#
cybersecurity
#
javascript
8
reactions
Comments
Add Comment
1 min read
5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s
Tomáš Soukal
Tomáš Soukal
Tomáš Soukal
Follow
Dec 9 '21
5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s
#
rasp
#
freerasp
#
android
#
hacking
4
reactions
Comments
Add Comment
1 min read
API3:2019 - Excessive Data Exposure
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Dec 31 '21
API3:2019 - Excessive Data Exposure
#
cybersecurity
#
owasp
#
api
#
hacking
3
reactions
Comments
Add Comment
4 min read
Intigriti 1221 - XSS Challenge Writeup
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Dec 27 '21
Intigriti 1221 - XSS Challenge Writeup
#
security
#
bugbounty
#
javascript
#
hacking
7
reactions
Comments
Add Comment
5 min read
Six Things You Can Do With A VPS (plus a free $100 credit!)
darkmage
darkmage
darkmage
Follow
Dec 19 '21
Six Things You Can Do With A VPS (plus a free $100 credit!)
#
linux
#
webdev
#
hacking
#
development
3
reactions
Comments
Add Comment
3 min read
Let's Hack this Box - Writer (Writeup)
Berkcan Uçan
Berkcan Uçan
Berkcan Uçan
Follow
Dec 11 '21
Let's Hack this Box - Writer (Writeup)
#
hackthebox
#
hacking
5
reactions
Comments
Add Comment
7 min read
OWASP Updates the Top 10 Web Application Security Risks
Cdebrincat
Cdebrincat
Cdebrincat
Follow
for
ShiftLeft
Oct 26 '21
OWASP Updates the Top 10 Web Application Security Risks
#
webdev
#
informationsecurity
#
programming
#
hacking
2
reactions
Comments
Add Comment
6 min read
API1:2019 - Broken Object Level Authorization
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Nov 13 '21
API1:2019 - Broken Object Level Authorization
#
cybersecurity
#
api
#
owasp
#
hacking
4
reactions
Comments
Add Comment
2 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account