Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
hacking
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?
Jsquared
Jsquared
Jsquared
Follow
Apr 17 '23
Password Cracking: What is a Rainbow Table Attack and how do I prevent it?
#
cybersecurity
#
security
#
penetrationtesting
#
hacking
7
reactions
Comments
Add Comment
4 min read
Hacking 101: Common Attacks and How to Stop Them
Magerman714
Magerman714
Magerman714
Follow
Mar 5 '23
Hacking 101: Common Attacks and How to Stop Them
#
hacking
#
security
#
database
#
sql
1
reaction
Comments
Add Comment
5 min read
Get Network Passwords
Muhammad Usman
Muhammad Usman
Muhammad Usman
Follow
Mar 19 '23
Get Network Passwords
#
hacking
#
network
2
reactions
Comments
Add Comment
2 min read
Hack WiFi using Kali Linux
Nitin Kumar
Nitin Kumar
Nitin Kumar
Follow
Feb 6 '23
Hack WiFi using Kali Linux
#
kalilinux
#
wifi
#
hackwifi
#
hacking
Comments
Add Comment
3 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 1]
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Jan 26 '23
Protegendo sua API NodeJs contra ReDos Attack[Parte 1]
#
node
#
security
#
hacking
#
api
2
reactions
Comments
Add Comment
5 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 2]
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Jan 26 '23
Protegendo sua API NodeJs contra ReDos Attack[Parte 2]
#
node
#
security
#
hacking
#
api
1
reaction
Comments
Add Comment
6 min read
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Jan 26 '23
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]
#
node
#
security
#
hacking
#
api
1
reaction
Comments
Add Comment
5 min read
ChatGPT can be used to hack you — Experts warn
Ibrahim Zahir
Ibrahim Zahir
Ibrahim Zahir
Follow
Jan 15 '23
ChatGPT can be used to hack you — Experts warn
#
chatgpt
#
cybersecurity
#
openai
#
hacking
2
reactions
Comments
Add Comment
6 min read
$350 XSS in 15 minutes
Anton
Anton
Anton
Follow
Dec 28 '22
$350 XSS in 15 minutes
#
cybersecurity
#
hacking
#
xss
#
bugbounty
2
reactions
Comments
Add Comment
3 min read
Learn Ethical hacking in 2023 (detailed overview)
Md Shihab Shumon
Md Shihab Shumon
Md Shihab Shumon
Follow
Dec 26 '22
Learn Ethical hacking in 2023 (detailed overview)
#
hacking
#
programming
#
python
#
hacktoberfest
19
reactions
Comments
2
comments
3 min read
Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”
JohnnyTime 🤓
JohnnyTime 🤓
JohnnyTime 🤓
Follow
Dec 2 '22
Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”
#
ethereum
#
solidity
#
blockchain
#
hacking
4
reactions
Comments
Add Comment
4 min read
How to setup Metasploitable in a Mac with M1 chip
merlos
merlos
merlos
Follow
Nov 30 '22
How to setup Metasploitable in a Mac with M1 chip
#
security
#
mac
#
tutorial
#
hacking
7
reactions
Comments
5
comments
5 min read
Replaying network requests on puppeteer
sametcodes
sametcodes
sametcodes
Follow
Nov 28 '22
Replaying network requests on puppeteer
#
puppeteer
#
javascript
#
headless
#
hacking
2
reactions
Comments
Add Comment
3 min read
What is JSON with padding?
sametcodes
sametcodes
sametcodes
Follow
Nov 27 '22
What is JSON with padding?
#
javascript
#
webdev
#
json
#
hacking
3
reactions
Comments
Add Comment
2 min read
Certificate Parsing with `domain-recon`
Ervin Szilagyi
Ervin Szilagyi
Ervin Szilagyi
Follow
for
recon-tools
Nov 5 '22
Certificate Parsing with `domain-recon`
#
rust
#
dns
#
opensource
#
hacking
12
reactions
Comments
Add Comment
6 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Nov 1 '22
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
#
security
#
hacking
#
github
#
opensource
9
reactions
Comments
1
comment
4 min read
Using DNS as C2 Communication - Evasive Techniques (Part 3)
Dimitar
Dimitar
Dimitar
Follow
Oct 30 '22
Using DNS as C2 Communication - Evasive Techniques (Part 3)
#
security
#
dns
#
hacking
#
malware
2
reactions
Comments
Add Comment
3 min read
Thinking Like a Hacker: AWS Keys in Private Repos
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Oct 26 '22
Thinking Like a Hacker: AWS Keys in Private Repos
#
security
#
hacking
#
aws
#
github
5
reactions
Comments
Add Comment
5 min read
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
Oct 10 '22
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
#
hacking
#
cybersecurity
#
remote
#
ethicalhacks
1
reaction
Comments
2
comments
4 min read
Logging with the administrator's user account OWASP Juice shop
I Am A Hacker
I Am A Hacker
I Am A Hacker
Follow
Sep 18 '22
Logging with the administrator's user account OWASP Juice shop
#
hacking
#
owasptop10
#
juiceshop
#
linux
4
reactions
Comments
Add Comment
5 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
Dimitar
Dimitar
Dimitar
Follow
Oct 8 '22
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
#
malware
#
hacking
#
linux
#
devjournal
6
reactions
Comments
Add Comment
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
for
Hackmamba
Oct 5 '22
Top 5 Tools and Practical Steps in Checking Website Vulnerability
#
cybersecurity
#
hacking
#
cyber
#
security
7
reactions
Comments
Add Comment
5 min read
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
Ajeet Singh Raina
Ajeet Singh Raina
Ajeet Singh Raina
Follow
for
Docker
Sep 24 '22
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
#
hacktoberfest
#
developer
#
docker
#
hacking
8
reactions
Comments
Add Comment
3 min read
From App User to Tenant Admin
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 19 '22
From App User to Tenant Admin
#
opensource
#
hacking
#
bugbounty
#
api
1
reaction
Comments
Add Comment
3 min read
The best hacking tools in 2022
Bartosz Wójcik
Bartosz Wójcik
Bartosz Wójcik
Follow
Sep 16 '22
The best hacking tools in 2022
#
hacking
#
security
#
cybersecurity
#
reversing
7
reactions
Comments
Add Comment
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Sep 12 '22
Thinking Like a Hacker: Abusing Stolen Private Keys
#
security
#
hacking
#
docker
#
rsa
7
reactions
Comments
Add Comment
4 min read
Ferramentas não-devs pra fazer sua carreira decolar
Fabiana Rodrigues
Fabiana Rodrigues
Fabiana Rodrigues
Follow
Sep 5 '22
Ferramentas não-devs pra fazer sua carreira decolar
#
beginners
#
tips
#
hacking
4
reactions
Comments
Add Comment
3 min read
Commenting == Account Takeover
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 3 '22
Commenting == Account Takeover
#
hacking
#
security
#
bugbounty
#
lowcode
5
reactions
Comments
Add Comment
4 min read
Linux: The Commands to Know
DevManas13
DevManas13
DevManas13
Follow
Aug 25 '22
Linux: The Commands to Know
#
linux
#
beginners
#
tutorial
#
hacking
11
reactions
Comments
Add Comment
3 min read
Breaking Down Another Phishing Attempt
Aaron Powell
Aaron Powell
Aaron Powell
Follow
Aug 25 '22
Breaking Down Another Phishing Attempt
#
security
#
hacking
Comments
Add Comment
7 min read
How to hack a .NET Core game
Oskar Mendel
Oskar Mendel
Oskar Mendel
Follow
Aug 16 '22
How to hack a .NET Core game
#
hacking
#
cpp
#
netcore
#
memory
5
reactions
Comments
2
comments
12 min read
Write-up: Git Exposed, weak password reset and account takeover.
José Vitor Alves Pignataro
José Vitor Alves Pignataro
José Vitor Alves Pignataro
Follow
Aug 2 '22
Write-up: Git Exposed, weak password reset and account takeover.
#
security
#
cybersecurity
#
hacking
#
informationsecurity
4
reactions
Comments
Add Comment
4 min read
Cracking a hashed password with hashcat
wrongbyte
wrongbyte
wrongbyte
Follow
Jun 16 '22
Cracking a hashed password with hashcat
#
security
#
hacking
13
reactions
Comments
1
comment
2 min read
Spending spring days crafting packets at NahamCon 2022
f0rked
f0rked
f0rked
Follow
for
Stack Labs
May 30 '22
Spending spring days crafting packets at NahamCon 2022
#
ctf
#
security
#
networking
#
hacking
4
reactions
Comments
Add Comment
20 min read
What is Penetration Testing ?
Ehtisham-sudo
Ehtisham-sudo
Ehtisham-sudo
Follow
May 30 '22
What is Penetration Testing ?
#
linux
#
hacking
#
security
4
reactions
Comments
1
comment
2 min read
Trends at Blackhat Asia 2022
Miguel
Miguel
Miguel
Follow
for
Sysdig
May 25 '22
Trends at Blackhat Asia 2022
#
news
#
blackhat
#
security
#
hacking
8
reactions
Comments
Add Comment
4 min read
Setting up reconftw
darkmage
darkmage
darkmage
Follow
May 19 '22
Setting up reconftw
#
hacking
#
infosec
#
bugbounty
#
linux
12
reactions
Comments
Add Comment
9 min read
How Can You Hack Into An Android Device 📱 In 2022?
Raghav Mrituanjaya
Raghav Mrituanjaya
Raghav Mrituanjaya
Follow
May 10 '22
How Can You Hack Into An Android Device 📱 In 2022?
#
hacking
#
cybersecurity
#
webdev
#
beginners
9
reactions
Comments
1
comment
4 min read
Insomni’Hack : un résumé des confs que nous avons vu
jeanstacklabs
jeanstacklabs
jeanstacklabs
Follow
for
Stack Labs
Apr 8 '22
Insomni’Hack : un résumé des confs que nous avons vu
#
security
#
hacking
4
reactions
Comments
Add Comment
3 min read
A Beginner's Guide to Penetration Testing (Part 2)
Hjalte Abelskov
Hjalte Abelskov
Hjalte Abelskov
Follow
for
IT Minds
May 4 '22
A Beginner's Guide to Penetration Testing (Part 2)
#
beginners
#
penetrationtesting
#
hacking
#
hackthebox
7
reactions
Comments
Add Comment
6 min read
TryHackMe(THM)-Mrrobot Writeup
Ionut
Ionut
Ionut
Follow
Apr 21 '22
TryHackMe(THM)-Mrrobot Writeup
#
security
#
cybersecurity
#
hacking
#
tryhackme
8
reactions
Comments
Add Comment
4 min read
A Beginner's Guide to Penetration Testing (Part 1)
Hjalte Abelskov
Hjalte Abelskov
Hjalte Abelskov
Follow
for
IT Minds
Apr 21 '22
A Beginner's Guide to Penetration Testing (Part 1)
#
beginners
#
penetrationtesting
#
hacking
8
reactions
Comments
Add Comment
5 min read
🚀 Space Heroes 2022 CTF write-up
Krypton
Krypton
Krypton
Follow
Apr 4 '22
🚀 Space Heroes 2022 CTF write-up
#
challenge
#
ctf
#
hacking
#
space
6
reactions
Comments
Add Comment
17 min read
OverTheWire Bandit Levels 19-34 Hints and Notes
Yulin
Yulin
Yulin
Follow
Mar 24 '22
OverTheWire Bandit Levels 19-34 Hints and Notes
#
ctf
#
overthewire
#
hacking
#
security
5
reactions
Comments
Add Comment
12 min read
API10:2019 - Insufficient Logging & Monitoring
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Mar 19 '22
API10:2019 - Insufficient Logging & Monitoring
#
security
#
hacking
#
api
#
owasp
4
reactions
Comments
Add Comment
3 min read
One-click attack nima?
Wahid Abduhakimov
Wahid Abduhakimov
Wahid Abduhakimov
Follow
Mar 16 '22
One-click attack nima?
#
hacking
#
dotnet
#
uzbek
#
beginners
10
reactions
Comments
6
comments
1 min read
OverTheWire Bandit Levels 0-18 Hints and Notes
Yulin
Yulin
Yulin
Follow
Mar 10 '22
OverTheWire Bandit Levels 0-18 Hints and Notes
#
ctf
#
overthewire
#
hacking
#
linux
5
reactions
Comments
Add Comment
8 min read
How I hacked My Neighbor's Wi-Fi 📶
Ansari
Ansari
Ansari
Follow
Mar 8 '22
How I hacked My Neighbor's Wi-Fi 📶
#
challenge
#
hacking
#
linux
#
tutorial
6
reactions
Comments
Add Comment
3 min read
API9:2019 - Improper Assets Management
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Mar 5 '22
API9:2019 - Improper Assets Management
#
api
#
security
#
owasp
#
hacking
4
reactions
Comments
Add Comment
2 min read
Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng
Thijs Boelman
Thijs Boelman
Thijs Boelman
Follow
Feb 27 '22
Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng
#
cybersecurity
#
ethicalhacking
#
hacking
#
linux
4
reactions
Comments
1
comment
3 min read
Node.js Vulnerability Cheatsheet
Vickie Li
Vickie Li
Vickie Li
Follow
for
ShiftLeft
Feb 24 '22
Node.js Vulnerability Cheatsheet
#
hacking
#
webdev
#
cybersecurity
#
node
2
reactions
Comments
Add Comment
16 min read
Security Information and Event Management (SIEM) using Microsoft Sentinel.
OULD AMARA Amine
OULD AMARA Amine
OULD AMARA Amine
Follow
Feb 17 '22
Security Information and Event Management (SIEM) using Microsoft Sentinel.
#
hacking
#
siem
#
microsoft
#
soc
9
reactions
Comments
Add Comment
15 min read
Essential linux commands for CTF, ethical hacking
Flavio Campelo
Flavio Campelo
Flavio Campelo
Follow
Feb 16 '22
Essential linux commands for CTF, ethical hacking
#
ctf
#
hacking
#
ethical
#
linux
6
reactions
Comments
Add Comment
2 min read
Npm packages hacking
Dhanush N
Dhanush N
Dhanush N
Follow
Feb 6 '22
Npm packages hacking
#
javascript
#
npm
#
node
#
hacking
5
reactions
Comments
Add Comment
3 min read
SSTI Method Confusion in Go.
pirateducky
pirateducky
pirateducky
Follow
Feb 4 '22
SSTI Method Confusion in Go.
#
go
#
hacking
#
ctf
4
reactions
Comments
Add Comment
5 min read
[ Theme ] How to customise Termux terminal
H4Ck3R
H4Ck3R
H4Ck3R
Follow
Jan 29 '22
[ Theme ] How to customise Termux terminal
#
termux
#
linux
#
termuxtheme
#
hacking
8
reactions
Comments
Add Comment
1 min read
Reverse engineering a chrome extension
Justin Garrison
Justin Garrison
Justin Garrison
Follow
Jan 27 '22
Reverse engineering a chrome extension
#
hacking
#
newsletter
#
chrome
2
reactions
Comments
Add Comment
3 min read
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns
Tobias Urban
Tobias Urban
Tobias Urban
Follow
Jan 5 '22
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns
#
tryhackme
#
hacking
#
security
#
tutorial
5
reactions
Comments
Add Comment
6 min read
Wifi-Hunter By Dark hunter 141
Ashrafi Abir
Ashrafi Abir
Ashrafi Abir
Follow
Jan 22 '22
Wifi-Hunter By Dark hunter 141
#
python
#
wifi
#
hacking
#
developer
7
reactions
Comments
Add Comment
2 min read
Unpacking js.map files
fx2301
fx2301
fx2301
Follow
Jan 14 '22
Unpacking js.map files
#
ethicalhacking
#
hacking
#
cybersecurity
#
javascript
8
reactions
Comments
Add Comment
1 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account