Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
hacking
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Thinking Like a Hacker: AWS Keys in Private Repos
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Oct 26 '22
Thinking Like a Hacker: AWS Keys in Private Repos
#
security
#
hacking
#
aws
#
github
5
reactions
Comments
Add Comment
5 min read
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
Oct 10 '22
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
#
hacking
#
cybersecurity
#
remote
#
ethicalhacks
1
reaction
Comments
2
comments
4 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
Dimitar
Dimitar
Dimitar
Follow
Oct 8 '22
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
#
malware
#
hacking
#
linux
#
devjournal
6
reactions
Comments
Add Comment
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
for
Hackmamba
Oct 5 '22
Top 5 Tools and Practical Steps in Checking Website Vulnerability
#
cybersecurity
#
hacking
#
cyber
#
security
7
reactions
Comments
Add Comment
5 min read
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
Ajeet Singh Raina
Ajeet Singh Raina
Ajeet Singh Raina
Follow
for
Docker
Sep 24 '22
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
#
hacktoberfest
#
developer
#
docker
#
hacking
8
reactions
Comments
Add Comment
3 min read
From App User to Tenant Admin
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 19 '22
From App User to Tenant Admin
#
opensource
#
hacking
#
bugbounty
#
api
1
reaction
Comments
Add Comment
3 min read
Logging with the administrator's user account OWASP Juice shop
I Am A Hacker
I Am A Hacker
I Am A Hacker
Follow
Sep 18 '22
Logging with the administrator's user account OWASP Juice shop
#
hacking
#
owasptop10
#
juiceshop
#
linux
7
reactions
Comments
Add Comment
5 min read
The best hacking tools in 2022
Bartosz Wójcik
Bartosz Wójcik
Bartosz Wójcik
Follow
Sep 16 '22
The best hacking tools in 2022
#
hacking
#
security
#
cybersecurity
#
reversing
7
reactions
Comments
Add Comment
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Sep 12 '22
Thinking Like a Hacker: Abusing Stolen Private Keys
#
security
#
hacking
#
docker
#
rsa
7
reactions
Comments
Add Comment
4 min read
Ferramentas não-devs pra fazer sua carreira decolar
Fabiana Rodrigues
Fabiana Rodrigues
Fabiana Rodrigues
Follow
Sep 5 '22
Ferramentas não-devs pra fazer sua carreira decolar
#
beginners
#
tips
#
hacking
4
reactions
Comments
Add Comment
3 min read
Commenting == Account Takeover
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 3 '22
Commenting == Account Takeover
#
hacking
#
security
#
bugbounty
#
lowcode
5
reactions
Comments
Add Comment
4 min read
Breaking Down Another Phishing Attempt
Aaron Powell
Aaron Powell
Aaron Powell
Follow
Aug 25 '22
Breaking Down Another Phishing Attempt
#
security
#
hacking
Comments
Add Comment
7 min read
How to hack a .NET Core game
Oskar Mendel
Oskar Mendel
Oskar Mendel
Follow
Aug 16 '22
How to hack a .NET Core game
#
hacking
#
cpp
#
netcore
#
memory
5
reactions
Comments
2
comments
12 min read
Write-up: Git Exposed, weak password reset and account takeover.
José Vitor Alves Pignataro
José Vitor Alves Pignataro
José Vitor Alves Pignataro
Follow
Aug 2 '22
Write-up: Git Exposed, weak password reset and account takeover.
#
security
#
cybersecurity
#
hacking
#
informationsecurity
4
reactions
Comments
Add Comment
4 min read
Cracking a hashed password with hashcat
wrongbyte
wrongbyte
wrongbyte
Follow
Jun 16 '22
Cracking a hashed password with hashcat
#
security
#
hacking
27
reactions
Comments
1
comment
2 min read
Spending spring days crafting packets at NahamCon 2022
f0rked
f0rked
f0rked
Follow
for
Stack Labs
May 30 '22
Spending spring days crafting packets at NahamCon 2022
#
ctf
#
security
#
networking
#
hacking
4
reactions
Comments
Add Comment
20 min read
What is Penetration Testing ?
Ehtisham-sudo
Ehtisham-sudo
Ehtisham-sudo
Follow
May 30 '22
What is Penetration Testing ?
#
linux
#
hacking
#
security
4
reactions
Comments
1
comment
2 min read
Trends at Blackhat Asia 2022
Miguel
Miguel
Miguel
Follow
for
Sysdig
May 25 '22
Trends at Blackhat Asia 2022
#
news
#
blackhat
#
security
#
hacking
8
reactions
Comments
Add Comment
4 min read
Setting up reconftw
darkmage
darkmage
darkmage
Follow
May 19 '22
Setting up reconftw
#
hacking
#
infosec
#
bugbounty
#
linux
19
reactions
Comments
Add Comment
9 min read
How Can You Hack Into An Android Device 📱 In 2022?
Raghav Mrituanjaya
Raghav Mrituanjaya
Raghav Mrituanjaya
Follow
May 10 '22
How Can You Hack Into An Android Device 📱 In 2022?
#
hacking
#
cybersecurity
#
webdev
#
beginners
10
reactions
Comments
1
comment
4 min read
Insomni’Hack : un résumé des confs que nous avons vu
jeanstacklabs
jeanstacklabs
jeanstacklabs
Follow
for
Stack Labs
Apr 8 '22
Insomni’Hack : un résumé des confs que nous avons vu
#
security
#
hacking
4
reactions
Comments
Add Comment
3 min read
A Beginner's Guide to Penetration Testing (Part 2)
Hjalte Abelskov
Hjalte Abelskov
Hjalte Abelskov
Follow
for
IT Minds
May 4 '22
A Beginner's Guide to Penetration Testing (Part 2)
#
beginners
#
penetrationtesting
#
hacking
#
hackthebox
7
reactions
Comments
Add Comment
6 min read
TryHackMe(THM)-Mrrobot Writeup
Ionut
Ionut
Ionut
Follow
Apr 21 '22
TryHackMe(THM)-Mrrobot Writeup
#
security
#
cybersecurity
#
hacking
#
tryhackme
8
reactions
Comments
Add Comment
4 min read
A Beginner's Guide to Penetration Testing (Part 1)
Hjalte Abelskov
Hjalte Abelskov
Hjalte Abelskov
Follow
for
IT Minds
Apr 21 '22
A Beginner's Guide to Penetration Testing (Part 1)
#
beginners
#
penetrationtesting
#
hacking
8
reactions
Comments
Add Comment
5 min read
🚀 Space Heroes 2022 CTF write-up
Krypton
Krypton
Krypton
Follow
Apr 4 '22
🚀 Space Heroes 2022 CTF write-up
#
challenge
#
ctf
#
hacking
#
space
8
reactions
Comments
Add Comment
17 min read
OverTheWire Bandit Levels 19-34 Hints and Notes
Yulin
Yulin
Yulin
Follow
Mar 24 '22
OverTheWire Bandit Levels 19-34 Hints and Notes
#
ctf
#
overthewire
#
hacking
#
security
6
reactions
Comments
Add Comment
12 min read
API10:2019 - Insufficient Logging & Monitoring
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Mar 19 '22
API10:2019 - Insufficient Logging & Monitoring
#
security
#
hacking
#
api
#
owasp
4
reactions
Comments
Add Comment
3 min read
One-click attack nima?
Wahid Abduhakimov
Wahid Abduhakimov
Wahid Abduhakimov
Follow
Mar 16 '22
One-click attack nima?
#
hacking
#
dotnet
#
uzbek
#
beginners
10
reactions
Comments
6
comments
1 min read
OverTheWire Bandit Levels 0-18 Hints and Notes
Yulin
Yulin
Yulin
Follow
Mar 10 '22
OverTheWire Bandit Levels 0-18 Hints and Notes
#
ctf
#
overthewire
#
hacking
#
linux
6
reactions
Comments
Add Comment
8 min read
How I hacked My Neighbor's Wi-Fi 📶
Ansari
Ansari
Ansari
Follow
Mar 8 '22
How I hacked My Neighbor's Wi-Fi 📶
#
challenge
#
hacking
#
linux
#
tutorial
6
reactions
Comments
Add Comment
3 min read
API9:2019 - Improper Assets Management
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Mar 5 '22
API9:2019 - Improper Assets Management
#
api
#
security
#
owasp
#
hacking
4
reactions
Comments
Add Comment
2 min read
Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng
Thijs Boelman
Thijs Boelman
Thijs Boelman
Follow
Feb 27 '22
Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng
#
cybersecurity
#
ethicalhacking
#
hacking
#
linux
26
reactions
Comments
1
comment
3 min read
Security Information and Event Management (SIEM) using Microsoft Sentinel.
OULD AMARA Amine
OULD AMARA Amine
OULD AMARA Amine
Follow
Feb 17 '22
Security Information and Event Management (SIEM) using Microsoft Sentinel.
#
hacking
#
siem
#
microsoft
#
soc
10
reactions
Comments
1
comment
15 min read
Node.js Vulnerability Cheatsheet
Vickie Li
Vickie Li
Vickie Li
Follow
for
ShiftLeft
Feb 24 '22
Node.js Vulnerability Cheatsheet
#
hacking
#
webdev
#
cybersecurity
#
node
9
reactions
Comments
Add Comment
16 min read
Essential linux commands for CTF, ethical hacking
Flavio Campelo
Flavio Campelo
Flavio Campelo
Follow
Feb 16 '22
Essential linux commands for CTF, ethical hacking
#
ctf
#
hacking
#
ethical
#
linux
7
reactions
Comments
Add Comment
2 min read
Npm packages hacking
Dhanush N
Dhanush N
Dhanush N
Follow
Feb 6 '22
Npm packages hacking
#
javascript
#
npm
#
node
#
hacking
6
reactions
Comments
Add Comment
3 min read
SSTI Method Confusion in Go.
pirateducky
pirateducky
pirateducky
Follow
Feb 4 '22
SSTI Method Confusion in Go.
#
go
#
hacking
#
ctf
5
reactions
Comments
Add Comment
5 min read
[ Theme ] How to customise Termux terminal
H4Ck3R
H4Ck3R
H4Ck3R
Follow
Jan 29 '22
[ Theme ] How to customise Termux terminal
#
termux
#
linux
#
termuxtheme
#
hacking
9
reactions
Comments
Add Comment
1 min read
Reverse engineering a chrome extension
Justin Garrison
Justin Garrison
Justin Garrison
Follow
Jan 27 '22
Reverse engineering a chrome extension
#
hacking
#
newsletter
#
chrome
2
reactions
Comments
Add Comment
3 min read
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns
Tobias Urban
Tobias Urban
Tobias Urban
Follow
Jan 5 '22
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns
#
tryhackme
#
hacking
#
security
#
tutorial
5
reactions
Comments
Add Comment
6 min read
Wifi-Hunter By Dark hunter 141
Ashrafi Abir
Ashrafi Abir
Ashrafi Abir
Follow
Jan 22 '22
Wifi-Hunter By Dark hunter 141
#
python
#
wifi
#
hacking
#
developer
8
reactions
Comments
2
comments
2 min read
Unpacking js.map files
fx2301
fx2301
fx2301
Follow
Jan 14 '22
Unpacking js.map files
#
ethicalhacking
#
hacking
#
cybersecurity
#
javascript
10
reactions
Comments
Add Comment
1 min read
5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s
Tomáš Soukal
Tomáš Soukal
Tomáš Soukal
Follow
Dec 9 '21
5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s
#
rasp
#
freerasp
#
android
#
hacking
4
reactions
Comments
Add Comment
1 min read
API3:2019 - Excessive Data Exposure
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Dec 31 '21
API3:2019 - Excessive Data Exposure
#
cybersecurity
#
owasp
#
api
#
hacking
3
reactions
Comments
Add Comment
4 min read
Intigriti 1221 - XSS Challenge Writeup
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Dec 27 '21
Intigriti 1221 - XSS Challenge Writeup
#
security
#
bugbounty
#
javascript
#
hacking
7
reactions
Comments
Add Comment
5 min read
Six Things You Can Do With A VPS (plus a free $100 credit!)
darkmage
darkmage
darkmage
Follow
Dec 19 '21
Six Things You Can Do With A VPS (plus a free $100 credit!)
#
linux
#
webdev
#
hacking
#
development
4
reactions
Comments
Add Comment
3 min read
Let's Hack this Box - Writer (Writeup)
Berkcan Uçan
Berkcan Uçan
Berkcan Uçan
Follow
Dec 11 '21
Let's Hack this Box - Writer (Writeup)
#
hackthebox
#
hacking
5
reactions
Comments
Add Comment
7 min read
OWASP Updates the Top 10 Web Application Security Risks
Cdebrincat
Cdebrincat
Cdebrincat
Follow
for
ShiftLeft
Oct 26 '21
OWASP Updates the Top 10 Web Application Security Risks
#
webdev
#
informationsecurity
#
programming
#
hacking
2
reactions
Comments
Add Comment
6 min read
API1:2019 - Broken Object Level Authorization
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Nov 13 '21
API1:2019 - Broken Object Level Authorization
#
cybersecurity
#
api
#
owasp
#
hacking
4
reactions
Comments
Add Comment
2 min read
Introduction to the world of Cybersecurity.
Khushi Chaudhary
Khushi Chaudhary
Khushi Chaudhary
Follow
Oct 25 '21
Introduction to the world of Cybersecurity.
#
cybersecurity
#
hacking
#
tryhackme
#
security
9
reactions
Comments
Add Comment
4 min read
How to start your hacking career?
Rohit Kumar yadav
Rohit Kumar yadav
Rohit Kumar yadav
Follow
Sep 28 '21
How to start your hacking career?
#
hacking
#
cybersecurity
#
pentester
5
reactions
Comments
Add Comment
1 min read
Breaking Code and Letting Others Break My Code
dbelokon
dbelokon
dbelokon
Follow
Sep 18 '21
Breaking Code and Letting Others Break My Code
#
hacking
#
opensource
#
github
#
csharp
3
reactions
Comments
Add Comment
5 min read
Hack the Box - Explore Walkthrough
Sophie Kaelin
Sophie Kaelin
Sophie Kaelin
Follow
Sep 16 '21
Hack the Box - Explore Walkthrough
#
hackthebox
#
cybersecurity
#
hacking
#
ctf
9
reactions
Comments
7
comments
3 min read
What is Stored XSS?
Cdebrincat
Cdebrincat
Cdebrincat
Follow
for
ShiftLeft
Sep 1 '21
What is Stored XSS?
#
softwaredevelopment
#
programming
#
hacking
#
cybersecurity
3
reactions
Comments
Add Comment
5 min read
Video Search Engines
Cristian Cezar Moisés
Cristian Cezar Moisés
Cristian Cezar Moisés
Follow
Sep 8 '21
Video Search Engines
#
hack
#
hacking
#
video
#
search
2
reactions
Comments
Add Comment
1 min read
How to be a Hacker ?
Cristian Cezar Moisés
Cristian Cezar Moisés
Cristian Cezar Moisés
Follow
Sep 7 '21
How to be a Hacker ?
#
hacker
#
hacktivism
#
hacking
#
hackers
2
reactions
Comments
1
comment
1 min read
My 100 Days of Hacking !
Lindsey Fonnesbeck
Lindsey Fonnesbeck
Lindsey Fonnesbeck
Follow
Aug 30 '21
My 100 Days of Hacking !
#
hacking
#
security
#
webdev
#
100daysofcode
12
reactions
Comments
2
comments
2 min read
API Security 101: Injection
Cdebrincat
Cdebrincat
Cdebrincat
Follow
for
ShiftLeft
Aug 24 '21
API Security 101: Injection
#
softwaredevelopment
#
programming
#
api
#
hacking
3
reactions
Comments
Add Comment
6 min read
Why you should start your wargames journey?
Omar Ahmed
Omar Ahmed
Omar Ahmed
Follow
Jul 28 '21
Why you should start your wargames journey?
#
hacking
#
bash
#
linux
#
security
2
reactions
Comments
Add Comment
2 min read
How I (unintentionally) became a hacker
Dennis Kopp
Dennis Kopp
Dennis Kopp
Follow
for
Studio M - Song
Aug 4 '21
How I (unintentionally) became a hacker
#
security
#
api
#
webdev
#
hacking
38
reactions
Comments
3
comments
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account