DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Growth hacking for developers

Growth hacking for developers

16
Comments
4 min read
Best Way to Unlock a PDF File without Password

Best Way to Unlock a PDF File without Password

2
Comments 2
4 min read
Developer Expectation vs Reality 00:43

Developer Expectation vs Reality

10
Comments 1
1 min read
Happy Birthday Linux!

Happy Birthday Linux!

12
Comments 2
1 min read
From Burnout to RCE: Getting out of the rat race

From Burnout to RCE: Getting out of the rat race

2
Comments
15 min read
Getting started with Penetration Testing and building your own pentest methodology.

Getting started with Penetration Testing and building your own pentest methodology.

18
Comments 3
27 min read
I made a Wi-Fi controlled Owl lamp

I made a Wi-Fi controlled Owl lamp

7
Comments
3 min read
The Books that Made me a Hacker

The Books that Made me a Hacker

23
Comments 2
9 min read
This is not called Hacking ?

This is not called Hacking ?

6
Comments
3 min read
Want to learn to hack?

Want to learn to hack?

6
Comments
1 min read
TryHackMe - ToolsRUs WriteUp

TryHackMe - ToolsRUs WriteUp

7
Comments
6 min read
Tools for Static Application Security Testing

Tools for Static Application Security Testing

6
Comments
4 min read
Common Cyber Attacks

Common Cyber Attacks

7
Comments 1
8 min read
Avoid Burnout as a Programmer or Hacker

Avoid Burnout as a Programmer or Hacker

55
Comments 8
22 min read
Evil Twin Attack Example on Kali Linux

Evil Twin Attack Example on Kali Linux

7
Comments 2
5 min read
Jump into shellcode (protostar - stack5)

Jump into shellcode (protostar - stack5)

2
Comments
2 min read
Hacking my IP camera

Hacking my IP camera

2
Comments
5 min read
Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

Writeup: HackTheBox Beep - Without Metasploit (OSCP Prep)

9
Comments
3 min read
what is rainbow table ?

what is rainbow table ?

23
Comments 4
1 min read
Python is a Superpower. Industries that are using Python today

Python is a Superpower. Industries that are using Python today

3
Comments
2 min read
The Art Of User Enumeration

The Art Of User Enumeration

6
Comments 3
3 min read
Conceal - HackTheBox Writeup

Conceal - HackTheBox Writeup

7
Comments
8 min read
Phishinder: A phishing detection tool

Phishinder: A phishing detection tool

12
Comments
8 min read
A peek inside the “fallguys” malware that steals your browsing data and gaming IMs

A peek inside the “fallguys” malware that steals your browsing data and gaming IMs

4
Comments
5 min read
My experience of breaking the claim of most secure OS, Apple macOS

My experience of breaking the claim of most secure OS, Apple macOS

6
Comments 1
8 min read
Hacking is not black and white!

Hacking is not black and white!

8
Comments
5 min read
Hacking BLE Kitchen Scale

Hacking BLE Kitchen Scale

13
Comments 11
3 min read
Top 6 Web Security Take-Aways From Google CTF 2020

Top 6 Web Security Take-Aways From Google CTF 2020

12
Comments 2
8 min read
What is ethical hacking and penetration testing? Get paid to hack

What is ethical hacking and penetration testing? Get paid to hack

45
Comments 2
8 min read
WiFi Hacking: Beginners Guide

WiFi Hacking: Beginners Guide

23
Comments
4 min read
Hack The Box write up for Traceback

Hack The Box write up for Traceback

5
Comments
6 min read
Hack The Box write up for Devel

Hack The Box write up for Devel

5
Comments
5 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

3
Comments
14 min read
Photo Gallery

Photo Gallery

2
Comments 1
5 min read
What I learned hacking the Facebook Messenger Soccer game

What I learned hacking the Facebook Messenger Soccer game

8
Comments 2
7 min read
The first step of hacking and tools to help you

The first step of hacking and tools to help you

5
Comments
1 min read
What is hack the box?

What is hack the box?

3
Comments
1 min read
Website security pentesting with a funny twist

Website security pentesting with a funny twist

27
Comments
5 min read
CTF.live - Ecommerce: Web to Shell Walkthrough

CTF.live - Ecommerce: Web to Shell Walkthrough

6
Comments
6 min read
How much free the free apps are?

How much free the free apps are?

7
Comments 2
4 min read
Básico de NoSQL Injection

Básico de NoSQL Injection

8
Comments
2 min read
Looking inside Go - Reverse Engineering

Looking inside Go - Reverse Engineering

10
Comments
7 min read
CTF Hacking: What is Capture the Flag for a Beginners?

CTF Hacking: What is Capture the Flag for a Beginners?

7
Comments
3 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

15
Comments
14 min read
Let's Understand the bitcoin by trying to hack them

Let's Understand the bitcoin by trying to hack them

7
Comments 2
5 min read
Hacker Container for Kubernetes Security Assessments

Hacker Container for Kubernetes Security Assessments

4
Comments
3 min read
Hacking the antivirus: BitDefender remote code execution vulnerability

Hacking the antivirus: BitDefender remote code execution vulnerability

4
Comments 2
4 min read
Top 15 Free Hacking Tools For Ethical Hackers

Top 15 Free Hacking Tools For Ethical Hackers

17
Comments 2
1 min read
Termux tools continuation

Termux tools continuation

7
Comments
2 min read
Termux commands

Termux commands

8
Comments 3
2 min read
Modifying Go's Crypto/ssh library for CVE-2020-9283

Modifying Go's Crypto/ssh library for CVE-2020-9283

6
Comments
6 min read
Writeup: HackTheBox Blue- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Blue- Without Metasploit (OSCP Prep)

4
Comments
3 min read
Termux Tools: Enhancing Your Terminal Experience

Termux Tools: Enhancing Your Terminal Experience

7
Comments 1
3 min read
Writeup: HackTheBox Bastard - NO Metasploit

Writeup: HackTheBox Bastard - NO Metasploit

7
Comments
9 min read
Writeup: HackTheBox Arctic - with Metasploit

Writeup: HackTheBox Arctic - with Metasploit

5
Comments
3 min read
What is a hacker and what does it mean to be one ?

What is a hacker and what does it mean to be one ?

3
Comments
2 min read
Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

75
Comments 2
7 min read
Real-World Bug Hunting by Peter Yarowski

Real-World Bug Hunting by Peter Yarowski

12
Comments 3
3 min read
Why you should do ethical hacking anyway?

Why you should do ethical hacking anyway?

10
Comments 7
1 min read
A better way to Bruteforce

A better way to Bruteforce

3
Comments
4 min read
loading...