DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hack The Box write up for Devel

Hack The Box write up for Devel

5
Comments
5 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit

2
Comments
14 min read
Photo Gallery

Photo Gallery

2
Comments 1
5 min read
What I learned hacking the Facebook Messenger Soccer game

What I learned hacking the Facebook Messenger Soccer game

7
Comments 2
7 min read
The first step of hacking and tools to help you

The first step of hacking and tools to help you

4
Comments
1 min read
What is hack the box?

What is hack the box?

3
Comments
1 min read
Website security pentesting with a funny twist

Website security pentesting with a funny twist

27
Comments
5 min read
CTF.live - Ecommerce: Web to Shell Walkthrough

CTF.live - Ecommerce: Web to Shell Walkthrough

6
Comments
6 min read
How much free the free apps are?

How much free the free apps are?

7
Comments 2
4 min read
Básico de NoSQL Injection

Básico de NoSQL Injection

8
Comments
2 min read
Looking inside Go - Reverse Engineering

Looking inside Go - Reverse Engineering

9
Comments
7 min read
CTF Hacking: What is Capture the Flag for a Beginners?

CTF Hacking: What is Capture the Flag for a Beginners?

5
Comments
3 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit

Buffer Overflow on HackTheBox Frolic - with Metasploit

15
Comments
14 min read
Let's Understand the bitcoin by trying to hack them

Let's Understand the bitcoin by trying to hack them

7
Comments 2
5 min read
Hacker Container for Kubernetes Security Assessments

Hacker Container for Kubernetes Security Assessments

4
Comments
3 min read
Hacking the antivirus: BitDefender remote code execution vulnerability

Hacking the antivirus: BitDefender remote code execution vulnerability

4
Comments 2
4 min read
Top 15 Free Hacking Tools For Ethical Hackers

Top 15 Free Hacking Tools For Ethical Hackers

17
Comments 2
1 min read
Termux tools continuation

Termux tools continuation

5
Comments
2 min read
Termux Tools: Enhancing Your Terminal Experience

Termux Tools: Enhancing Your Terminal Experience

6
Comments
3 min read
Termux commands

Termux commands

6
Comments 3
2 min read
Modifying Go's Crypto/ssh library for CVE-2020-9283

Modifying Go's Crypto/ssh library for CVE-2020-9283

6
Comments
6 min read
Writeup: HackTheBox Blue- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Blue- Without Metasploit (OSCP Prep)

4
Comments
3 min read
Writeup: HackTheBox Bastard - NO Metasploit

Writeup: HackTheBox Bastard - NO Metasploit

7
Comments
9 min read
Writeup: HackTheBox Arctic - with Metasploit

Writeup: HackTheBox Arctic - with Metasploit

5
Comments
3 min read
What is a hacker and what does it mean to be one ?

What is a hacker and what does it mean to be one ?

3
Comments
2 min read
Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

75
Comments 2
7 min read
Real-World Bug Hunting by Peter Yarowski

Real-World Bug Hunting by Peter Yarowski

12
Comments 3
3 min read
Why you should do ethical hacking anyway?

Why you should do ethical hacking anyway?

10
Comments 6
1 min read
A better way to Bruteforce

A better way to Bruteforce

3
Comments
4 min read
Repl.it Open URL Redirection Vulnerability Writeup

Repl.it Open URL Redirection Vulnerability Writeup

2
Comments
3 min read
How'd I Get Here? Exploiting Redirection

How'd I Get Here? Exploiting Redirection

3
Comments
4 min read
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

3
Comments
3 min read
Basic Concepts of Networking-OSI Model and TCP/IP Model

Basic Concepts of Networking-OSI Model and TCP/IP Model

9
Comments
5 min read
Get Live with Hacking 101 — Pilot

Get Live with Hacking 101 — Pilot

8
Comments
2 min read
Play around with AWK language!

Play around with AWK language!

7
Comments
1 min read
Get Victim's Exact Location Using Termux 📍 - 2020

Get Victim's Exact Location Using Termux 📍 - 2020

15
Comments
1 min read
Writeup: HackTheBox Optimum - with Metasploit

Writeup: HackTheBox Optimum - with Metasploit

5
Comments
3 min read
Writeup: HackTheBox Devel - with Metasploit

Writeup: HackTheBox Devel - with Metasploit

4
Comments
4 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

10
Comments
5 min read
Writeup: HackTheBox Legacy - with Metasploit

Writeup: HackTheBox Legacy - with Metasploit

8
Comments
1 min read
hacking on a budget

hacking on a budget

20
Comments 1
4 min read
Nahamsec's 30K CTF

Nahamsec's 30K CTF

9
Comments
3 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

7
Comments
16 min read
Tools for Penetration Testing

Tools for Penetration Testing

28
Comments 1
5 min read
Autonomous PMK scanner and cracker.

Autonomous PMK scanner and cracker.

6
Comments
1 min read
Professional Hacker's TOP 9 Hacking Tools

Professional Hacker's TOP 9 Hacking Tools

16
Comments 4
2 min read
A Backdoor with a multitude of features

A Backdoor with a multitude of features

6
Comments
1 min read
Go-UnderCover : Simple tool to install/use Kali-Undercover on all Linux distros

Go-UnderCover : Simple tool to install/use Kali-Undercover on all Linux distros

9
Comments
1 min read
Hacking on pages in the browser

Hacking on pages in the browser

124
Comments 2
6 min read
How I built my Pwnagotchi

How I built my Pwnagotchi

19
Comments 7
3 min read
RE Week 2

RE Week 2

6
Comments
2 min read
RE Week 1

RE Week 1

8
Comments
3 min read
My First CTF Writeup : KPMG Cyber Security Challenge 2019

My First CTF Writeup : KPMG Cyber Security Challenge 2019

18
Comments
5 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
Strong password generation and hacking

Strong password generation and hacking

11
Comments 1
1 min read
Introduction to Angr

Introduction to Angr

6
Comments
4 min read
Hacker Summer Camp 2019

Hacker Summer Camp 2019

15
Comments
8 min read
Simple Remote Backdoor With Python

Simple Remote Backdoor With Python

28
Comments 11
8 min read
Hacking 101

Hacking 101

26
Comments 1
8 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

51
Comments
3 min read
loading...