DEV Community

# hacking

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
What is a hacker and what does it mean to be one ?

What is a hacker and what does it mean to be one ?

3
Comments
2 min read
Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

Want to become Ethical Hacker? Learn Ethical Hacking with these amazing Courses

75
Comments 2
7 min read
Real-World Bug Hunting by Peter Yarowski

Real-World Bug Hunting by Peter Yarowski

12
Comments 3
3 min read
Why you should do ethical hacking anyway?

Why you should do ethical hacking anyway?

10
Comments 7
1 min read
A better way to Bruteforce

A better way to Bruteforce

3
Comments
4 min read
Repl.it Open URL Redirection Vulnerability Writeup

Repl.it Open URL Redirection Vulnerability Writeup

2
Comments
3 min read
How'd I Get Here? Exploiting Redirection

How'd I Get Here? Exploiting Redirection

3
Comments
4 min read
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

Substack Open URL Redirection / Reflected XSS Vulnerability Writeup

3
Comments
3 min read
Basic Concepts of Networking-OSI Model and TCP/IP Model

Basic Concepts of Networking-OSI Model and TCP/IP Model

9
Comments
5 min read
Get Live with Hacking 101 — Pilot

Get Live with Hacking 101 — Pilot

8
Comments
2 min read
Play around with AWK language!

Play around with AWK language!

7
Comments
1 min read
Get Victim's Exact Location Using Termux đź“Ť - 2020

Get Victim's Exact Location Using Termux đź“Ť - 2020

15
Comments
1 min read
Writeup: HackTheBox Optimum - with Metasploit

Writeup: HackTheBox Optimum - with Metasploit

5
Comments
3 min read
Writeup: HackTheBox Devel - with Metasploit

Writeup: HackTheBox Devel - with Metasploit

4
Comments
4 min read
Writeup: HackTheBox Lame - with Metasploit

Writeup: HackTheBox Lame - with Metasploit

10
Comments
5 min read
Writeup: HackTheBox Legacy - with Metasploit

Writeup: HackTheBox Legacy - with Metasploit

8
Comments
1 min read
hacking on a budget

hacking on a budget

20
Comments 1
4 min read
Nahamsec's 30K CTF

Nahamsec's 30K CTF

9
Comments
3 min read
All About Kali Linux 2019.4 New Version

All About Kali Linux 2019.4 New Version

6
Comments
2 min read
Tools for Penetration Testing

Tools for Penetration Testing

28
Comments 1
5 min read
Writeup: SANS Holiday Hack Challenge 2019

Writeup: SANS Holiday Hack Challenge 2019

7
Comments 2
16 min read
Autonomous PMK scanner and cracker.

Autonomous PMK scanner and cracker.

6
Comments
1 min read
Professional Hacker's TOP 9 Hacking Tools

Professional Hacker's TOP 9 Hacking Tools

16
Comments 4
2 min read
A Backdoor with a multitude of features

A Backdoor with a multitude of features

6
Comments
1 min read
Go-UnderCover : Simple tool to install/use Kali-Undercover on all Linux distros

Go-UnderCover : Simple tool to install/use Kali-Undercover on all Linux distros

10
Comments
1 min read
Hacking on pages in the browser

Hacking on pages in the browser

124
Comments 2
6 min read
How I built my Pwnagotchi

How I built my Pwnagotchi

21
Comments 7
3 min read
RE Week 2

RE Week 2

6
Comments
2 min read
RE Week 1

RE Week 1

9
Comments
3 min read
My First CTF Writeup : KPMG Cyber Security Challenge 2019

My First CTF Writeup : KPMG Cyber Security Challenge 2019

18
Comments
5 min read
Writeup: Derbycon 9: Bank of America CTF

Writeup: Derbycon 9: Bank of America CTF

12
Comments
34 min read
Strong password generation and hacking

Strong password generation and hacking

11
Comments 1
1 min read
Introduction to Angr

Introduction to Angr

3
Comments
4 min read
Hacker Summer Camp 2019

Hacker Summer Camp 2019

15
Comments
8 min read
Simple Remote Backdoor With Python

Simple Remote Backdoor With Python

40
Comments 11
8 min read
Hide the new Twitter sidebar: a simple, locally-hosted Chrome extension

Hide the new Twitter sidebar: a simple, locally-hosted Chrome extension

6
Comments 2
1 min read
Hacking 101

Hacking 101

26
Comments 1
8 min read
10 Useful Tools to Exploit Your Security

10 Useful Tools to Exploit Your Security

52
Comments
3 min read
Go Phish! - Spear Phishing From An Attacker's Point Of View

Go Phish! - Spear Phishing From An Attacker's Point Of View

14
Comments 1
4 min read
From beginner to submitting 5 reports to HackerOne

From beginner to submitting 5 reports to HackerOne

129
Comments 7
5 min read
Root-Me: ExploitMe – Basic Buffer Overflow

Root-Me: ExploitMe – Basic Buffer Overflow

16
Comments 1
3 min read
Break the Ice — Hardware CTF

Break the Ice — Hardware CTF

16
Comments
7 min read
Root Me: ELF-CrackPass with NSA's Ghidra

Root Me: ELF-CrackPass with NSA's Ghidra

18
Comments 6
7 min read
Phishing my company. An infosec lesson for businesses

Phishing my company. An infosec lesson for businesses

7
Comments 1
5 min read
Adventures in Hacking Electron Apps

Adventures in Hacking Electron Apps

22
Comments 6
7 min read
Keygenme or Not

Keygenme or Not

8
Comments
3 min read
Learn How to Hack, Capture the Flag for Beginners!

Learn How to Hack, Capture the Flag for Beginners!

123
Comments 3
2 min read
How I hate the term «Ethical Hacker» !

How I hate the term «Ethical Hacker» !

51
Comments 15
2 min read
Cyber Crime

Cyber Crime

8
Comments 1
1 min read
Everything about Hacking

Everything about Hacking

12
Comments 2
1 min read
The Wrong of Doing Right

The Wrong of Doing Right

18
Comments
2 min read
Wrestling Control of my Webcam

Wrestling Control of my Webcam

19
Comments 5
7 min read
The day I hacked Troy Hunt's website to delete my data

The day I hacked Troy Hunt's website to delete my data

42
Comments 1
4 min read
How to interface a nunchuck with a Raspberry Pi

How to interface a nunchuck with a Raspberry Pi

11
Comments
1 min read
GüebZine – old webzine (1998 to 2000 or 2001)

GüebZine – old webzine (1998 to 2000 or 2001)

7
Comments 3
2 min read
Revenge Hacking Is Hitting the Big Time

Revenge Hacking Is Hitting the Big Time

29
Comments 4
1 min read
A Minimal Chromebook Setup for Development & Hacking

A Minimal Chromebook Setup for Development & Hacking

80
Comments 29
7 min read
How to DOS Yourself With Argon2

How to DOS Yourself With Argon2

15
Comments
3 min read
Security Sprint: What I learnt in a CTF

Security Sprint: What I learnt in a CTF

56
Comments 5
2 min read
Tell Your Story: Has your application been hacked?

Tell Your Story: Has your application been hacked?

13
Comments 10
1 min read
loading...