Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
hacking
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Learn Ethical hacking in 2023 (detailed overview)
Md Shihab Shumon
Md Shihab Shumon
Md Shihab Shumon
Follow
Dec 26 '22
Learn Ethical hacking in 2023 (detailed overview)
#
hacking
#
programming
#
python
#
hacktoberfest
19
reactions
Comments
2
comments
3 min read
Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”
JohnnyTime 🤓
JohnnyTime 🤓
JohnnyTime 🤓
Follow
Dec 2 '22
Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”
#
ethereum
#
solidity
#
blockchain
#
hacking
4
reactions
Comments
Add Comment
4 min read
What is JSON with padding?
sametcodes
sametcodes
sametcodes
Follow
Nov 27 '22
What is JSON with padding?
#
javascript
#
webdev
#
json
#
hacking
3
reactions
Comments
Add Comment
2 min read
Certificate Parsing with `domain-recon`
Ervin Szilagyi
Ervin Szilagyi
Ervin Szilagyi
Follow
for
recon-tools
Nov 5 '22
Certificate Parsing with `domain-recon`
#
rust
#
dns
#
opensource
#
hacking
12
reactions
Comments
Add Comment
6 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Nov 1 '22
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
#
security
#
hacking
#
github
#
opensource
9
reactions
Comments
1
comment
4 min read
Using DNS as C2 Communication - Evasive Techniques (Part 3)
Dimitar
Dimitar
Dimitar
Follow
Oct 30 '22
Using DNS as C2 Communication - Evasive Techniques (Part 3)
#
security
#
dns
#
hacking
#
malware
2
reactions
Comments
Add Comment
3 min read
Thinking Like a Hacker: AWS Keys in Private Repos
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Oct 26 '22
Thinking Like a Hacker: AWS Keys in Private Repos
#
security
#
hacking
#
aws
#
github
5
reactions
Comments
Add Comment
5 min read
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
Oct 10 '22
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM
#
hacking
#
cybersecurity
#
remote
#
ethicalhacks
1
reaction
Comments
2
comments
4 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
Dimitar
Dimitar
Dimitar
Follow
Oct 8 '22
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
#
malware
#
hacking
#
linux
#
devjournal
6
reactions
Comments
Add Comment
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability
Scofield Idehen
Scofield Idehen
Scofield Idehen
Follow
for
Hackmamba
Oct 5 '22
Top 5 Tools and Practical Steps in Checking Website Vulnerability
#
cybersecurity
#
hacking
#
cyber
#
security
7
reactions
Comments
Add Comment
5 min read
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
Ajeet Singh Raina
Ajeet Singh Raina
Ajeet Singh Raina
Follow
for
Docker
Sep 24 '22
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
#
hacktoberfest
#
developer
#
docker
#
hacking
8
reactions
Comments
Add Comment
3 min read
From App User to Tenant Admin
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 19 '22
From App User to Tenant Admin
#
opensource
#
hacking
#
bugbounty
#
api
1
reaction
Comments
Add Comment
3 min read
Logging with the administrator's user account OWASP Juice shop
I Am A Hacker
I Am A Hacker
I Am A Hacker
Follow
Sep 18 '22
Logging with the administrator's user account OWASP Juice shop
#
hacking
#
owasptop10
#
juiceshop
#
linux
9
reactions
Comments
Add Comment
5 min read
The best hacking tools in 2022
Bartosz Wójcik
Bartosz Wójcik
Bartosz Wójcik
Follow
Sep 16 '22
The best hacking tools in 2022
#
hacking
#
security
#
cybersecurity
#
reversing
7
reactions
Comments
Add Comment
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys
Thomas Segura
Thomas Segura
Thomas Segura
Follow
for
GitGuardian
Sep 12 '22
Thinking Like a Hacker: Abusing Stolen Private Keys
#
security
#
hacking
#
docker
#
rsa
7
reactions
Comments
Add Comment
4 min read
Ferramentas não-devs pra fazer sua carreira decolar
Fabiana Rodrigues
Fabiana Rodrigues
Fabiana Rodrigues
Follow
Sep 5 '22
Ferramentas não-devs pra fazer sua carreira decolar
#
beginners
#
tips
#
hacking
4
reactions
Comments
Add Comment
3 min read
Commenting == Account Takeover
Breno Vitório
Breno Vitório
Breno Vitório
Follow
Sep 3 '22
Commenting == Account Takeover
#
hacking
#
security
#
bugbounty
#
lowcode
5
reactions
Comments
Add Comment
4 min read
Breaking Down Another Phishing Attempt
Aaron Powell
Aaron Powell
Aaron Powell
Follow
Aug 25 '22
Breaking Down Another Phishing Attempt
#
security
#
hacking
Comments
Add Comment
7 min read
How to hack a .NET Core game
Oskar Mendel
Oskar Mendel
Oskar Mendel
Follow
Aug 16 '22
How to hack a .NET Core game
#
hacking
#
cpp
#
netcore
#
memory
5
reactions
Comments
2
comments
12 min read
Write-up: Git Exposed, weak password reset and account takeover.
José Vitor Alves Pignataro
José Vitor Alves Pignataro
José Vitor Alves Pignataro
Follow
Aug 2 '22
Write-up: Git Exposed, weak password reset and account takeover.
#
security
#
cybersecurity
#
hacking
#
informationsecurity
4
reactions
Comments
Add Comment
4 min read
Cracking a hashed password with hashcat
wrongbyte
wrongbyte
wrongbyte
Follow
Jun 16 '22
Cracking a hashed password with hashcat
#
security
#
hacking
31
reactions
Comments
1
comment
2 min read
Spending spring days crafting packets at NahamCon 2022
f0rked
f0rked
f0rked
Follow
for
Stack Labs
May 30 '22
Spending spring days crafting packets at NahamCon 2022
#
ctf
#
security
#
networking
#
hacking
4
reactions
Comments
Add Comment
20 min read
What is Penetration Testing ?
Ehtisham-sudo
Ehtisham-sudo
Ehtisham-sudo
Follow
May 30 '22
What is Penetration Testing ?
#
linux
#
hacking
#
security
4
reactions
Comments
1
comment
2 min read
Trends at Blackhat Asia 2022
Miguel
Miguel
Miguel
Follow
for
Sysdig
May 25 '22
Trends at Blackhat Asia 2022
#
news
#
blackhat
#
security
#
hacking
8
reactions
Comments
Add Comment
4 min read
Setting up reconftw
darkmage
darkmage
darkmage
Follow
May 19 '22
Setting up reconftw
#
hacking
#
infosec
#
bugbounty
#
linux
20
reactions
Comments
Add Comment
9 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account