DEV Community

# pentesting

Offensive security techniques and methodologies for penetration testing.

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
How to pass the PNPT (2026)

How to pass the PNPT (2026)

Comments
13 min read
Hacking Ético

Hacking Ético

Comments
1 min read
🛡️Penetration Testing Services Agreement (Beginner-Friendly Guide + Open Template)

🛡️Penetration Testing Services Agreement (Beginner-Friendly Guide + Open Template)

4
Comments
4 min read
Stop Googling Reverse Shells: Meet oh-my-shells

Stop Googling Reverse Shells: Meet oh-my-shells

Comments
5 min read
Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

Automating Ransomware Detection in Under 5 Minutes (Scripts, Heuristics, and Playbooks)

1
Comments
4 min read
Smashing HTB’s ‘Dancing’ with SMB Misconfigurations

Smashing HTB’s ‘Dancing’ with SMB Misconfigurations

Comments
2 min read
RootMe | TryHackMe | Spanish

RootMe | TryHackMe | Spanish

1
Comments
4 min read
Pickle Rick | TryHackMe | Spanish

Pickle Rick | TryHackMe | Spanish

1
Comments
4 min read
Exploiting HTB’s ‘Redeemer’ Box with Redis Misconfiguration

Exploiting HTB’s ‘Redeemer’ Box with Redis Misconfiguration

1
Comments
2 min read
TryHackMe Smol Walkthrough: Step-by-Step Guide to Exploitation & Privilege Escalation

TryHackMe Smol Walkthrough: Step-by-Step Guide to Exploitation & Privilege Escalation

Comments
9 min read
Lo-Fi | TryHackMe | Spanish

Lo-Fi | TryHackMe | Spanish

2
Comments
2 min read
Automating Network Packet Capture for an Ethical Hacking Robot

Automating Network Packet Capture for an Ethical Hacking Robot

Comments
3 min read
Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis

Mastering TCPDump & Python for Ethical Hacking: Network Packet Analysis

4
Comments
4 min read
How to Install BlackArch on Top of Arch Linux 🖤🐧

How to Install BlackArch on Top of Arch Linux 🖤🐧

8
Comments 2
2 min read
Harder HTB: Using only the terminal

Harder HTB: Using only the terminal

Comments
3 min read
Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview

Ethical Hacking, Penetration Testing, and Web Security: A Comprehensive Overview

2
Comments 1
3 min read
Exploring the Exploit Database Platform: A Vital Resource for Cybersecurity

Exploring the Exploit Database Platform: A Vital Resource for Cybersecurity

1
Comments
2 min read
Forensic Analysis of AWS EBS Volumes: Pentesting Storage

Forensic Analysis of AWS EBS Volumes: Pentesting Storage

Comments
8 min read
Hacking a Server in Three Acts

Hacking a Server in Three Acts

Comments
4 min read
Web App Pentesting on AWS: A Comprehensive Guide

Web App Pentesting on AWS: A Comprehensive Guide

Comments
11 min read
Understanding Cross-Site Scripting (XSS) Vulnerabilities

Understanding Cross-Site Scripting (XSS) Vulnerabilities

Comments
4 min read
Picked The Red Pill

Picked The Red Pill

Comments
5 min read
Hardening The Home Lab

Hardening The Home Lab

12
Comments
3 min read
Docker explained for pentesters

Docker explained for pentesters

Comments 1
7 min read
Getting Started with Penetration Testing

Getting Started with Penetration Testing

1
Comments
3 min read
loading...