DEV Community

loading...

# cybersecurity

👋 Sign in for the ability sort posts by top and latest.
Game Hacking Fundamentals

Game Hacking Fundamentals

Reactions 2 Comments
1 min read
How Data Leaks Amplify Linkability For Hackers

How Data Leaks Amplify Linkability For Hackers

Reactions 2 Comments
4 min read
Tools you need for making your own Linux distribution.

Tools you need for making your own Linux distribution.

Reactions 7 Comments
3 min read
How a Yubikey works and why you should use one

How a Yubikey works and why you should use one

Reactions 2 Comments
5 min read
Off by One [Android Internals CTF Ex8]

Off by One [Android Internals CTF Ex8]

Reactions 3 Comments
5 min read
Introducing Tor

Introducing Tor

Reactions 7 Comments
15 min read
Tools and Skills to be the Bug Bounty Hunting.

Tools and Skills to be the Bug Bounty Hunting.

Reactions 13 Comments
14 min read
Crypto miners are killing free CI

Crypto miners are killing free CI

Reactions 9 Comments
3 min read
Intellingence-Resources

Intellingence-Resources

Reactions 3 Comments
3 min read
Validating the PE Signature (My AV Flagged me) [Windows PE Internals]

Validating the PE Signature (My AV Flagged me) [Windows PE Internals]

Reactions 6 Comments
3 min read
Twint (Twitter Intelligence)- A advanced Twitter Scrapper

Twint (Twitter Intelligence)- A advanced Twitter Scrapper

Reactions 5 Comments
5 min read
Don't try these commands in linux

Don't try these commands in linux

Reactions 5 Comments
7 min read
Using "noopener" and ”noreferrer” against Phishing Attacks

Using "noopener" and ”noreferrer” against Phishing Attacks

Reactions 5 Comments
1 min read
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

Reactions 14 Comments
11 min read
Stackoverflow [Android Internals CTF Ex7]

Stackoverflow [Android Internals CTF Ex7]

Reactions 5 Comments
3 min read
Validating the MZ Signature [Windows PE Internals]

Validating the MZ Signature [Windows PE Internals]

Reactions 6 Comments
3 min read
Fetch Metadata and Isolation Policies

Fetch Metadata and Isolation Policies

Reactions 6 Comments
8 min read
Happy Birthday Linux!

Happy Birthday Linux!

Reactions 12 Comments 2
1 min read
Dissecting the PE Header [Windows PE Internals]

Dissecting the PE Header [Windows PE Internals]

Reactions 7 Comments
3 min read
The Future of the IoT: the Internet of Behaviors

The Future of the IoT: the Internet of Behaviors

Reactions 3 Comments
4 min read
Bootcamp journal: PHP, SQL, tech stacks and cyber security

Bootcamp journal: PHP, SQL, tech stacks and cyber security

Reactions 2 Comments
4 min read
Scanning for Secrets in Source Code

Scanning for Secrets in Source Code

Reactions 3 Comments
4 min read
Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

Reactions 5 Comments
2 min read
What Are Sim-Swap Attacks?

What Are Sim-Swap Attacks?

Reactions 2 Comments
1 min read
Creating a Windows Project in Visual Studio [Windows PE Internals]

Creating a Windows Project in Visual Studio [Windows PE Internals]

Reactions 8 Comments
1 min read
ARA CTF Final Round Binary Exploitation Write Up

ARA CTF Final Round Binary Exploitation Write Up

Reactions 4 Comments
9 min read
Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

Reactions 2 Comments
6 min read
Inline Function Hooking [Android Internals CTF Ex6]

Inline Function Hooking [Android Internals CTF Ex6]

Reactions 6 Comments
6 min read
The State of Medical IoT Security and How to Shield Medical Devices from Cyberattacks

The State of Medical IoT Security and How to Shield Medical Devices from Cyberattacks

Reactions 4 Comments
9 min read
Session Fixation Attacks and Prevention

Session Fixation Attacks and Prevention

Reactions 8 Comments
5 min read
Tabnabbing Attacks and Prevention

Tabnabbing Attacks and Prevention

Reactions 11 Comments
7 min read
Nullifying Shellcode [Android Internals CTF Ex5]

Nullifying Shellcode [Android Internals CTF Ex5]

Reactions 3 Comments
8 min read
Shellcode [Android Internals CTF Ex4]

Shellcode [Android Internals CTF Ex4]

Reactions 5 Comments
9 min read
Size Might Matter [Android Internals CTF Ex3]

Size Might Matter [Android Internals CTF Ex3]

Reactions 3 Comments
2 min read
Try cracking me [Android Internals CTF Ex2]

Try cracking me [Android Internals CTF Ex2]

Reactions 6 Comments
2 min read
Where (and how) can a web developer learn more about cyber security?

Where (and how) can a web developer learn more about cyber security?

Reactions 11 Comments 2
1 min read
.NET 5: How to authenticate & authorise API's correctly

.NET 5: How to authenticate & authorise API's correctly

Reactions 18 Comments 2
7 min read
Clickjacking Attacks and Prevention

Clickjacking Attacks and Prevention

Reactions 9 Comments
4 min read
Top 13 AWS EC2 Misconfigurations To Avoid in 2021

Top 13 AWS EC2 Misconfigurations To Avoid in 2021

Reactions 3 Comments
4 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

Reactions 22 Comments
5 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

Reactions 9 Comments
6 min read
Top 8 Security Podcasts for Developers

Top 8 Security Podcasts for Developers

Reactions 9 Comments
9 min read
MITM (Man-In-The-Middle) Attacks and Prevention

MITM (Man-In-The-Middle) Attacks and Prevention

Reactions 20 Comments 8
6 min read
Is this the future of the Yubikey ?

Is this the future of the Yubikey ?

Reactions 3 Comments 2
1 min read
What are IMSI Catchers and how to evade them

What are IMSI Catchers and how to evade them

Reactions 3 Comments 1
2 min read
TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

Reactions 20 Comments 2
1 min read
Nmap Basics

Nmap Basics

Reactions 3 Comments
1 min read
Cookie Security: 10 Tips To Protect Your Web Application

Cookie Security: 10 Tips To Protect Your Web Application

Reactions 12 Comments
12 min read
CORS (Cross-Origin Resource Sharing): A Complete Guide

CORS (Cross-Origin Resource Sharing): A Complete Guide

Reactions 75 Comments
10 min read
Getting started with Penetration Testing and building your own pentest methodology.

Getting started with Penetration Testing and building your own pentest methodology.

Reactions 5 Comments
27 min read
File Encrypter and Decrypter

File Encrypter and Decrypter

Reactions 7 Comments
3 min read
HSTS Header (Strict Transport Security) Explained

HSTS Header (Strict Transport Security) Explained

Reactions 7 Comments 5
6 min read
Tryhackme Blue

Tryhackme Blue

Reactions 3 Comments
1 min read
Content Security Policy Header: A Complete Guide

Content Security Policy Header: A Complete Guide

Reactions 7 Comments
15 min read
SameSite Cookies and Why You Need Them

SameSite Cookies and Why You Need Them

Reactions 8 Comments
7 min read
Putting Security in DevOps

Putting Security in DevOps

Reactions 1 Comments
1 min read
An Introdution to Networks - A TryHackMe Introductory Networking WriteUp

An Introdution to Networks - A TryHackMe Introductory Networking WriteUp

Reactions 2 Comments
15 min read
Python keylogger in 5 minutes

Python keylogger in 5 minutes

Reactions 16 Comments 2
2 min read
CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

CSRF Attacks & Prevention: How To Secure Your Web Application (2021)

Reactions 19 Comments 1
5 min read
Resources to get you started in Cybersecurity (for free).

Resources to get you started in Cybersecurity (for free).

Reactions 28 Comments
4 min read
loading...