DEV Community

loading...

# cybersecurity

👋 Sign in for the ability sort posts by top and latest.
Tools and Skills to be the Bug Bounty Hunting.

Tools and Skills to be the Bug Bounty Hunting.

Reactions 9 Comments
14 min read
Intellingence-Resources

Intellingence-Resources

Comments
3 min read
Manually Exploiting MS17-010 (python2 to python3)

Manually Exploiting MS17-010 (python2 to python3)

Comments
2 min read
Kemampuan IT Yang Harus Dimiliki : Di Tahun 2021 Ini

Kemampuan IT Yang Harus Dimiliki : Di Tahun 2021 Ini

Comments 2
2 min read
Twint (Twitter Intelligence)- A advanced Twitter Scrapper

Twint (Twitter Intelligence)- A advanced Twitter Scrapper

Reactions 5 Comments
5 min read
Don't try these commands in linux

Don't try these commands in linux

Reactions 5 Comments
7 min read
Game Hacking Fundamentals

Game Hacking Fundamentals

Reactions 2 Comments
1 min read
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

Reactions 7 Comments
11 min read
Introducing Tor

Introducing Tor

Reactions 7 Comments
15 min read
How Data Leaks Amplify Linkability For Hackers

How Data Leaks Amplify Linkability For Hackers

Reactions 2 Comments
4 min read
Off by One [Android Internals CTF Ex8]

Off by One [Android Internals CTF Ex8]

Reactions 3 Comments
5 min read
Wanna change the eCommerce market?

Wanna change the eCommerce market?

Reactions 1 Comments
1 min read
Crypto miners are killing free CI

Crypto miners are killing free CI

Reactions 9 Comments
3 min read
what is Trend micro antivirus security?

what is Trend micro antivirus security?

Comments
1 min read
Dissecting the PE Header [Windows PE Internals]

Dissecting the PE Header [Windows PE Internals]

Reactions 7 Comments
3 min read
Validating the PE Signature (My AV Flagged me) [Windows PE Internals]

Validating the PE Signature (My AV Flagged me) [Windows PE Internals]

Reactions 6 Comments
3 min read
Five Ways to Reduce Shadow IT Risks in the Age of Remote Work

Five Ways to Reduce Shadow IT Risks in the Age of Remote Work

Reactions 1 Comments
5 min read
How I did 1777 PLN from 100 PLN? | My first Bug Bounty

How I did 1777 PLN from 100 PLN? | My first Bug Bounty

Reactions 1 Comments
2 min read
Cybersecurity Career Path Advice: Bootcamp vs Degree

Cybersecurity Career Path Advice: Bootcamp vs Degree

Comments 2
1 min read
Bootcamp journal: PHP, SQL, tech stacks and cyber security

Bootcamp journal: PHP, SQL, tech stacks and cyber security

Reactions 2 Comments
4 min read
Stackoverflow [Android Internals CTF Ex7]

Stackoverflow [Android Internals CTF Ex7]

Reactions 5 Comments
3 min read
Validating the MZ Signature [Windows PE Internals]

Validating the MZ Signature [Windows PE Internals]

Reactions 6 Comments
3 min read
Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

Reactions 5 Comments
2 min read
What Are Sim-Swap Attacks?

What Are Sim-Swap Attacks?

Reactions 2 Comments
1 min read
Creating a Windows Project in Visual Studio [Windows PE Internals]

Creating a Windows Project in Visual Studio [Windows PE Internals]

Reactions 8 Comments
1 min read
Happy Birthday Linux!

Happy Birthday Linux!

Reactions 12 Comments 2
1 min read
ARA CTF Final Round Binary Exploitation Write Up

ARA CTF Final Round Binary Exploitation Write Up

Reactions 4 Comments
9 min read
5 in Demand Tech Skills

5 in Demand Tech Skills

Reactions 1 Comments
4 min read
Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

Reactions 2 Comments
6 min read
Using "noopener" and ”noreferrer” against Phishing Attacks

Using "noopener" and ”noreferrer” against Phishing Attacks

Reactions 5 Comments
1 min read
Neglecting cyber-security

Neglecting cyber-security

Reactions 1 Comments
2 min read
Inline Function Hooking [Android Internals CTF Ex6]

Inline Function Hooking [Android Internals CTF Ex6]

Reactions 6 Comments
6 min read
The State of Medical IoT Security and How to Shield Medical Devices from Cyberattacks

The State of Medical IoT Security and How to Shield Medical Devices from Cyberattacks

Reactions 4 Comments
9 min read
What is GDPR Compliance?

What is GDPR Compliance?

Reactions 1 Comments 2
7 min read
Tabnabbing Attacks and Prevention

Tabnabbing Attacks and Prevention

Reactions 11 Comments
7 min read
Nullifying Shellcode [Android Internals CTF Ex5]

Nullifying Shellcode [Android Internals CTF Ex5]

Reactions 3 Comments
8 min read
Shellcode [Android Internals CTF Ex4]

Shellcode [Android Internals CTF Ex4]

Reactions 5 Comments
9 min read
Size Might Matter [Android Internals CTF Ex3]

Size Might Matter [Android Internals CTF Ex3]

Reactions 3 Comments
2 min read
Try cracking me [Android Internals CTF Ex2]

Try cracking me [Android Internals CTF Ex2]

Reactions 6 Comments
2 min read
WhatsMyIntent [Android Internals CTF Ex1 ]

WhatsMyIntent [Android Internals CTF Ex1 ]

Reactions 1 Comments
2 min read
Clickjacking Attacks and Prevention

Clickjacking Attacks and Prevention

Reactions 9 Comments
4 min read
Top 13 AWS EC2 Misconfigurations To Avoid in 2021

Top 13 AWS EC2 Misconfigurations To Avoid in 2021

Reactions 3 Comments
4 min read
.NET 5: How to authenticate & authorise API's correctly

.NET 5: How to authenticate & authorise API's correctly

Reactions 18 Comments 2
7 min read
Blind XPath Injections: The Path Less Travelled

Blind XPath Injections: The Path Less Travelled

Reactions 22 Comments
5 min read
Fetch Metadata and Isolation Policies

Fetch Metadata and Isolation Policies

Reactions 6 Comments
8 min read
How long to crack that password ?

How long to crack that password ?

Reactions 1 Comments
1 min read
To Secure Today’s Code, It’s Time to Shift Left

To Secure Today’s Code, It’s Time to Shift Left

Reactions 9 Comments
6 min read
Top 8 Security Podcasts for Developers

Top 8 Security Podcasts for Developers

Reactions 6 Comments
9 min read
Quality Assurance

Quality Assurance

Comments
1 min read
Session Fixation Attacks and Prevention

Session Fixation Attacks and Prevention

Reactions 8 Comments
5 min read
Writeup: HackTheBox Netmon- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Netmon- Without Metasploit (OSCP Prep)

Comments
9 min read
How To Be Safe In a Cyber World

How To Be Safe In a Cyber World

Comments
3 min read
Is this the future of the Yubikey ?

Is this the future of the Yubikey ?

Reactions 3 Comments 2
1 min read
MITM (Man-In-The-Middle) Attacks and Prevention

MITM (Man-In-The-Middle) Attacks and Prevention

Reactions 20 Comments 8
6 min read
Where (and how) can a web developer learn more about cyber security?

Where (and how) can a web developer learn more about cyber security?

Reactions 11 Comments 2
1 min read
The Future of the IoT: the Internet of Behaviors

The Future of the IoT: the Internet of Behaviors

Reactions 3 Comments
4 min read
CISSP Certification Online Training Courses at Careerera

CISSP Certification Online Training Courses at Careerera

Comments
1 min read
Detecting Sensitive Data Leaks That Matter

Detecting Sensitive Data Leaks That Matter

Comments
6 min read
Lior Bar Yosef is a network analyst in a world of puzzles... and other things I learned recording her DevJourney (#142)

Lior Bar Yosef is a network analyst in a world of puzzles... and other things I learned recording her DevJourney (#142)

Comments
3 min read
TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

TypingDNA is launching a new typing biometrics 2FA solution to replace SMS OTP

Reactions 20 Comments 2
1 min read
loading...