DEV Community

loading...

# cybersecurity

👋 Sign in for the ability sort posts by top and latest.
Linux for hackers - basically this article covers for all

Linux for hackers - basically this article covers for all

Reactions 18 Comments
11 min read
Tools and Skills to be the Bug Bounty Hunting.

Tools and Skills to be the Bug Bounty Hunting.

Reactions 15 Comments
14 min read
Happy Birthday Linux!

Happy Birthday Linux!

Reactions 12 Comments 2
1 min read
Crypto miners are killing free CI

Crypto miners are killing free CI

Reactions 9 Comments
3 min read
Creating a Windows Project in Visual Studio [Windows PE Internals]

Creating a Windows Project in Visual Studio [Windows PE Internals]

Reactions 8 Comments
1 min read
Dissecting the PE Header [Windows PE Internals]

Dissecting the PE Header [Windows PE Internals]

Reactions 7 Comments
3 min read
Introducing Tor

Introducing Tor

Reactions 7 Comments
15 min read
Tools you need for making your own Linux distribution.

Tools you need for making your own Linux distribution.

Reactions 7 Comments
3 min read
Validating the PE Signature (My AV Flagged me) [Windows PE Internals]

Validating the PE Signature (My AV Flagged me) [Windows PE Internals]

Reactions 6 Comments
3 min read
Validating the MZ Signature [Windows PE Internals]

Validating the MZ Signature [Windows PE Internals]

Reactions 6 Comments
3 min read
Using "noopener" and ”noreferrer” against Phishing Attacks

Using "noopener" and ”noreferrer” against Phishing Attacks

Reactions 5 Comments
1 min read
Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

Getting a Handle to a Dynamically Linked Library [Windows PE Internals]

Reactions 5 Comments
2 min read
XSS Attacks Types on Web

XSS Attacks Types on Web

Reactions 5 Comments
1 min read
Twint (Twitter Intelligence)- A advanced Twitter Scrapper

Twint (Twitter Intelligence)- A advanced Twitter Scrapper

Reactions 5 Comments
5 min read
Stackoverflow [Android Internals CTF Ex7]

Stackoverflow [Android Internals CTF Ex7]

Reactions 5 Comments
3 min read
Don't try these commands in linux

Don't try these commands in linux

Reactions 5 Comments
7 min read
Bytesize: 3 Future Uses of Blockchain

Bytesize: 3 Future Uses of Blockchain

Reactions 4 Comments
5 min read
cyber secutiry

cyber secutiry

Reactions 4 Comments
17 min read
ARA CTF Final Round Binary Exploitation Write Up

ARA CTF Final Round Binary Exploitation Write Up

Reactions 4 Comments
9 min read
Off by One [Android Internals CTF Ex8]

Off by One [Android Internals CTF Ex8]

Reactions 3 Comments
5 min read
Intellingence-Resources

Intellingence-Resources

Reactions 3 Comments
3 min read
How Data Leaks Amplify Linkability For Hackers

How Data Leaks Amplify Linkability For Hackers

Reactions 2 Comments
4 min read
How to Create a Disaster Recovery Plan

How to Create a Disaster Recovery Plan

Reactions 2 Comments
7 min read
Immediate Steps to Strengthen Your Data Security

Immediate Steps to Strengthen Your Data Security

Reactions 2 Comments
8 min read
Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

Writeup: HackTheBox Optimum- Without Metasploit (OSCP Prep)

Reactions 2 Comments
6 min read
What Are Sim-Swap Attacks?

What Are Sim-Swap Attacks?

Reactions 2 Comments
1 min read
Bootcamp journal: PHP, SQL, tech stacks and cyber security

Bootcamp journal: PHP, SQL, tech stacks and cyber security

Reactions 2 Comments
4 min read
Game Hacking Fundamentals

Game Hacking Fundamentals

Reactions 2 Comments
1 min read
How a Yubikey works and why you should use one

How a Yubikey works and why you should use one

Reactions 2 Comments
5 min read
How I did 1777 PLN from 100 PLN? | My first Bug Bounty

How I did 1777 PLN from 100 PLN? | My first Bug Bounty

Reactions 1 Comments
2 min read
Five Ways to Reduce Shadow IT Risks in the Age of Remote Work

Five Ways to Reduce Shadow IT Risks in the Age of Remote Work

Reactions 1 Comments
5 min read
SIM Swap Fraud Prevention and the Role Mobile Network Operators Play

SIM Swap Fraud Prevention and the Role Mobile Network Operators Play

Reactions 1 Comments
1 min read
5 in Demand Tech Skills

5 in Demand Tech Skills

Reactions 1 Comments
4 min read
Wanna change the eCommerce market?

Wanna change the eCommerce market?

Reactions 1 Comments
1 min read
Neglecting cyber-security

Neglecting cyber-security

Reactions 1 Comments
2 min read
how does antivirus work?

how does antivirus work?

Comments
2 min read
How to easily earn money with NordVPN on Discord?

How to easily earn money with NordVPN on Discord?

Comments 1
1 min read
Kemampuan IT Yang Harus Dimiliki : Di Tahun 2021 Ini

Kemampuan IT Yang Harus Dimiliki : Di Tahun 2021 Ini

Comments 2
2 min read
Cybersecurity Career Path Advice: Bootcamp vs Degree

Cybersecurity Career Path Advice: Bootcamp vs Degree

Comments 2
1 min read
Manually Exploiting MS17-010 (python2 to python3)

Manually Exploiting MS17-010 (python2 to python3)

Comments
2 min read
what is Trend micro antivirus security?

what is Trend micro antivirus security?

Comments
1 min read
TryHackMe Blue

TryHackMe Blue

Comments
12 min read
loading...