Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
exploit
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
POC — CVE-2024–10914 Command Injection Vulnerability in `name` parameter for D-Link NAS
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Nov 14
POC — CVE-2024–10914 Command Injection Vulnerability in `name` parameter for D-Link NAS
#
poc
#
exploit
#
vulnerabilities
#
cybersecurity
5
 reactions
Comments
Add Comment
2 min read
Journey to understand format string attack (Part 2)
Alexander Lee
Alexander Lee
Alexander Lee
Follow
Oct 4
Journey to understand format string attack (Part 2)
#
formatstring
#
exploit
Comments
Add Comment
6 min read
Journey to understand format string attack (Part 1)
Alexander Lee
Alexander Lee
Alexander Lee
Follow
Oct 4
Journey to understand format string attack (Part 1)
#
formatstring
#
exploit
#
softwarevulnerability
Comments
Add Comment
5 min read
Jenkins File Read Vulnerability - CVE-2024-23897
Very Lazy Tech
Very Lazy Tech
Very Lazy Tech
Follow
Oct 1
Jenkins File Read Vulnerability - CVE-2024-23897
#
cybersecurity
#
exploit
#
vulnerabilities
#
jenkins
2
 reactions
Comments
Add Comment
2 min read
Exploiting Smart Contracts - Strict Equality
Jason Schwarz
Jason Schwarz
Jason Schwarz
Follow
Jul 15
Exploiting Smart Contracts - Strict Equality
#
exploit
#
solidity
44
 reactions
Comments
Add Comment
7 min read
Exploiting Smart Contracts - Performing Reentrancy Attacks in Solidity
Jason Schwarz
Jason Schwarz
Jason Schwarz
Follow
Jun 24
Exploiting Smart Contracts - Performing Reentrancy Attacks in Solidity
#
exploit
#
solidity
#
reentrancy
32
 reactions
Comments
2
 comments
5 min read
Web Vulnerabilities: SQL Injections
Suprim Devkota
Suprim Devkota
Suprim Devkota
Follow
Dec 11 '23
Web Vulnerabilities: SQL Injections
#
cybersecurity
#
learning
#
sql
#
exploit
1
 reaction
Comments
4
 comments
3 min read
Guia de passo a passo para escrever um exploit.
Higor Diego
Higor Diego
Higor Diego
Follow
Nov 20 '23
Guia de passo a passo para escrever um exploit.
#
security
#
exploit
#
tutorial
#
owned
5
 reactions
Comments
Add Comment
11 min read
So i tried to make a simple command line webshell that executes commands via an http request to avoid waf...
Ophellia
Ophellia
Ophellia
Follow
Dec 8 '22
So i tried to make a simple command line webshell that executes commands via an http request to avoid waf...
#
exploit
#
webshell
5
 reactions
Comments
1
 comment
1 min read
A simple buffer overflow exploit
maximilian feldthusen
maximilian feldthusen
maximilian feldthusen
Follow
Feb 3 '22
A simple buffer overflow exploit
#
exploit
#
programming
#
security
#
cpp
4
 reactions
Comments
Add Comment
4 min read
This code Crashes chrome tab #1
Mafee7
Mafee7
Mafee7
Follow
Jun 27 '21
This code Crashes chrome tab #1
#
javascript
#
chrome
#
exploit
6
 reactions
Comments
Add Comment
1 min read
14 Software Security Terms You Should Know
SmartScanner
SmartScanner
SmartScanner
Follow
Feb 16 '21
14 Software Security Terms You Should Know
#
security
#
vulnerability
#
exploit
#
0day
7
 reactions
Comments
Add Comment
3 min read
Google drops bombshell zero day exploit affecting Windows 10
Dan
Dan
Dan
Follow
Oct 31 '20
Google drops bombshell zero day exploit affecting Windows 10
#
news
#
microsoft
#
exploit
#
security
6
 reactions
Comments
Add Comment
2 min read
Clickjacking Using Iframes: A Case Study đź‘€
Stanley Lim
Stanley Lim
Stanley Lim
Follow
Jul 19 '20
Clickjacking Using Iframes: A Case Study đź‘€
#
security
#
clickjacking
#
exploit
#
javascript
8
 reactions
Comments
1
 comment
9 min read
Modifying Go's Crypto/ssh library for CVE-2020-9283
Chris
Chris
Chris
Follow
Jun 8 '20
Modifying Go's Crypto/ssh library for CVE-2020-9283
#
go
#
exploit
#
security
#
hacking
6
 reactions
Comments
Add Comment
6 min read
Root-Me: ExploitMe – Basic Buffer Overflow
Nucu Labs
Nucu Labs
Nucu Labs
Follow
Mar 31 '19
Root-Me: ExploitMe – Basic Buffer Overflow
#
security
#
exploit
#
hacking
#
reverseengineering
16
 reactions
Comments
1
 comment
3 min read
Bypassing Recaptcha
Aditya Varma
Aditya Varma
Aditya Varma
Follow
Mar 15 '19
Bypassing Recaptcha
#
recaptcha
#
bots
#
papers
#
exploit
11
 reactions
Comments
2
 comments
3 min read
This is how Meltdown works
Isaac Lyman
Isaac Lyman
Isaac Lyman
Follow
Jan 5 '18
This is how Meltdown works
#
explainlikeimfive
#
exploit
#
bug
#
security
215
 reactions
Comments
26
 comments
5 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account