DEV Community

# hacker

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
BYOD or BYOB? Why Bring Your Own Device Often Means Bring Your Own Breach

BYOD or BYOB? Why Bring Your Own Device Often Means Bring Your Own Breach

Comments
2 min read
LiveShell — Interactive Reverse Shell Generator

LiveShell — Interactive Reverse Shell Generator

5
Comments 1
2 min read
My Journey into Programming: From Curiosity to Code

My Journey into Programming: From Curiosity to Code

Comments
1 min read
Threat Hunting With ZoomEye 2025

Threat Hunting With ZoomEye 2025

Comments
5 min read
Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Comments
3 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)

Boring Cybersecurity Theory: Hats (Understand Attackers)

1
Comments
5 min read
ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

1
Comments
2 min read
Guide pratique pour sécuriser votre PME contre les cybermenaces

Guide pratique pour sécuriser votre PME contre les cybermenaces

Comments
1 min read
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

1
Comments
2 min read
🧠 Metasploit Framework: The Hacker’s Swiss Army Knife 🔐💻

🧠 Metasploit Framework: The Hacker’s Swiss Army Knife 🔐💻

5
Comments
2 min read
Hacker Using Metasploit and Nmap for Offensive Security in 2025

Hacker Using Metasploit and Nmap for Offensive Security in 2025

7
Comments
1 min read
Kevin Mitnick: The Life and Legacy of the World's Most Notorious Hacker

Kevin Mitnick: The Life and Legacy of the World's Most Notorious Hacker

Comments
5 min read
Week 3 - You're not Stuck - You just skipped the Basics: What Really Happens When You Type a URL?

Week 3 - You're not Stuck - You just skipped the Basics: What Really Happens When You Type a URL?

3
Comments 4
2 min read
🚨 Cyber Attack Alert

🚨 Cyber Attack Alert

2
Comments
1 min read
The Rise of Autonomous Hacking: AI Attacks Without Hackers

The Rise of Autonomous Hacking: AI Attacks Without Hackers

Comments
2 min read
XSS URL Analysis and SQL Injection Workflow

XSS URL Analysis and SQL Injection Workflow

Comments
4 min read
Recap of the Next.js Bug That Got Apps Hacked (And How to Protect Yours)

Recap of the Next.js Bug That Got Apps Hacked (And How to Protect Yours)

1
Comments
2 min read
Censys.io

Censys.io

Comments
2 min read
Whois

Whois

Comments
1 min read
Segurança da Informação

Segurança da Informação

Comments
2 min read
How AI is Transforming Ethical Hacking and Cybersecurity

How AI is Transforming Ethical Hacking and Cybersecurity

Comments
2 min read
Why Kenyan Top Tech Companies Would Secretly Engage LIQU3D for Ethical Operations

Why Kenyan Top Tech Companies Would Secretly Engage LIQU3D for Ethical Operations

1
Comments
2 min read
🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security

🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security

2
Comments
2 min read
Como 'hackear' a linguagem de programação Ter/Terlang

Como 'hackear' a linguagem de programação Ter/Terlang

1
Comments
3 min read
LAKASA-WIFI - Wi-Fi Connection Script

LAKASA-WIFI - Wi-Fi Connection Script

Comments
1 min read
loading...