DEV Community đŸ‘©â€đŸ’»đŸ‘šâ€đŸ’»

DEV Community đŸ‘©â€đŸ’»đŸ‘šâ€đŸ’» is a community of 963,274 amazing developers

We're a place where coders share, stay up-to-date and grow their careers.

Create account Log in

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Using DNS as C2 Communication - Evasive Techniques (Part 3)

Using DNS as C2 Communication - Evasive Techniques (Part 3)

Reactions 2 Comments
3 min read
Certificate Parsing with `domain-recon`

Certificate Parsing with `domain-recon`

Reactions 12 Comments
6 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

Reactions 8 Comments 1
4 min read
Thinking Like a Hacker: AWS Keys in Private Repos

Thinking Like a Hacker: AWS Keys in Private Repos

Reactions 5 Comments
5 min read
Logging with the administrator's user account OWASP Juice shop

Logging with the administrator's user account OWASP Juice shop

Reactions 4 Comments
5 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)

Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)

Reactions 6 Comments
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability

Top 5 Tools and Practical Steps in Checking Website Vulnerability

Reactions 7 Comments
5 min read
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions

🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions

Reactions 8 Comments
3 min read
Breaking Down Another Phishing Attempt

Breaking Down Another Phishing Attempt

Comments
7 min read
From App User to Tenant Admin

From App User to Tenant Admin

Reactions 1 Comments
3 min read
The best hacking tools in 2022

The best hacking tools in 2022

Reactions 7 Comments
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

Reactions 3 Comments
4 min read
Why Rust for offensive security

Why Rust for offensive security

Reactions 4 Comments
2 min read
Ferramentas nĂŁo-devs pra fazer sua carreira decolar

Ferramentas nĂŁo-devs pra fazer sua carreira decolar

Reactions 4 Comments 1
3 min read
Write-up: Git Exposed, weak password reset and account takeover.

Write-up: Git Exposed, weak password reset and account takeover.

Reactions 3 Comments
4 min read
Commenting == Account Takeover

Commenting == Account Takeover

Reactions 5 Comments
4 min read
Bitsquatting attacks and exploitation with Rust

Bitsquatting attacks and exploitation with Rust

Reactions 10 Comments 2
2 min read
Linux: The Commands to Know

Linux: The Commands to Know

Reactions 11 Comments
3 min read
How to hack a .NET Core game

How to hack a .NET Core game

Reactions 5 Comments 2
12 min read
Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

Reactions 7 Comments
20 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

Reactions 13 Comments
2 min read
What is Penetration Testing ?

What is Penetration Testing ?

Reactions 4 Comments 1
2 min read
Trends at Blackhat Asia 2022

Trends at Blackhat Asia 2022

Reactions 8 Comments
4 min read
Setting up reconftw

Setting up reconftw

Reactions 12 Comments
9 min read
How Can You Hack Into An Android Device đŸ“± In 2022?

How Can You Hack Into An Android Device đŸ“± In 2022?

Reactions 9 Comments 1
4 min read
Insomni’Hack : un rĂ©sumĂ© des confs que nous avons vu

Insomni’Hack : un rĂ©sumĂ© des confs que nous avons vu

Reactions 4 Comments
3 min read
A Beginner's Guide to Penetration Testing (Part 2)

A Beginner's Guide to Penetration Testing (Part 2)

Reactions 7 Comments
6 min read
TryHackMe(THM)-Mrrobot Writeup

TryHackMe(THM)-Mrrobot Writeup

Reactions 8 Comments
4 min read
A Beginner's Guide to Penetration Testing (Part 1)

A Beginner's Guide to Penetration Testing (Part 1)

Reactions 8 Comments
5 min read
CTF Writeup: picoCTF 2022

CTF Writeup: picoCTF 2022

Reactions 10 Comments
40 min read
🚀 Space Heroes 2022 CTF write-up

🚀 Space Heroes 2022 CTF write-up

Reactions 6 Comments
17 min read
CTF Writeup: VishwaCTF 2022

CTF Writeup: VishwaCTF 2022

Reactions 6 Comments
19 min read
OverTheWire Bandit Levels 19-34 Hints and Notes

OverTheWire Bandit Levels 19-34 Hints and Notes

Reactions 5 Comments
12 min read
API10:2019 - Insufficient Logging & Monitoring

API10:2019 - Insufficient Logging & Monitoring

Reactions 4 Comments
3 min read
CTF Writeup: UTCTF 2022

CTF Writeup: UTCTF 2022

Reactions 5 Comments
21 min read
CTF Writeup: 1337UP CTF 2022

CTF Writeup: 1337UP CTF 2022

Reactions 5 Comments
4 min read
One-click attack nima?

One-click attack nima?

Reactions 10 Comments 6
1 min read
OverTheWire Bandit Levels 0-18 Hints and Notes

OverTheWire Bandit Levels 0-18 Hints and Notes

Reactions 5 Comments
8 min read
How I hacked My Neighbor's Wi-Fi đŸ“¶

How I hacked My Neighbor's Wi-Fi đŸ“¶

Reactions 6 Comments
3 min read
API9:2019 - Improper Assets Management

API9:2019 - Improper Assets Management

Reactions 4 Comments
2 min read
Hacking: Types, Working, and its Awareness

Hacking: Types, Working, and its Awareness

Reactions 3 Comments
8 min read
Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng

Disconnect devices from WiFi networks. Deauthentication Attack using aireplay-ng

Reactions 4 Comments
3 min read
Node.js Vulnerability Cheatsheet

Node.js Vulnerability Cheatsheet

Reactions 2 Comments
16 min read
Security Information and Event Management (SIEM) using Microsoft Sentinel.

Security Information and Event Management (SIEM) using Microsoft Sentinel.

Reactions 8 Comments
15 min read
Essential linux commands for CTF, ethical hacking

Essential linux commands for CTF, ethical hacking

Reactions 6 Comments
2 min read
Useful BadUSBs: Making a brute force password cracker on Arduino

Useful BadUSBs: Making a brute force password cracker on Arduino

Reactions 6 Comments
5 min read
Npm packages hacking

Npm packages hacking

Reactions 5 Comments
3 min read
SSTI Method Confusion in Go.

SSTI Method Confusion in Go.

Reactions 4 Comments
5 min read
[ Theme ] How to customise Termux terminal

[ Theme ] How to customise Termux terminal

Reactions 5 Comments
1 min read
Reverse engineering a chrome extension

Reverse engineering a chrome extension

Reactions 2 Comments
3 min read
Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns

Write-Up: TryHackMe Web Fundamentals - ZTH: Obscure Web Vulns

Reactions 5 Comments
6 min read
Wifi-Hunter By Dark hunter 141

Wifi-Hunter By Dark hunter 141

Reactions 7 Comments
2 min read
Unpacking js.map files

Unpacking js.map files

Reactions 7 Comments
1 min read
5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s

5 Things John Learned Fighting Hackers of His App — A must-read for PM’s and CISO’s

Reactions 4 Comments
1 min read
API3:2019 - Excessive Data Exposure

API3:2019 - Excessive Data Exposure

Reactions 3 Comments
4 min read
Intigriti 1221 - XSS Challenge Writeup

Intigriti 1221 - XSS Challenge Writeup

Reactions 6 Comments
5 min read
Six Things You Can Do With A VPS (plus a free $100 credit!)

Six Things You Can Do With A VPS (plus a free $100 credit!)

Reactions 3 Comments
3 min read
Let's Hack this Box - Writer (Writeup)

Let's Hack this Box - Writer (Writeup)

Reactions 5 Comments
7 min read
About the wifi

About the wifi

Reactions 2 Comments
1 min read
OWASP Updates the Top 10 Web Application Security Risks

OWASP Updates the Top 10 Web Application Security Risks

Reactions 2 Comments
6 min read
loading...