DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
CSS Type Casting to Numeric: tan(atan2()) Scalars

CSS Type Casting to Numeric: tan(atan2()) Scalars

33
Comments 5
5 min read
Build Your First Password Cracker

Build Your First Password Cracker

22
Comments
5 min read
The CIA hacking arsenal. Here’s what you need to know.

The CIA hacking arsenal. Here’s what you need to know.

18
Comments 3
7 min read
15 Top Platforms for Learning Cybersecurity

15 Top Platforms for Learning Cybersecurity

12
Comments
9 min read
Deciphering MalwareTech's Static Analysis Challenges [shellcode1]

Deciphering MalwareTech's Static Analysis Challenges [shellcode1]

12
Comments 2
4 min read
Building a Simple Spy Camera with Python

Building a Simple Spy Camera with Python

11
Comments 6
5 min read
RubberDuck o que Ă©, e como fazer um com o seu Arduino Leonardo (ou com esp32, RP Pico e etc)

RubberDuck o que Ă©, e como fazer um com o seu Arduino Leonardo (ou com esp32, RP Pico e etc)

10
Comments
3 min read
What is Forward Proxy and Reverse Proxy

What is Forward Proxy and Reverse Proxy

9
Comments
2 min read
Qakbot: Understand how Ransomware works

Qakbot: Understand how Ransomware works

9
Comments
5 min read
Common Password Cracking Techniques For 2024

Common Password Cracking Techniques For 2024

9
Comments
5 min read
No More Password: Passwordless Authentication

No More Password: Passwordless Authentication

9
Comments
10 min read
Scanning ports and finding network vulnerabilities using nmap

Scanning ports and finding network vulnerabilities using nmap

9
Comments
7 min read
How I unsuccessfully tried to recover my lost password

How I unsuccessfully tried to recover my lost password

8
Comments 2
12 min read
Javascript Deobfuscation

Javascript Deobfuscation

7
Comments
3 min read
Getting started with cybersecurity/ethical hacking

Getting started with cybersecurity/ethical hacking

7
Comments
6 min read
Defenders Unleashed: Vital Tools for Ethical Hacking

Defenders Unleashed: Vital Tools for Ethical Hacking

6
Comments
3 min read
Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

Unveiling the XZ Backdoor: A Deep Dive into the Shocking Supply Chain Attack

6
Comments 1
3 min read
LDAP protocol basics and the LDAP Injection attack

LDAP protocol basics and the LDAP Injection attack

5
Comments 1
4 min read
Top 10 Password Hacking Tools for 2023

Top 10 Password Hacking Tools for 2023

5
Comments
11 min read
iTerm2: your Mac's terminal, Upgraded!

iTerm2: your Mac's terminal, Upgraded!

5
Comments
5 min read
From Frustration to Efficiency: My Experience with Aliases on Mac Terminal

From Frustration to Efficiency: My Experience with Aliases on Mac Terminal

4
Comments
6 min read
Custom Local Development Domains with Apache on Debian-based Systems

Custom Local Development Domains with Apache on Debian-based Systems

4
Comments
5 min read
Install Kali NetHunter On Your Android Device

Install Kali NetHunter On Your Android Device

4
Comments 1
3 min read
Deauthentication Attack using Kali Linux

Deauthentication Attack using Kali Linux

4
Comments
12 min read
Forcing a device to disconnect from WiFi using a deauthentication attack

Forcing a device to disconnect from WiFi using a deauthentication attack

4
Comments
6 min read
How to discover the user’s IP address using Telegram.

How to discover the user’s IP address using Telegram.

3
Comments
4 min read
Common Misconceptions About TryHackMe

Common Misconceptions About TryHackMe

2
Comments
2 min read
Como descobrir o endereço IP do usuårio usando Telegram.

Como descobrir o endereço IP do usuårio usando Telegram.

2
Comments
4 min read
Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

Hashcat vs John the Ripper: A comparative benchmarking of password cracking tools 🚀

2
Comments 1
9 min read
Hackeando en 8 bits

Hackeando en 8 bits

1
Comments 2
5 min read
“Do Not Push To Production” And Other Insecure Coding, Demonstrated By An Ethical Hacker

“Do Not Push To Production” And Other Insecure Coding, Demonstrated By An Ethical Hacker

1
Comments
5 min read
Networking for offensive security {0.1}

Networking for offensive security {0.1}

1
Comments
3 min read
TCP, UDP, and the Three-Way Handshake

TCP, UDP, and the Three-Way Handshake

1
Comments
2 min read
DEF CON 31: A hot time in the Las Vegas heat and some cool days in AppSec Village

DEF CON 31: A hot time in the Las Vegas heat and some cool days in AppSec Village

1
Comments
14 min read
Hacking Wi-Fi 1: Conociendo aircrack-ng y el modo monitor

Hacking Wi-Fi 1: Conociendo aircrack-ng y el modo monitor

1
Comments
2 min read
Otimizando Wordlists para Pentests

Otimizando Wordlists para Pentests

1
Comments
7 min read
WiFi Hacking + ESP32 = WIFI32: A wireless security tool.

WiFi Hacking + ESP32 = WIFI32: A wireless security tool.

1
Comments
1 min read
Common Security Vulnerabilities in the Blockchain World

Common Security Vulnerabilities in the Blockchain World

1
Comments
4 min read
Potencia tus Pruebas de Seguridad con Diccionarios Personalizados

Potencia tus Pruebas de Seguridad con Diccionarios Personalizados

1
Comments
3 min read
How to Hack Any System with a USB: A Comprehensive Guide

How to Hack Any System with a USB: A Comprehensive Guide

1
Comments 2
3 min read
Downgrade your android device to android 10

Downgrade your android device to android 10

1
Comments 1
2 min read
How to hack http://

How to hack http://

1
Comments 1
2 min read
WormGPT

WormGPT

1
Comments
5 min read
Explorando redes com ESP32 WIFI.

Explorando redes com ESP32 WIFI.

1
Comments
9 min read
What is path travelsal vulnerability?

What is path travelsal vulnerability?

Comments
2 min read
Top 5 Hacking Distros in 2023

Top 5 Hacking Distros in 2023

Comments
3 min read
Search for sensitive data using theHarvester and h8mail tools

Search for sensitive data using theHarvester and h8mail tools

Comments
3 min read
Privilege escalation & Security Remediation For TryHackMe's Vulniversity

Privilege escalation & Security Remediation For TryHackMe's Vulniversity

Comments
5 min read
HackTheBox Misconceptions

HackTheBox Misconceptions

Comments
2 min read
What are polyglots and how to use them as a pentester

What are polyglots and how to use them as a pentester

Comments
4 min read
SYN Flood Attack

SYN Flood Attack

Comments
2 min read
Hack the System: Unveiling Cybersecurity Secrets through Documentaries

Hack the System: Unveiling Cybersecurity Secrets through Documentaries

Comments
9 min read
How to Perform a DoS Attack Every Thing You Need to Know

How to Perform a DoS Attack Every Thing You Need to Know

Comments 1
7 min read
Secarmy CTF 2.0 junior walkthrough - team krypton

Secarmy CTF 2.0 junior walkthrough - team krypton

Comments
5 min read
Ethical Hacking For Absolute Beginners: Expert Guide in 2023

Ethical Hacking For Absolute Beginners: Expert Guide in 2023

Comments
9 min read
#Les 10 Menaces Informatiques les Plus Redoutables de 2023

#Les 10 Menaces Informatiques les Plus Redoutables de 2023

Comments
8 min read
Why Do Organizations Need Ethical Hacking?

Why Do Organizations Need Ethical Hacking?

Comments
3 min read
Protect your online Browsing or business with KASM. This video is for Educational purposes!

Protect your online Browsing or business with KASM. This video is for Educational purposes!

Comments
1 min read
Mastering Nmap: Essential Commands and Examples for Network Security

Mastering Nmap: Essential Commands and Examples for Network Security

Comments
5 min read
CamPhish: Understanding and Safeguarding Your Privacy

CamPhish: Understanding and Safeguarding Your Privacy

Comments
4 min read
loading...