Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
DEV Community
is a community of 853,399 amazing developers
We're a place where coders share, stay up-to-date and grow their careers.
Create account
Log in
Home
Listings
Podcasts
Videos
Tags
FAQ
Forem Shop
Sponsors
About
Contact
Other
Code of Conduct
Privacy Policy
Terms of use
Twitter
Facebook
Github
Instagram
Twitch
#
infosec
Follow
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Setting up reconftw
darkmage
darkmage
darkmage
Follow
May 19
Setting up reconftw
#
hacking
#
infosec
#
bugbounty
#
linux
Reactions
9
 reactions
Comments
Add Comment
9 min read
Save
Saved
Ohjelmistokehittäjästä eettiseksi hakkeriksi
minjakoodaa
minjakoodaa
minjakoodaa
Follow
Mar 29
Ohjelmistokehittäjästä eettiseksi hakkeriksi
#
career
#
security
#
womenintech
#
infosec
Reactions
3
 reactions
Comments
Add Comment
2 min read
Save
Saved
Simulating a Phishing Attack Against Your Company
Joe Mainwaring
Joe Mainwaring
Joe Mainwaring
Follow
Mar 30
Simulating a Phishing Attack Against Your Company
#
infosec
#
security
Reactions
5
 reactions
Comments
Add Comment
3 min read
Save
Saved
Where all DEVs fail in Security
Theodoros Danos
Theodoros Danos
Theodoros Danos
Follow
Mar 28
Where all DEVs fail in Security
#
infosec
#
webdev
#
programming
#
backend
Reactions
6
 reactions
Comments
Add Comment
2 min read
Save
Saved
Bench (and choose) Java-8 docker images with anchore/grype
adriens
adriens
adriens
Follow
for
opt-nc
Apr 25
Bench (and choose) Java-8 docker images with anchore/grype
#
docker
#
security
#
devsecops
#
infosec
Reactions
7
 reactions
Comments
2
 comments
4 min read
Save
Saved
From Software Developer to Ethical Hacker
whatminjacodes [she/they]
whatminjacodes [she/they]
whatminjacodes [she/they]
Follow
Mar 29
From Software Developer to Ethical Hacker
#
career
#
security
#
womenintech
#
infosec
Reactions
13
 reactions
Comments
Add Comment
3 min read
Save
Saved
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More
Deepfence
Deepfence
Deepfence
Follow
Mar 15
ThreatMapper 1.3.0: Now with Secret Scanning, Runtime SBOMs, and More
#
sbom
#
devsecops
#
infosec
#
appsec
Reactions
7
 reactions
Comments
Add Comment
5 min read
Save
Saved
Reconmap 1.1.0 release notes
Santiago L
Santiago L
Santiago L
Follow
for
Reconmap
Mar 4
Reconmap 1.1.0 release notes
#
vulnerability
#
pentesting
#
infosec
#
opensource
Reactions
5
 reactions
Comments
Add Comment
2 min read
Save
Saved
I did a few things at STM CTF 2018 Prelims
Ata Kuyumcu
Ata Kuyumcu
Ata Kuyumcu
Follow
Jan 17
I did a few things at STM CTF 2018 Prelims
#
ctf
#
python
#
infosec
Reactions
6
 reactions
Comments
Add Comment
6 min read
Save
Saved
Horrifying Vulnerabilities in the Death/Birth Certificate System
Derek Ardolf
Derek Ardolf
Derek Ardolf
Follow
Nov 23 '21
Horrifying Vulnerabilities in the Death/Birth Certificate System
#
security
#
infosec
#
defcon
#
cybersecurity
Reactions
4
 reactions
Comments
Add Comment
2 min read
Save
Saved
A Checklist to Quickly Evaluate SaaS Security
Patrick Walsh
Patrick Walsh
Patrick Walsh
Follow
Sep 27 '21
A Checklist to Quickly Evaluate SaaS Security
#
saas
#
security
#
infosec
#
evaluation
Reactions
3
 reactions
Comments
Add Comment
4 min read
Save
Saved
How to Fix Clickjacking on NGINX Server in 6 Simple Steps🔥
Keshav Malik
Keshav Malik
Keshav Malik
Follow
Sep 26 '21
How to Fix Clickjacking on NGINX Server in 6 Simple Steps🔥
#
development
#
infosec
#
nginx
#
clickjacking
Reactions
7
 reactions
Comments
2
 comments
2 min read
Save
Saved
How to list Azure VM potentially affected by the OMI RCE
Olivier Miossec
Olivier Miossec
Olivier Miossec
Follow
Sep 17 '21
How to list Azure VM potentially affected by the OMI RCE
#
azure
#
infosec
#
security
#
omi
Reactions
4
 reactions
Comments
1
 comment
1 min read
Save
Saved
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 16 '21
AzureFunBytes Episode 57 - Securing @Azure with @shehackspurple
#
infosec
#
security
#
azure
#
cloud
Reactions
6
 reactions
Comments
Add Comment
4 min read
Save
Saved
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 9 '21
AzureFunBytes Episode 56 - Secretless Applications with @ChristosMatskas
#
security
#
infosec
#
azure
#
serverless
Reactions
8
 reactions
Comments
Add Comment
3 min read
Save
Saved
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021
Jay Gordon
Jay Gordon
Jay Gordon
Follow
for
Microsoft Azure
Sep 8 '21
AzureFunBytes Reminder - Secretless Applications with @ChristosMatskas - 9/9/2021
#
infosec
#
security
#
azure
#
serverless
Reactions
7
 reactions
Comments
Add Comment
3 min read
Save
Saved
TryHackMe Bounty Hacker Room Walkthrough
kkaosninja
kkaosninja
kkaosninja
Follow
Aug 7 '21
TryHackMe Bounty Hacker Room Walkthrough
#
beginners
#
infosec
#
tryhackme
#
ctf
Reactions
3
 reactions
Comments
Add Comment
4 min read
Save
Saved
TryHackMe Super-Spam Walkthrough
kkaosninja
kkaosninja
kkaosninja
Follow
Aug 10 '21
TryHackMe Super-Spam Walkthrough
#
infosec
#
ctf
#
tryhackme
#
security
Reactions
6
 reactions
Comments
Add Comment
14 min read
Save
Saved
TryHackMe CMSpit Room Walkthrough
kkaosninja
kkaosninja
kkaosninja
Follow
Aug 5 '21
TryHackMe CMSpit Room Walkthrough
#
infosec
#
security
#
ctf
#
tryhackme
Reactions
5
 reactions
Comments
Add Comment
8 min read
Save
Saved
Auditing NodeJs modules with YARA rules
Ruwan Pradeep Geeganage
Ruwan Pradeep Geeganage
Ruwan Pradeep Geeganage
Follow
Apr 6 '21
Auditing NodeJs modules with YARA rules
#
node
#
npm
#
yarn
#
infosec
Reactions
6
 reactions
Comments
Add Comment
4 min read
Save
Saved
To Secure Today’s Code, It’s Time to Shift Left
mackenziejj
mackenziejj
mackenziejj
Follow
Mar 30 '21
To Secure Today’s Code, It’s Time to Shift Left
#
cybersecurity
#
appsec
#
security
#
infosec
Reactions
9
 reactions
Comments
Add Comment
6 min read
Save
Saved
When should my startup prioritize infosec?
Gold Fig Labs
Gold Fig Labs
Gold Fig Labs
Follow
Feb 24 '21
When should my startup prioritize infosec?
#
infosec
#
secops
#
cloud
#
security
Reactions
2
 reactions
Comments
Add Comment
3 min read
Save
Saved
Threat modelling for hunted coders
capital-inversion
capital-inversion
capital-inversion
Follow
for
Dreamcatcher-tech
Feb 22 '21
Threat modelling for hunted coders
#
infosec
#
privacy
#
tor
#
blockchain
Reactions
5
 reactions
Comments
Add Comment
13 min read
Save
Saved
How to get your boss to approve the training you want
Tanya Janca
Tanya Janca
Tanya Janca
Follow
Dec 5 '20
How to get your boss to approve the training you want
#
training
#
appsec
#
infosec
#
devsecops
Reactions
4
 reactions
Comments
Add Comment
4 min read
Save
Saved
Illustrated Notes on Web Security Essentials
Maggie Appleton
Maggie Appleton
Maggie Appleton
Follow
for
egghead.io
Nov 30 '20
Illustrated Notes on Web Security Essentials
#
security
#
infosec
Reactions
16
 reactions
Comments
1
 comment
2 min read
Save
Saved
Building a Pentest lab with Docker
Ian Muchina
Ian Muchina
Ian Muchina
Follow
Nov 3 '20
Building a Pentest lab with Docker
#
docker
#
infosec
Reactions
16
 reactions
Comments
Add Comment
6 min read
Save
Saved
Security Benchmarking at 1300 °C
Paul Duplys
Paul Duplys
Paul Duplys
Follow
Oct 9 '20
Security Benchmarking at 1300 °C
#
infosec
#
fuzzing
#
vulnerability
#
magma
Reactions
6
 reactions
Comments
Add Comment
5 min read
Save
Saved
Pentesting Android Apps Using "Frida and Objection"
Rahul Venati
Rahul Venati
Rahul Venati
Follow
Oct 7 '20
Pentesting Android Apps Using "Frida and Objection"
#
android
#
pentesting
#
infosec
#
security
Reactions
3
 reactions
Comments
1
 comment
1 min read
Save
Saved
Generating pentest reports with Reconmap
Santiago L
Santiago L
Santiago L
Follow
for
Reconmap
Oct 2 '20
Generating pentest reports with Reconmap
#
security
#
pentesting
#
infosec
#
vulnerability
Reactions
6
 reactions
Comments
Add Comment
3 min read
Save
Saved
Information Gathering with "theHarvester"
sumanbasuli
sumanbasuli
sumanbasuli
Follow
for
Tropyl
Jul 20 '20
Information Gathering with "theHarvester"
#
security
#
pentest
#
redteamtools
#
infosec
Reactions
6
 reactions
Comments
Add Comment
9 min read
Save
Saved
Day-11: Read Info-sec Write-Ups!
FENIL SHAH
FENIL SHAH
FENIL SHAH
Follow
Jun 27 '20
Day-11: Read Info-sec Write-Ups!
#
cybersecurity
#
security
#
blogaday
#
infosec
Reactions
6
 reactions
Comments
Add Comment
1 min read
Save
Saved
Newbies and Documentation
Virgo Clarity
Virgo Clarity
Virgo Clarity
Follow
Jun 27 '20
Newbies and Documentation
#
cybersecurity
#
pentesting
#
infosec
#
beginners
Reactions
5
 reactions
Comments
Add Comment
2 min read
Save
Saved
Introducing Kubernetes Goat
Madhu Akula
Madhu Akula
Madhu Akula
Follow
Jun 25 '20
Introducing Kubernetes Goat
#
security
#
kubernetes
#
devsecops
#
infosec
Reactions
17
 reactions
Comments
Add Comment
3 min read
Save
Saved
Dockerfile Security Checks using OPA Rego Policies with Conftest
Madhu Akula
Madhu Akula
Madhu Akula
Follow
Jun 24 '20
Dockerfile Security Checks using OPA Rego Policies with Conftest
#
policy
#
infosec
#
docker
#
security
Reactions
4
 reactions
Comments
Add Comment
3 min read
Save
Saved
Day-8: Started with Pentesterlab!
FENIL SHAH
FENIL SHAH
FENIL SHAH
Follow
Jun 24 '20
Day-8: Started with Pentesterlab!
#
cybersecurity
#
security
#
infosec
#
blogaday
Reactions
4
 reactions
Comments
Add Comment
1 min read
Save
Saved
Day-7: Nmap -- Hacker's Favourite Scanning Tool!
FENIL SHAH
FENIL SHAH
FENIL SHAH
Follow
Jun 23 '20
Day-7: Nmap -- Hacker's Favourite Scanning Tool!
#
cybersecurity
#
security
#
infosec
#
blogaday
Reactions
11
 reactions
Comments
2
 comments
2 min read
Save
Saved
Day-5: A day off but...
FENIL SHAH
FENIL SHAH
FENIL SHAH
Follow
Jun 21 '20
Day-5: A day off but...
#
cybersecurity
#
security
#
blogaday
#
infosec
Reactions
3
 reactions
Comments
Add Comment
1 min read
Save
Saved
Day-3: Bypassing the SOP!đź’Ł
FENIL SHAH
FENIL SHAH
FENIL SHAH
Follow
Jun 19 '20
Day-3: Bypassing the SOP!đź’Ł
#
cybersecurity
#
security
#
blogaday
#
infosec
Reactions
8
 reactions
Comments
Add Comment
2 min read
Save
Saved
Day-2: Understanding the SOP! 🔪
FENIL SHAH
FENIL SHAH
FENIL SHAH
Follow
Jun 18 '20
Day-2: Understanding the SOP! 🔪
#
cybersecurity
#
infosec
#
blogaday
#
security
Reactions
6
 reactions
Comments
Add Comment
2 min read
Save
Saved
Day-1: Understanding Base64
FENIL SHAH
FENIL SHAH
FENIL SHAH
Follow
Jun 17 '20
Day-1: Understanding Base64
#
cybersecurity
#
infosec
#
blogaday
#
security
Reactions
13
 reactions
Comments
2
 comments
2 min read
Save
Saved
Isolate Your Games, Seriously
Ayane Satomi
Ayane Satomi
Ayane Satomi
Follow
Jun 14 '20
Isolate Your Games, Seriously
#
gaming
#
infosec
#
virtualization
Reactions
10
 reactions
Comments
Add Comment
4 min read
Save
Saved
Use your Yubikey to its Fullest
Rémi Lavedrine
Rémi Lavedrine
Rémi Lavedrine
Follow
Apr 29 '20
Use your Yubikey to its Fullest
#
security
#
tutorial
#
infosec
#
privacy
Reactions
23
 reactions
Comments
4
 comments
9 min read
Save
Saved
Week 3: Introduction to John the Ripper
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Apr 2 '20
Week 3: Introduction to John the Ripper
#
security
#
infosec
#
blogpost
#
pentest
Reactions
6
 reactions
Comments
Add Comment
5 min read
Save
Saved
Conhecendo a OWASP
Fernando Guisso
Fernando Guisso
Fernando Guisso
Follow
Apr 2 '20
Conhecendo a OWASP
#
owasp
#
appsec
#
infosec
#
security
Reactions
3
 reactions
Comments
Add Comment
3 min read
Save
Saved
Week 2: Knowing the penetration testing steps
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 26 '20
Week 2: Knowing the penetration testing steps
#
security
#
infosec
#
blogpost
#
pentest
Reactions
16
 reactions
Comments
Add Comment
4 min read
Save
Saved
Week 1: Being conscious about your attack surface
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 19 '20
Week 1: Being conscious about your attack surface
#
security
#
infosec
#
blogpost
#
pentest
Reactions
7
 reactions
Comments
Add Comment
5 min read
Save
Saved
OverTheWire Bandit Level 8 → Level 9 walk-through
kkaosninja
kkaosninja
kkaosninja
Follow
Mar 14 '20
OverTheWire Bandit Level 8 → Level 9 walk-through
#
security
#
beginners
#
infosec
#
ctf
Reactions
4
 reactions
Comments
Add Comment
2 min read
Save
Saved
Week 0: Security blog posts introduction
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 13 '20
Week 0: Security blog posts introduction
#
security
#
infosec
#
blogpost
#
pentest
Reactions
16
 reactions
Comments
Add Comment
2 min read
Save
Saved
OverTheWire Bandit Level 7 → Level 8 walk-through
kkaosninja
kkaosninja
kkaosninja
Follow
Mar 10 '20
OverTheWire Bandit Level 7 → Level 8 walk-through
#
security
#
beginners
#
infosec
#
ctf
Reactions
11
 reactions
Comments
Add Comment
1 min read
Save
Saved
Building Secure REST API Services with Python
Michael Rossoni
Michael Rossoni
Michael Rossoni
Follow
Mar 9 '20
Building Secure REST API Services with Python
#
rest
#
python
#
security
#
infosec
Reactions
18
 reactions
Comments
2
 comments
4 min read
Save
Saved
Two-minute InfoSec — Shell History Timestamps
Chapin Bryce
Chapin Bryce
Chapin Bryce
Follow
Mar 5 '20
Two-minute InfoSec — Shell History Timestamps
#
infosec
#
technology
#
security
#
dfir
Reactions
10
 reactions
Comments
Add Comment
2 min read
Save
Saved
OverTheWire Bandit Level 6 → Level 7 walk-through
kkaosninja
kkaosninja
kkaosninja
Follow
Mar 5 '20
OverTheWire Bandit Level 6 → Level 7 walk-through
#
security
#
beginners
#
infosec
#
ctf
Reactions
8
 reactions
Comments
Add Comment
2 min read
Save
Saved
OverTheWire Bandit Level 5 → Level 6 walk-through
kkaosninja
kkaosninja
kkaosninja
Follow
Mar 4 '20
OverTheWire Bandit Level 5 → Level 6 walk-through
#
security
#
infosec
#
ctf
#
beginners
Reactions
8
 reactions
Comments
Add Comment
2 min read
Save
Saved
OverTheWire Bandit Level 4 → Level 5 walk-through
kkaosninja
kkaosninja
kkaosninja
Follow
Mar 3 '20
OverTheWire Bandit Level 4 → Level 5 walk-through
#
security
#
infosec
#
ctf
#
beginners
Reactions
4
 reactions
Comments
Add Comment
1 min read
Save
Saved
Sending the Referrer Policy Header with NGINX
Collin M. Barrett
Collin M. Barrett
Collin M. Barrett
Follow
Mar 2 '20
Sending the Referrer Policy Header with NGINX
#
infosec
#
chrome
#
https
#
nginx
Reactions
5
 reactions
Comments
Add Comment
3 min read
Save
Saved
OverTheWire Bandit Level 3 → Level 4 walk-through
kkaosninja
kkaosninja
kkaosninja
Follow
Mar 1 '20
OverTheWire Bandit Level 3 → Level 4 walk-through
#
security
#
infosec
#
ctf
#
beginners
Reactions
5
 reactions
Comments
Add Comment
1 min read
Save
Saved
What Is Tor and Should We Use It?
Thea
Thea
Thea
Follow
Feb 7 '20
What Is Tor and Should We Use It?
#
tor
#
infosec
#
privacy
#
anonymity
Reactions
17
 reactions
Comments
9
 comments
4 min read
Save
Saved
Stuffing of Credentials?
DaNeil C
DaNeil C
DaNeil C
Follow
Jan 28 '20
Stuffing of Credentials?
#
codenewbie
#
security
#
infosec
#
cybersecurity
Reactions
17
 reactions
Comments
6
 comments
3 min read
Save
Saved
Jobs in Information Security (InfoSec)
Tanya Janca
Tanya Janca
Tanya Janca
Follow
for
OWASP DevSlop
Dec 27 '19
Jobs in Information Security (InfoSec)
#
beginners
#
security
#
career
#
infosec
Reactions
81
 reactions
Comments
9
 comments
6 min read
Save
Saved
Covert Channels and Data Exfiltration
Deepal Jayasekara
Deepal Jayasekara
Deepal Jayasekara
Follow
Dec 6 '19
Covert Channels and Data Exfiltration
#
cybersecurity
#
steganography
#
networking
#
infosec
Reactions
5
 reactions
Comments
Add Comment
9 min read
Save
Saved
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account