Skip to content
Navigation menu
Search
Search
Log in
Create account
DEV Community
Close
#
pentest
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Website Penetration Testing
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Aug 7 '20
Website Penetration Testing
#
kalilinux
#
azure
#
owasp
#
pentest
66
reactions
Comments
4
comments
1 min read
10 Useful Tools to Exploit Your Security
Silvio Buss
Silvio Buss
Silvio Buss
Follow
Jul 21 '19
10 Useful Tools to Exploit Your Security
#
security
#
pentest
#
hacking
51
reactions
Comments
Add Comment
3 min read
What is ethical hacking and penetration testing? Get paid to hack
Amanda Fawcett
Amanda Fawcett
Amanda Fawcett
Follow
for
Educative
Sep 3 '20
What is ethical hacking and penetration testing? Get paid to hack
#
hacking
#
cybersecurity
#
pentest
#
career
45
reactions
Comments
2
comments
8 min read
Cloud Pentest 101
Juliana Gaioso
Juliana Gaioso
Juliana Gaioso
Follow
for
AWS Community Builders
Dec 3 '23
Cloud Pentest 101
#
cloud
#
security
#
pentest
#
cloudnative
35
reactions
Comments
Add Comment
2 min read
How to do a quick network recon during a pentest or CTF
Raz
Raz
Raz
Follow
Jun 7 '20
How to do a quick network recon during a pentest or CTF
#
security
#
nmap
#
pentest
#
ctf
19
reactions
Comments
Add Comment
2 min read
Week 2: Knowing the penetration testing steps
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 26 '20
Week 2: Knowing the penetration testing steps
#
security
#
infosec
#
blogpost
#
pentest
18
reactions
Comments
1
comment
4 min read
Week 0: Security blog posts introduction
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 13 '20
Week 0: Security blog posts introduction
#
security
#
infosec
#
blogpost
#
pentest
16
reactions
Comments
Add Comment
2 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Jun 28 '20
Buffer Overflow on HackTheBox Frolic - with Metasploit
#
pentest
#
hacking
15
reactions
Comments
Add Comment
14 min read
KALI LINUX Testing Tools
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Mar 28 '20
KALI LINUX Testing Tools
#
pentest
#
kalilinux
13
reactions
Comments
Add Comment
1 min read
Find your way in GraphQL applications - Paths explained
c3b5aw
c3b5aw
c3b5aw
Follow
for
Escape
Sep 1 '22
Find your way in GraphQL applications - Paths explained
#
graphql
#
security
#
javascript
#
pentest
13
reactions
Comments
4
comments
1 min read
O que vem depois do Pentesting?
Gabriel Galdino
Gabriel Galdino
Gabriel Galdino
Follow
Jan 31
O que vem depois do Pentesting?
#
braziliandevs
#
pentest
#
security
#
appsec
12
reactions
Comments
Add Comment
13 min read
Writeup: Derbycon 9: Bank of America CTF
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Sep 28 '19
Writeup: Derbycon 9: Bank of America CTF
#
pentest
#
security
#
ctf
#
hacking
12
reactions
Comments
Add Comment
34 min read
Writeup: HackTheBox Lame - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Feb 9 '20
Writeup: HackTheBox Lame - with Metasploit
#
pentest
#
hacking
10
reactions
Comments
Add Comment
5 min read
Anonymous Blob Access
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 5 '22
Anonymous Blob Access
#
azure
#
pentest
#
cloudsecurity
9
reactions
Comments
Add Comment
2 min read
GraphDNA: Fingerprint GraphQL engines
c3b5aw
c3b5aw
c3b5aw
Follow
Jul 21 '22
GraphDNA: Fingerprint GraphQL engines
#
graphql
#
security
#
pentest
#
python
9
reactions
Comments
Add Comment
1 min read
Abusing Managed Identities
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 4 '22
Abusing Managed Identities
#
azure
#
pentest
#
cloudsecurity
9
reactions
Comments
Add Comment
4 min read
Writeup: HackTheBox Legacy - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Feb 9 '20
Writeup: HackTheBox Legacy - with Metasploit
#
pentest
#
hacking
8
reactions
Comments
Add Comment
1 min read
Conceal - HackTheBox Writeup
Tudor Gheorghiu
Tudor Gheorghiu
Tudor Gheorghiu
Follow
Oct 18 '20
Conceal - HackTheBox Writeup
#
security
#
pentest
#
hackthebox
#
hacking
7
reactions
Comments
Add Comment
8 min read
How to set up Metasploitable 3 on macOS Mojave
Arbaoui Mehdi
Arbaoui Mehdi
Arbaoui Mehdi
Follow
Sep 26 '19
How to set up Metasploitable 3 on macOS Mojave
#
metasploit
#
security
#
macos
#
pentest
7
reactions
Comments
1
comment
4 min read
Week 1: Being conscious about your attack surface
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 19 '20
Week 1: Being conscious about your attack surface
#
security
#
infosec
#
blogpost
#
pentest
7
reactions
Comments
Add Comment
5 min read
Writeup: SANS Holiday Hack Challenge 2019
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Jan 14 '20
Writeup: SANS Holiday Hack Challenge 2019
#
pentest
#
ctf
#
security
#
hacking
7
reactions
Comments
Add Comment
16 min read
Writeup: HackTheBox Bastard - NO Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
May 24 '20
Writeup: HackTheBox Bastard - NO Metasploit
#
pentest
#
hacking
7
reactions
Comments
Add Comment
9 min read
Enumerating subscription information with MicroBurst
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 2 '22
Enumerating subscription information with MicroBurst
#
azure
#
cloudsecurity
#
pentest
6
reactions
Comments
Add Comment
2 min read
Week 3: Introduction to John the Ripper
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Apr 2 '20
Week 3: Introduction to John the Ripper
#
security
#
infosec
#
blogpost
#
pentest
6
reactions
Comments
Add Comment
5 min read
'; SQL_Injection ( ) ;--
Luiz Zulian
Luiz Zulian
Luiz Zulian
Follow
Dec 16 '22
'; SQL_Injection ( ) ;--
#
security
#
hacker
#
pentest
#
sql
6
reactions
Comments
2
comments
7 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade
Iaan Mesquita
Iaan Mesquita
Iaan Mesquita
Follow
May 17 '22
Como eu descobri uma falha de segurança em um sistema na minha universidade
#
security
#
api
#
pentest
6
reactions
Comments
Add Comment
6 min read
Information Gathering with "theHarvester"
sumanbasuli
sumanbasuli
sumanbasuli
Follow
for
Tropyl
Jul 20 '20
Information Gathering with "theHarvester"
#
security
#
pentest
#
redteamtools
#
infosec
6
reactions
Comments
Add Comment
9 min read
Learning pentesting path
Francisco Navarro
Francisco Navarro
Francisco Navarro
Follow
Oct 9 '20
Learning pentesting path
#
kali
#
security
#
pentest
#
paths
6
reactions
Comments
Add Comment
1 min read
Gathering Subscription access information with PowerZure
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Mar 31 '22
Gathering Subscription access information with PowerZure
#
azure
#
pentest
#
cloudsecurity
5
reactions
Comments
Add Comment
2 min read
Writeup: HackTheBox Optimum - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Feb 17 '20
Writeup: HackTheBox Optimum - with Metasploit
#
pentest
#
hacking
5
reactions
Comments
Add Comment
3 min read
Making easier a NoSQLi pentest
Igor Souza Martins
Igor Souza Martins
Igor Souza Martins
Follow
May 14 '19
Making easier a NoSQLi pentest
#
security
#
pentest
#
node
5
reactions
Comments
Add Comment
2 min read
Escalating Privileges using a misconfigured service principal
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 5 '22
Escalating Privileges using a misconfigured service principal
#
azure
#
pentest
#
cloudsecurity
5
reactions
Comments
Add Comment
3 min read
Extracting stored passwords and certificates from Automation accounts
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 4 '22
Extracting stored passwords and certificates from Automation accounts
#
azure
#
pentest
#
cloudsecurity
5
reactions
Comments
Add Comment
2 min read
Extracting credentials from App Service
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 3 '22
Extracting credentials from App Service
#
azure
#
cloudsecurity
#
pentest
5
reactions
Comments
Add Comment
1 min read
Writeup: HackTheBox Arctic - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
May 23 '20
Writeup: HackTheBox Arctic - with Metasploit
#
pentest
#
hacking
5
reactions
Comments
Add Comment
3 min read
Writeup: HackTheBox Devel - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Feb 17 '20
Writeup: HackTheBox Devel - with Metasploit
#
pentest
#
hacking
4
reactions
Comments
Add Comment
4 min read
Soft Deleted Blobs
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 8 '22
Soft Deleted Blobs
#
azure
#
pentest
#
cloudsecurity
4
reactions
Comments
Add Comment
3 min read
A new tool for recon Office365 users
Chihiro Hasegawa
Chihiro Hasegawa
Chihiro Hasegawa
Follow
May 19 '22
A new tool for recon Office365 users
#
azure
#
pentest
#
go
#
security
4
reactions
Comments
Add Comment
1 min read
Rebind Socket Shellcode
Faiz Azhar
Faiz Azhar
Faiz Azhar
Follow
Jun 12 '21
Rebind Socket Shellcode
#
shellcode
#
pentest
#
assembly
#
debugging
3
reactions
Comments
1
comment
22 min read
Things To Keep In Mind About Software Development Penetration Testing
Ariaa Reeds
Ariaa Reeds
Ariaa Reeds
Follow
Feb 19 '22
Things To Keep In Mind About Software Development Penetration Testing
#
beginners
#
devops
#
testing
#
pentest
3
reactions
Comments
1
comment
4 min read
How did I discover a security vulnerability in a system of my university
Iaan Mesquita
Iaan Mesquita
Iaan Mesquita
Follow
May 17 '22
How did I discover a security vulnerability in a system of my university
#
security
#
api
#
pentest
3
reactions
Comments
Add Comment
6 min read
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup
Gerald Nash ⚡️
Gerald Nash ⚡️
Gerald Nash ⚡️
Follow
Apr 4 '20
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup
#
security
#
webdev
#
hacking
#
pentest
3
reactions
Comments
Add Comment
3 min read
How'd I Get Here? Exploiting Redirection
Gerald Nash ⚡️
Gerald Nash ⚡️
Gerald Nash ⚡️
Follow
Apr 4 '20
How'd I Get Here? Exploiting Redirection
#
security
#
webdev
#
hacking
#
pentest
3
reactions
Comments
Add Comment
4 min read
Exfiltering VM disks using PowerZure
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 2 '22
Exfiltering VM disks using PowerZure
#
azure
#
cloudsecurity
#
pentest
3
reactions
Comments
Add Comment
2 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Aug 23 '20
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit
#
pentest
#
hacking
#
security
#
hackthebox
2
reactions
Comments
Add Comment
14 min read
Repl.it Open URL Redirection Vulnerability Writeup
Gerald Nash ⚡️
Gerald Nash ⚡️
Gerald Nash ⚡️
Follow
Apr 4 '20
Repl.it Open URL Redirection Vulnerability Writeup
#
security
#
webdev
#
hacking
#
pentest
2
reactions
Comments
Add Comment
3 min read
9 Key Points about Passwords
Rémi Lavedrine
Rémi Lavedrine
Rémi Lavedrine
Follow
Mar 15 '21
9 Key Points about Passwords
#
cybersecurity
#
security
#
hacking
#
pentest
2
reactions
Comments
Add Comment
1 min read
Information Gathering
Fawazkh80
Fawazkh80
Fawazkh80
Follow
Jul 1 '23
Information Gathering
#
web
#
security
#
pentest
#
cybersecurity
2
reactions
Comments
Add Comment
2 min read
Using Node.js to Parse a JSON File Generated from WPScan
Adem Kouki
Adem Kouki
Adem Kouki
Follow
Feb 8 '23
Using Node.js to Parse a JSON File Generated from WPScan
#
node
#
javascript
#
pentest
1
reaction
Comments
1
comment
3 min read
Writeup: HackTheBox Grandpa and Granny - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
May 23 '20
Writeup: HackTheBox Grandpa and Granny - with Metasploit
#
pentest
#
hacking
1
reaction
Comments
Add Comment
3 min read
Writeup: HackTheBox Beep - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
May 23 '20
Writeup: HackTheBox Beep - with Metasploit
#
pentest
#
hacking
1
reaction
Comments
Add Comment
8 min read
Curso de Pentest 100% Gratuito da Desec Security
guiadeti
guiadeti
guiadeti
Follow
Aug 25 '23
Curso de Pentest 100% Gratuito da Desec Security
#
cursogratuito
#
cursosgratuitos
#
cybersecurity
#
pentest
1
reaction
Comments
Add Comment
7 min read
Application of data structures in Cyber security.
David Mutebi
David Mutebi
David Mutebi
Follow
Jun 30 '21
Application of data structures in Cyber security.
#
cybersecurity
#
datascience
#
algorithms
#
pentest
1
reaction
Comments
Add Comment
1 min read
Otimizando Wordlists para Pentests
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Mar 2
Otimizando Wordlists para Pentests
#
security
#
pentest
#
hacking
#
go
1
reaction
Comments
Add Comment
7 min read
How I transformed my career from software engineer to a penetration tester?
pwn.guide
pwn.guide
pwn.guide
Follow
Apr 21
How I transformed my career from software engineer to a penetration tester?
#
cybersecurity
#
hacking
#
pentest
#
learning
Comments
Add Comment
2 min read
Exploração de Vulnerabilidade
Guto Ribeiro
Guto Ribeiro
Guto Ribeiro
Follow
Apr 23
Exploração de Vulnerabilidade
#
cybersecurity
#
pentest
#
web
#
learning
Comments
Add Comment
9 min read
Bypassing OTP systems
Joel Murphy
Joel Murphy
Joel Murphy
Follow
Oct 24 '22
Bypassing OTP systems
#
otp
#
pentest
#
penetration
#
testing
Comments
Add Comment
1 min read
Pentesting Tools I Use Everyday
Adem Kouki
Adem Kouki
Adem Kouki
Follow
Feb 8 '23
Pentesting Tools I Use Everyday
#
pentest
#
tools
#
tutorials
Comments
Add Comment
6 min read
Subdomains and Security: How to Keep Your Development and Pre-Prod Environments Safe
Adem Kouki
Adem Kouki
Adem Kouki
Follow
Feb 8 '23
Subdomains and Security: How to Keep Your Development and Pre-Prod Environments Safe
#
pentest
Comments
Add Comment
2 min read
Resolving Security Issues Unearthed During a Pen Test
Suyash Muley
Suyash Muley
Suyash Muley
Follow
Sep 12 '23
Resolving Security Issues Unearthed During a Pen Test
#
pentest
#
cybersecurity
Comments
Add Comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account