DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Path traversal via alias misconfiguration in Nginx

Path traversal via alias misconfiguration in Nginx

Comments
1 min read
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG

100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG

23
Comments
20 min read
Code Smell 284 - Encrypted Functions

Code Smell 284 - Encrypted Functions

Comments
5 min read
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!

GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!

68
Comments 6
11 min read
Common Cybersecurity Misconceptions and How to Avoid Them

Common Cybersecurity Misconceptions and How to Avoid Them

Comments
2 min read
The Complete Guide to Ethical Hacking in 2025

The Complete Guide to Ethical Hacking in 2025

Comments 1
3 min read
You Could Lose All Your Crypto In a Job Interview

You Could Lose All Your Crypto In a Job Interview

2
Comments
3 min read
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)

[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)

4
Comments
8 min read
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)

[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)

3
Comments
8 min read
Day 46: Adversarial Attacks on LLMs

Day 46: Adversarial Attacks on LLMs

2
Comments
2 min read
ARP Request & Replay Attack: How Hackers Hijack Networks

ARP Request & Replay Attack: How Hackers Hijack Networks

1
Comments
4 min read
Understanding the Basics of ELF Files on Linux

Understanding the Basics of ELF Files on Linux

Comments
5 min read
Understanding Network Hacking

Understanding Network Hacking

Comments
2 min read
The Curious Case of the $15,000 Spam: My Unexpected Investigation

The Curious Case of the $15,000 Spam: My Unexpected Investigation

18
Comments 3
2 min read
Mastering Cyber Security

Mastering Cyber Security

1
Comments
2 min read
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career

How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career

2
Comments 2
5 min read
Browser request interceptor

Browser request interceptor

1
Comments 2
1 min read
Polyglot solve most of Training XSS Muscles Challenge

Polyglot solve most of Training XSS Muscles Challenge

Comments
3 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
Creating Powerful XSS Polyglots

Creating Powerful XSS Polyglots

1
Comments
2 min read
How To Clone An RFID/NFC Access Card

How To Clone An RFID/NFC Access Card

Comments
3 min read
How to be a White Hat Hacker in Power Automate

How to be a White Hat Hacker in Power Automate

54
Comments 1
5 min read
C-razy Facebook Hack: How I Pranked My Friend

C-razy Facebook Hack: How I Pranked My Friend

32
Comments 4
3 min read
Code Smell 260 - Crowdstrike NULL

Code Smell 260 - Crowdstrike NULL

6
Comments
3 min read
Hacking Access to Power Automate

Hacking Access to Power Automate

76
Comments 1
8 min read
loading...