Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Log in
Create account
DEV Community
Close
#
hacking
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Is Hacking Possible? Security Vulnerabilities and Defense
Emma
Emma
Emma
Follow
Feb 20
Is Hacking Possible? Security Vulnerabilities and Defense
#
hacking
#
security
Comments
Add Comment
8 min read
Cicada Hack The Box Writeup
Razin
Razin
Razin
Follow
Feb 18
Cicada Hack The Box Writeup
#
hackthebox
#
writeup
#
windowpentest
#
hacking
Comments
Add Comment
13 min read
Computer Science Movies #2: Operation Takedown
Thodoris Kouleris
Thodoris Kouleris
Thodoris Kouleris
Follow
Feb 16
Computer Science Movies #2: Operation Takedown
#
hacking
#
cybersecurity
#
movies
Comments
Add Comment
1 min read
Tales of a Novice Hardware Hacker: The Lifecycle of a Kit
Mike Stemle
Mike Stemle
Mike Stemle
Follow
Feb 17
Tales of a Novice Hardware Hacker: The Lifecycle of a Kit
#
hardware
#
keyboard
#
hacking
#
soldering
5
reactions
Comments
Add Comment
2 min read
How to protect yourself against cyber threats
Daniel Lăcătuș
Daniel Lăcătuș
Daniel Lăcătuș
Follow
Feb 8
How to protect yourself against cyber threats
#
cybersecurity
#
hacking
#
phishing
#
ransomware
Comments
Add Comment
3 min read
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply
Richard Chamberlain
Richard Chamberlain
Richard Chamberlain
Follow
Jan 31
🚀 Hacking Robot Needed: Raspberry Pi Need Not Apply
#
security
#
hacking
#
linux
#
cybersecurity
Comments
Add Comment
2 min read
The Impact of SQL Injection: Understanding the Potential Risks and Consequences
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Feb 4
The Impact of SQL Injection: Understanding the Potential Risks and Consequences
#
cybersecurity
#
sqlinjection
#
hacking
#
websecurity
1
reaction
Comments
Add Comment
4 min read
Understanding SQL Injection: A Major Security Threat
Abhay Singh Kathayat
Abhay Singh Kathayat
Abhay Singh Kathayat
Follow
Feb 3
Understanding SQL Injection: A Major Security Threat
#
cybersecurity
#
sqlinjection
#
hacking
#
websecurity
13
reactions
Comments
Add Comment
3 min read
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes
sachinravindran
sachinravindran
sachinravindran
Follow
Feb 3
How We Removed a Crypto Miner Malware That Exploited Linux File Attributes
#
hacking
#
security
#
linux
1
reaction
Comments
Add Comment
2 min read
SSRF retrieving temporary credentials from AWS Metadata
Blue Byte
Blue Byte
Blue Byte
Follow
Jan 31
SSRF retrieving temporary credentials from AWS Metadata
#
hacking
#
cloud
#
aws
#
ssrf
Comments
Add Comment
1 min read
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG
Jane Ori
Jane Ori
Jane Ori
Follow
Jan 17
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG
#
css
#
webdev
#
hacking
#
svg
38
reactions
Comments
Add Comment
20 min read
Path traversal via alias misconfiguration in Nginx
Blue Byte
Blue Byte
Blue Byte
Follow
Jan 19
Path traversal via alias misconfiguration in Nginx
#
nginx
#
hacking
#
bugbounty
#
reverseproxy
Comments
Add Comment
1 min read
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!
Jane Ori
Jane Ori
Jane Ori
Follow
Jan 6
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!
#
css
#
webdev
#
hacking
#
api
70
reactions
Comments
6
comments
11 min read
Common Cybersecurity Misconceptions and How to Avoid Them
Aditya Raj
Aditya Raj
Aditya Raj
Follow
Jan 2
Common Cybersecurity Misconceptions and How to Avoid Them
#
cybersecurity
#
hacking
#
security
Comments
Add Comment
2 min read
Code Smell 284 - Encrypted Functions
Maxi Contieri
Maxi Contieri
Maxi Contieri
Follow
Dec 21 '24
Code Smell 284 - Encrypted Functions
#
webdev
#
programming
#
security
#
hacking
Comments
Add Comment
5 min read
You Could Lose All Your Crypto In a Job Interview
Eduardo Zepeda
Eduardo Zepeda
Eduardo Zepeda
Follow
Dec 16 '24
You Could Lose All Your Crypto In a Job Interview
#
opinion
#
hacking
#
cybersecurity
#
crypto
2
reactions
Comments
Add Comment
3 min read
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)
StealthC
StealthC
StealthC
Follow
Dec 11 '24
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)
#
frida
#
reverse
#
typescript
#
hacking
1
reaction
Comments
Add Comment
8 min read
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)
StealthC
StealthC
StealthC
Follow
Dec 11 '24
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)
#
frida
#
reverse
#
typescript
#
hacking
3
reactions
Comments
Add Comment
8 min read
Day 46: Adversarial Attacks on LLMs
Naresh Nishad
Naresh Nishad
Naresh Nishad
Follow
Dec 5 '24
Day 46: Adversarial Attacks on LLMs
#
llm
#
75daysofllm
#
hacking
1
reaction
Comments
Add Comment
2 min read
ARP Request & Replay Attack: How Hackers Hijack Networks
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 18 '24
ARP Request & Replay Attack: How Hackers Hijack Networks
#
cybersecurity
#
networking
#
hacking
#
arp
1
reaction
Comments
Add Comment
4 min read
Understanding Network Hacking
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 5 '24
Understanding Network Hacking
#
network
#
hacking
#
networkhacking
Comments
Add Comment
2 min read
The Curious Case of the $15,000 Spam: My Unexpected Investigation
Boopathi
Boopathi
Boopathi
Follow
Nov 2 '24
The Curious Case of the $15,000 Spam: My Unexpected Investigation
#
hacking
#
webdev
#
aws
#
chatgpt
18
reactions
Comments
3
comments
2 min read
Mastering Cyber Security
Dan
Dan
Dan
Follow
Oct 15 '24
Mastering Cyber Security
#
cybersecurity
#
security
#
cyber
#
hacking
1
reaction
Comments
Add Comment
2 min read
Understanding the Basics of ELF Files on Linux
Sandipan Roy
Sandipan Roy
Sandipan Roy
Follow
Oct 14 '24
Understanding the Basics of ELF Files on Linux
#
security
#
linux
#
hacking
#
malware
1
reaction
Comments
Add Comment
5 min read
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 11 '24
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career
#
hacking
#
ethicalhacker
2
reactions
Comments
2
comments
5 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account