Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
hacking
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Path traversal via alias misconfiguration in Nginx
Blue Byte
Blue Byte
Blue Byte
Follow
Jan 19
Path traversal via alias misconfiguration in Nginx
#
nginx
#
hacking
#
bugbounty
Comments
Add Comment
1 min read
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG
Jane Ori
Jane Ori
Jane Ori
Follow
Jan 17
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG
#
css
#
webdev
#
hacking
#
svg
23
reactions
Comments
Add Comment
20 min read
Code Smell 284 - Encrypted Functions
Maxi Contieri
Maxi Contieri
Maxi Contieri
Follow
Dec 21 '24
Code Smell 284 - Encrypted Functions
#
webdev
#
programming
#
security
#
hacking
Comments
Add Comment
5 min read
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!
Jane Ori
Jane Ori
Jane Ori
Follow
Jan 6
GETting your IP Address with CSS - and other 32 bit API responses - without JavaScript!
#
css
#
webdev
#
hacking
#
api
68
reactions
Comments
6
comments
11 min read
Common Cybersecurity Misconceptions and How to Avoid Them
Aditya Raj
Aditya Raj
Aditya Raj
Follow
Jan 2
Common Cybersecurity Misconceptions and How to Avoid Them
#
techtalks
#
cybersecurity
#
hacking
#
security
Comments
Add Comment
2 min read
The Complete Guide to Ethical Hacking in 2025
Daksh Kataria
Daksh Kataria
Daksh Kataria
Follow
Nov 28 '24
The Complete Guide to Ethical Hacking in 2025
#
coding
#
ethicalhacking
#
hacking
#
ethicalhackingcourse
Comments
1
comment
3 min read
You Could Lose All Your Crypto In a Job Interview
Eduardo Zepeda
Eduardo Zepeda
Eduardo Zepeda
Follow
Dec 16 '24
You Could Lose All Your Crypto In a Job Interview
#
opinion
#
hacking
#
cybersecurity
#
crypto
2
reactions
Comments
Add Comment
3 min read
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)
StealthC
StealthC
StealthC
Follow
Dec 11 '24
[PT-BR] Introdução ao Frida: Como Manipular Memória em Tempo Real com TypeScript (e DOOM)
#
frida
#
reverse
#
typescript
#
hacking
4
reactions
Comments
Add Comment
8 min read
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)
StealthC
StealthC
StealthC
Follow
Dec 11 '24
[EN] Introduction to Frida: Real-Time Memory Manipulation with TypeScript (and DOOM)
#
frida
#
reverse
#
typescript
#
hacking
3
reactions
Comments
Add Comment
8 min read
Day 46: Adversarial Attacks on LLMs
Naresh Nishad
Naresh Nishad
Naresh Nishad
Follow
Dec 5 '24
Day 46: Adversarial Attacks on LLMs
#
llm
#
75daysofllm
#
hacking
2
reactions
Comments
Add Comment
2 min read
ARP Request & Replay Attack: How Hackers Hijack Networks
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 18 '24
ARP Request & Replay Attack: How Hackers Hijack Networks
#
cybersecurity
#
networking
#
hacking
#
arp
1
reaction
Comments
Add Comment
4 min read
Understanding the Basics of ELF Files on Linux
Sandipan Roy
Sandipan Roy
Sandipan Roy
Follow
Oct 14 '24
Understanding the Basics of ELF Files on Linux
#
security
#
linux
#
hacking
#
malware
Comments
Add Comment
5 min read
Understanding Network Hacking
S3CloudHub
S3CloudHub
S3CloudHub
Follow
Oct 5 '24
Understanding Network Hacking
#
network
#
hacking
#
networkhacking
Comments
Add Comment
2 min read
The Curious Case of the $15,000 Spam: My Unexpected Investigation
Boopathi
Boopathi
Boopathi
Follow
Nov 2 '24
The Curious Case of the $15,000 Spam: My Unexpected Investigation
#
hacking
#
webdev
#
aws
#
chatgpt
18
reactions
Comments
3
comments
2 min read
Mastering Cyber Security
Dan
Dan
Dan
Follow
Oct 15 '24
Mastering Cyber Security
#
cybersecurity
#
security
#
cyber
#
hacking
1
reaction
Comments
Add Comment
2 min read
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Aditya Pratap Bhuyan
Follow
Oct 11 '24
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career
#
hacking
#
ethicalhacker
2
reactions
Comments
2
comments
5 min read
Browser request interceptor
Le Vuong
Le Vuong
Le Vuong
Follow
Oct 8 '24
Browser request interceptor
#
requestinterceptor
#
browser
#
debugging
#
hacking
1
reaction
Comments
2
comments
1 min read
Polyglot solve most of Training XSS Muscles Challenge
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Follow
Sep 14 '24
Polyglot solve most of Training XSS Muscles Challenge
#
xss
#
javascript
#
ctf
#
hacking
Comments
Add Comment
3 min read
What is a polyglot in Hacking
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Follow
Sep 13 '24
What is a polyglot in Hacking
#
security
#
xss
#
pentest
#
hacking
Comments
Add Comment
2 min read
Creating Powerful XSS Polyglots
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Follow
Sep 13 '24
Creating Powerful XSS Polyglots
#
xss
#
javascript
#
html
#
hacking
1
reaction
Comments
Add Comment
2 min read
How To Clone An RFID/NFC Access Card
Confidence Okoghenun
Confidence Okoghenun
Confidence Okoghenun
Follow
Sep 10 '24
How To Clone An RFID/NFC Access Card
#
nfc
#
smarthome
#
hacking
Comments
Add Comment
3 min read
How to be a White Hat Hacker in Power Automate
david wyatt
david wyatt
david wyatt
Follow
Aug 26 '24
How to be a White Hat Hacker in Power Automate
#
powerplatform
#
powerautomate
#
hacking
#
security
54
reactions
Comments
1
comment
5 min read
C-razy Facebook Hack: How I Pranked My Friend
Boopathi
Boopathi
Boopathi
Follow
Aug 21 '24
C-razy Facebook Hack: How I Pranked My Friend
#
hacking
#
prank
#
c
#
facebook
32
reactions
Comments
4
comments
3 min read
Code Smell 260 - Crowdstrike NULL
Maxi Contieri
Maxi Contieri
Maxi Contieri
Follow
Jul 20 '24
Code Smell 260 - Crowdstrike NULL
#
security
#
cleancode
#
hacking
#
null
6
reactions
Comments
Add Comment
3 min read
Hacking Access to Power Automate
david wyatt
david wyatt
david wyatt
Follow
Jul 29 '24
Hacking Access to Power Automate
#
powerautomate
#
hacking
#
powerplatform
#
security
76
reactions
Comments
1
comment
8 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account