DEV Community

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
逆向Shell实战——红队技巧 vs 蓝队防御全攻略

逆向Shell实战——红队技巧 vs 蓝队防御全攻略

Comments
3 min read
Zero Trust Security: Why It’s No Longer Optional

Zero Trust Security: Why It’s No Longer Optional

Comments
1 min read
🧠 Metasploit Framework: The Hacker’s Swiss Army Knife 🔐💻

🧠 Metasploit Framework: The Hacker’s Swiss Army Knife 🔐💻

5
Comments
2 min read
The Future of Cybersecurity Careers

The Future of Cybersecurity Careers

1
Comments
1 min read
How Hackers Exploit IoT Devices

How Hackers Exploit IoT Devices

1
Comments
1 min read
The Rise of Deepfake Threats in Cybersecurity

The Rise of Deepfake Threats in Cybersecurity

1
Comments
1 min read
Cloud Security Challenges in 2025

Cloud Security Challenges in 2025

1
Comments
1 min read
AI-Driven Cyber Attacks: The Next Evolution of Hacking

AI-Driven Cyber Attacks: The Next Evolution of Hacking

1
Comments
1 min read
My Journey: Discovering the Relationship Between Kali Linux and Black Arch

My Journey: Discovering the Relationship Between Kali Linux and Black Arch

6
Comments
8 min read
The One Who Hacks in the Shadows

The One Who Hacks in the Shadows

2
Comments
2 min read
😤 HackLang Sucks, PHP Rocks: A Dev's Unfiltered Rant

😤 HackLang Sucks, PHP Rocks: A Dev's Unfiltered Rant

5
Comments
2 min read
Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Zishan Ahamed Thandar – Among India's Top Ethical Hackers Transforming Cybersecurity

Comments
2 min read
These 12 DDoS Attacks Shook the Internet to Its Core

These 12 DDoS Attacks Shook the Internet to Its Core

1
Comments
2 min read
Was my data leaked?

Was my data leaked?

Comments
1 min read
Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP

2
Comments
3 min read
🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

🔐 Blockchain Hacking: Risks, Prevention, and How New Startups Get Targeted

5
Comments 1
3 min read
🔵 Chapter 02 – Ruby Language Fundamentals (Line by Line for Absolute Beginners)

🔵 Chapter 02 – Ruby Language Fundamentals (Line by Line for Absolute Beginners)

Comments
2 min read
What do hackers know about your website?

What do hackers know about your website?

Comments
2 min read
Understanding Gray Hat Hackers: Definition, Techniques, and Implications

Understanding Gray Hat Hackers: Definition, Techniques, and Implications

Comments
7 min read
Understanding Network Attacks: Types, Impact, and Prevention Strategies

Understanding Network Attacks: Types, Impact, and Prevention Strategies

Comments
8 min read
Understanding Packet Sniffing: Risks, Uses, and How to Protect Your Data

Understanding Packet Sniffing: Risks, Uses, and How to Protect Your Data

Comments
7 min read
Understanding Baiting in Cybersecurity: How It Works and How to Protect Yourself

Understanding Baiting in Cybersecurity: How It Works and How to Protect Yourself

Comments
8 min read
I built a tool to check and analyze Next.js website routes

I built a tool to check and analyze Next.js website routes

Comments
1 min read
XSS URL Analysis and SQL Injection Workflow

XSS URL Analysis and SQL Injection Workflow

Comments
4 min read
What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

What is AI Security & Hacking? Understanding the Role of Artificial Intelligence in Cyber Security

Comments
6 min read
loading...