DEV Community

# hacking

Posts

đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.
THM - Systems as Attack Vectors

THM - Systems as Attack Vectors

1
Comments
3 min read
AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk

AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk

1
Comments
6 min read
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs

Comments
6 min read
Claude Didn't Just Get Jailbroken. It Ran a 6-Week Cyberattack on an Entire Country.

Claude Didn't Just Get Jailbroken. It Ran a 6-Week Cyberattack on an Entire Country.

Comments
9 min read
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis

Comments
5 min read
Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation

Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation

Comments
2 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion

Shields Up Defense Tech: Red Team Attack Surface Expansion

Comments
5 min read
RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘

RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘

5
Comments
3 min read
Tech Academy WriteUp

Tech Academy WriteUp

Comments
8 min read
Hacking Grok 4 (xAI): "Chicken Run"

Hacking Grok 4 (xAI): "Chicken Run"

2
Comments
8 min read
The Untouchable Hacker God: Deciphering Finland's Biggest Cybercrime

The Untouchable Hacker God: Deciphering Finland's Biggest Cybercrime

5
Comments
4 min read
Level Up Your Linux Game: My Journey Through OverTheWire’s Bandit & Natas

Level Up Your Linux Game: My Journey Through OverTheWire’s Bandit & Natas

Comments 1
2 min read
HackPrix Season 2 Recap

HackPrix Season 2 Recap

5
Comments 2
4 min read
đź‘‹ Sign in for the ability to sort posts by relevant, latest, or top.