Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
hacking
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Most Beginners Approach Bug Bounty Completely Wrong
Tariq Davis
Tariq Davis
Tariq Davis
Follow
May 9
Most Beginners Approach Bug Bounty Completely Wrong
#
cybersecurity
#
beginners
#
security
#
hacking
Comments
Add Comment
3 min read
Windows PrivEsc: Singular Mistakes Costing You Hours (And What Actually Gets You SYSTEM)
Niklas
Niklas
Niklas
Follow
May 3
Windows PrivEsc: Singular Mistakes Costing You Hours (And What Actually Gets You SYSTEM)
#
security
#
hacking
#
tutorial
#
career
Comments
Add Comment
2 min read
Stuxnet: How a USB Drive Destroyed 1,000 Nuclear Centrifuges — A Technical Deep Dive
john Paul
john Paul
john Paul
Follow
Apr 18
Stuxnet: How a USB Drive Destroyed 1,000 Nuclear Centrifuges — A Technical Deep Dive
#
security
#
stuxnet
#
caisd
#
hacking
Comments
Add Comment
4 min read
"Shinobi Rokugu" — What a Ninja's Everyday Carry Teaches Us About Physical Security
ipusiron
ipusiron
ipusiron
Follow
Mar 18
"Shinobi Rokugu" — What a Ninja's Everyday Carry Teaches Us About Physical Security
#
security
#
hacking
#
ninja
#
beginners
Comments
Add Comment
3 min read
What Is a "Cyber Ninja"? — The World of Full-Stack Hacking
ipusiron
ipusiron
ipusiron
Follow
Mar 12
What Is a "Cyber Ninja"? — The World of Full-Stack Hacking
#
security
#
cybersecurity
#
beginners
#
hacking
1
 reaction
Comments
Add Comment
4 min read
The MCP Supply Chain Problem: What Happens When You Install a Malicious Server
Atlas Whoff
Atlas Whoff
Atlas Whoff
Follow
Apr 7
The MCP Supply Chain Problem: What Happens When You Install a Malicious Server
#
security
#
claudecode
#
javascript
#
hacking
1
 reaction
Comments
1
 comment
6 min read
AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk
Kuboid Secure Layer
Kuboid Secure Layer
Kuboid Secure Layer
Follow
Mar 3
AWS IAM Security Best Practices — Why Over-Permissive Access Is Your Biggest Cloud Risk
#
cybersecurity
#
hacking
#
aws
#
iam
1
 reaction
Comments
Add Comment
6 min read
How I Reverse-Engineered Cursor IDE to Run on GitHub Copilot (A Proxy Architecture Deep Dive)
Jackson Kasi
Jackson Kasi
Jackson Kasi
Follow
Apr 3
How I Reverse-Engineered Cursor IDE to Run on GitHub Copilot (A Proxy Architecture Deep Dive)
#
reverseengineering
#
hacking
#
architecture
#
opensource
1
 reaction
Comments
2
 comments
5 min read
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs
Satyam Rastogi
Satyam Rastogi
Satyam Rastogi
Follow
Mar 1
ClawJacked WebSocket Hijack: AI Agent Command Injection TTPs
#
security
#
hacking
#
pentesting
#
cybersecurity
Comments
Add Comment
6 min read
Claude Didn't Just Get Jailbroken. It Ran a 6-Week Cyberattack on an Entire Country.
rain
rain
rain
Follow
Feb 28
Claude Didn't Just Get Jailbroken. It Ran a 6-Week Cyberattack on an Entire Country.
#
aisecurity
#
cybersecurity
#
hacking
#
claude
Comments
Add Comment
9 min read
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis
Satyam Rastogi
Satyam Rastogi
Satyam Rastogi
Follow
Feb 23
CVE-2026-2329: Grandstream VoIP RCE Attack Chain Analysis
#
security
#
hacking
#
pentesting
#
cybersecurity
Comments
Add Comment
5 min read
Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation
Labby
Labby
Labby
Follow
for
LabEx
Feb 22
Cybersecurity Lab: SMB Guest Access, Hashcat Benchmarking, and Rsync Exploitation
#
cybersecurity
#
hacking
#
pentesting
#
security
Comments
Add Comment
2 min read
Shields Up Defense Tech: Red Team Attack Surface Expansion
Satyam Rastogi
Satyam Rastogi
Satyam Rastogi
Follow
Feb 22
Shields Up Defense Tech: Red Team Attack Surface Expansion
#
security
#
hacking
#
pentesting
#
cybersecurity
Comments
Add Comment
5 min read
RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘
OpenCV
OpenCV
OpenCV
Follow
Feb 21
RIP Holehe: Why User-Scanner is the New King of Email OSINT đź‘‘
#
opensource
#
osint
#
cybersecurity
#
hacking
5
 reactions
Comments
Add Comment
3 min read
I just wanted a desk clock I accidentally built a Home Assistant dashboard
Andre Faria
Andre Faria
Andre Faria
Follow
Mar 22
I just wanted a desk clock I accidentally built a Home Assistant dashboard
#
homeassistant
#
hacking
#
iot
1
 reaction
Comments
Add Comment
11 min read
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account