DEV Community

# pentest

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Hack The Box - Redeemer (Redis)

Hack The Box - Redeemer (Redis)

1
Comments
5 min read
Hacking Hidden Paths with ffuf - Web Fuzzing Made Simple

Hacking Hidden Paths with ffuf - Web Fuzzing Made Simple

Comments
1 min read
MCP + VS Code: Assisted pentest on an HTB box — from install to first flag

MCP + VS Code: Assisted pentest on an HTB box — from install to first flag

Comments
14 min read
Test Your API First Before Launch Any App

Test Your API First Before Launch Any App

Comments
3 min read
Getting Started - Web Enumeration Walkthrough (Hack The Box) [Hindi]

Getting Started - Web Enumeration Walkthrough (Hack The Box) [Hindi]

Comments
1 min read
Getting Started - Web Enumeration Walkthrough (Hack The Box) [Urdu]

Getting Started - Web Enumeration Walkthrough (Hack The Box) [Urdu]

Comments
1 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise

HackTeam.RED: From API Keys to Full Infrastructure Compromise

19
Comments 12
4 min read
Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown

Comments
1 min read
Getting Started - Web Enumeration Walkthrough (Hack The Box)

Getting Started - Web Enumeration Walkthrough (Hack The Box)

Comments
1 min read
Инструменты пентестера: nmap, sqlmap, netcat – Исследование, Эксплуатация, Взаимодействие

Инструменты пентестера: nmap, sqlmap, netcat – Исследование, Эксплуатация, Взаимодействие

Comments
2 min read
Пентестинг: основы, преимущества и применение

Пентестинг: основы, преимущества и применение

1
Comments
1 min read
Key Differences Between Vulnerability Assessment and Penetration Testing

Key Differences Between Vulnerability Assessment and Penetration Testing

5
Comments
1 min read
Understanding a Netcat-Based Reverse Shell Using FIFO

Understanding a Netcat-Based Reverse Shell Using FIFO

Comments
3 min read
[REPOST] Installing Genymotion for Android App Pentesting: The Definitive Guide

[REPOST] Installing Genymotion for Android App Pentesting: The Definitive Guide

Comments
3 min read
Git Tales: Secrets in the Shadows

Git Tales: Secrets in the Shadows

2
Comments
3 min read
Criando um Port Scan com Python3

Criando um Port Scan com Python3

1
Comments
3 min read
How i Became a Pentester | Como me Tornei um Pentester

How i Became a Pentester | Como me Tornei um Pentester

1
Comments
5 min read
Web Cache Deception Attacks

Web Cache Deception Attacks

Comments
2 min read
Git Tales: Part 2 - Demons in the Cloud

Git Tales: Part 2 - Demons in the Cloud

3
Comments
5 min read
Mastering Cybersecurity: A Guide to Pentest+, CySA+, and SecurityX Certifications

Mastering Cybersecurity: A Guide to Pentest+, CySA+, and SecurityX Certifications

Comments
2 min read
Basics of Pentest on AWS Environment

Basics of Pentest on AWS Environment

Comments
2 min read
Attacking WebDAV Protocol

Attacking WebDAV Protocol

Comments
1 min read
🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know

🔐 Top 8 API Pentesting Tools Every Developer & Security Pro Should Know

Comments
4 min read
Next.js Middleware Broken Access Controls

Next.js Middleware Broken Access Controls

1
Comments
1 min read
Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Why “Think Like an Attacker” is harmful FT: Threat Modeling?

Comments
2 min read
loading...