Forem

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
ARP Request & Replay Attack: How Hackers Hijack Networks

ARP Request & Replay Attack: How Hackers Hijack Networks

1
Comments
4 min read
The Curious Case of the $15,000 Spam: My Unexpected Investigation
Cover image for The Curious Case of the $15,000 Spam: My Unexpected Investigation

The Curious Case of the $15,000 Spam: My Unexpected Investigation

18
Comments 3
2 min read
Mastering Cyber Security

Mastering Cyber Security

1
Comments
2 min read
Understanding the Basics of ELF Files on Linux
Cover image for Understanding the Basics of ELF Files on Linux

Understanding the Basics of ELF Files on Linux

6
Comments
5 min read
How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career

How to Become an Ethical Hacker: A Step-by-Step Guide to a Successful Cybersecurity Career

2
Comments 2
5 min read
Browser request interceptor
Cover image for Browser request interceptor

Browser request interceptor

1
Comments 2
1 min read
What is a polyglot in Hacking

What is a polyglot in Hacking

Comments
2 min read
Polyglot solve most of Training XSS Muscles Challenge

Polyglot solve most of Training XSS Muscles Challenge

1
Comments
3 min read
Creating Powerful XSS Polyglots

Creating Powerful XSS Polyglots

1
Comments
2 min read
How To Clone An RFID/NFC Access Card
Cover image for How To Clone An RFID/NFC Access Card

How To Clone An RFID/NFC Access Card

Comments
3 min read
How to be a White Hat Hacker in Power Automate
Cover image for How to be a White Hat Hacker in Power Automate

How to be a White Hat Hacker in Power Automate

56
Comments 1
5 min read
C-razy Facebook Hack: How I Pranked My Friend
Cover image for C-razy Facebook Hack: How I Pranked My Friend

C-razy Facebook Hack: How I Pranked My Friend

36
Comments 5
3 min read
Hacking Access to Power Automate
Cover image for Hacking Access to Power Automate

Hacking Access to Power Automate

83
Comments 1
8 min read
Day 7 of 30

Day 7 of 30

Comments
1 min read
Code Smell 260 - Crowdstrike NULL
Cover image for Code Smell 260 - Crowdstrike NULL

Code Smell 260 - Crowdstrike NULL

6
Comments
3 min read
Hunting the Hacker: A Deep Dive into Courier Fraud
Cover image for Hunting the Hacker: A Deep Dive into Courier Fraud

Hunting the Hacker: A Deep Dive into Courier Fraud

10
Comments
2 min read
Understanding Advanced Persistent Threats (APTs)

Understanding Advanced Persistent Threats (APTs)

2
Comments
3 min read
A dive into hacking and its evolution
Cover image for A dive into hacking and its evolution

A dive into hacking and its evolution

1
Comments
4 min read
Hacking Alibaba Cloud's Kubernetes Cluster
Cover image for Hacking Alibaba Cloud's Kubernetes Cluster

Hacking Alibaba Cloud's Kubernetes Cluster

6
Comments 1
14 min read
[Python] Tool Hacking Plus

[Python] Tool Hacking Plus

Comments
1 min read
What I will be doing for the 30 day code challenge

What I will be doing for the 30 day code challenge

Comments
1 min read
How I Reverse-Engineered My CPU Cooler LED Display
Cover image for How I Reverse-Engineered My CPU Cooler LED Display

How I Reverse-Engineered My CPU Cooler LED Display

3
Comments
6 min read
AssaultCube | Writing your first external cheat in RustLang
Cover image for AssaultCube | Writing your first external cheat in RustLang

AssaultCube | Writing your first external cheat in RustLang

5
Comments
7 min read
Preparation (Installation, environment settings)
Cover image for Preparation (Installation, environment settings)

Preparation (Installation, environment settings)

Comments
2 min read
Exploring the Cutting-Edge of Genome Hacking with Bioinformatics!

Exploring the Cutting-Edge of Genome Hacking with Bioinformatics!

Comments 1
1 min read
loading...