Forem

# hacking

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Protegendo sua API NodeJs contra ReDos Attack[Parte 3]
Cover image for Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

Protegendo sua API NodeJs contra ReDos Attack[Parte 3]

1
Comments
5 min read
Learn Ethical hacking in 2023 (detailed overview)
Cover image for Learn Ethical hacking in 2023 (detailed overview)

Learn Ethical hacking in 2023 (detailed overview)

19
Comments 2
3 min read
Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”
Cover image for Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”

Damn Vulnerable DeFI 2022 Walkthrough — Challenge 2 Solution “Naive Receiver”

4
Comments
4 min read
What is JSON with padding?
Cover image for What is JSON with padding?

What is JSON with padding?

3
Comments
2 min read
Certificate Parsing with `domain-recon`
Cover image for Certificate Parsing with `domain-recon`

Certificate Parsing with `domain-recon`

12
Comments
6 min read
Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action
Cover image for Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

Thinking Like a Hacker: Stealing Secrets with a Malicious GitHub Action

9
Comments 1
4 min read
Using DNS as C2 Communication - Evasive Techniques (Part 3)

Using DNS as C2 Communication - Evasive Techniques (Part 3)

2
Comments
3 min read
Thinking Like a Hacker: AWS Keys in Private Repos
Cover image for Thinking Like a Hacker: AWS Keys in Private Repos

Thinking Like a Hacker: AWS Keys in Private Repos

5
Comments
5 min read
HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM

HOW TO PERFORM A REMOTE CODE EXECUTION ATTACK ON A SYSTEM

6
Comments 2
4 min read
Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)
Cover image for Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)

Dynamic Linker Hijacking Experiments - Evasive Techniques (Part 2)

7
Comments
4 min read
Top 5 Tools and Practical Steps in Checking Website Vulnerability

Top 5 Tools and Practical Steps in Checking Website Vulnerability

7
Comments
5 min read
🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions
Cover image for 🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions

🐳 Docker x Hacktoberfest 2022 - How to Build Docker Extensions

8
Comments
3 min read
From App User to Tenant Admin
Cover image for From App User to Tenant Admin

From App User to Tenant Admin

1
Comments
3 min read
Logging with the administrator's user account OWASP Juice shop
Cover image for Logging with the administrator's user account OWASP Juice shop

Logging with the administrator's user account OWASP Juice shop

9
Comments
5 min read
The best hacking tools in 2022
Cover image for The best hacking tools in 2022

The best hacking tools in 2022

7
Comments
1 min read
Thinking Like a Hacker: Abusing Stolen Private Keys
Cover image for Thinking Like a Hacker: Abusing Stolen Private Keys

Thinking Like a Hacker: Abusing Stolen Private Keys

7
Comments
4 min read
Ferramentas não-devs pra fazer sua carreira decolar
Cover image for Ferramentas não-devs pra fazer sua carreira decolar

Ferramentas não-devs pra fazer sua carreira decolar

4
Comments
3 min read
Commenting == Account Takeover
Cover image for Commenting == Account Takeover

Commenting == Account Takeover

5
Comments
4 min read
Breaking Down Another Phishing Attempt

Breaking Down Another Phishing Attempt

Comments
7 min read
How to hack a .NET Core game
Cover image for How to hack a .NET Core game

How to hack a .NET Core game

5
Comments 2
12 min read
Write-up: Git Exposed, weak password reset and account takeover.

Write-up: Git Exposed, weak password reset and account takeover.

4
Comments
4 min read
Cracking a hashed password with hashcat

Cracking a hashed password with hashcat

31
Comments 1
2 min read
Spending spring days crafting packets at NahamCon 2022
Cover image for Spending spring days crafting packets at NahamCon 2022

Spending spring days crafting packets at NahamCon 2022

4
Comments
20 min read
What is Penetration Testing ?
Cover image for What is Penetration Testing ?

What is Penetration Testing ?

4
Comments 1
2 min read
Trends at Blackhat Asia 2022

Trends at Blackhat Asia 2022

8
Comments
4 min read
loading...