Location via proxy:
[ UP ]
[Report a bug]
[Manage cookies]
No cookies
No scripts
No ads
No referrer
Show this form
Skip to content
Navigation menu
Search
Powered by
Search
Algolia
Search
Log in
Create account
DEV Community
Close
#
pentest
Follow
Hide
Posts
Left menu
đź‘‹
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
How To Find Zombie Hosts With Nmap?
Ali
Ali
Ali
Follow
Oct 29
How To Find Zombie Hosts With Nmap?
#
nmap
#
pentest
#
security
#
network
Comments
Add Comment
2 min read
You do not know, what you do not know.
RobertB
RobertB
RobertB
Follow
Sep 10
You do not know, what you do not know.
#
security
#
pentest
#
cybersecurity
Comments
Add Comment
2 min read
What is a polyglot in Hacking
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Mrhili Mohamed Amine
Follow
Sep 13
What is a polyglot in Hacking
#
security
#
xss
#
pentest
#
hacking
Comments
Add Comment
2 min read
10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)
Marcos Oliveira
Marcos Oliveira
Marcos Oliveira
Follow
Aug 8
10 Livros para Aprendizado Avançado de Pentest e Segurança (Hackers)
#
hacker
#
pentest
#
livro
1
 reaction
Comments
Add Comment
12 min read
Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança
Felipe Silva Rosa
Felipe Silva Rosa
Felipe Silva Rosa
Follow
Jul 25
Explorando o Metasploit Framework: A Ferramenta Essencial para Testes de Penetração e Segurança
#
security
#
pentest
#
metasploit
#
webdev
Comments
Add Comment
3 min read
Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners
Bellamer
Bellamer
Bellamer
Follow
Aug 19
Setting Up Your Flipper Zero: A Step-by-Step Guide for Beginners
#
pentest
#
cybersecurity
#
development
#
beginners
4
 reactions
Comments
Add Comment
4 min read
How I transformed my career from software engineer to a penetration tester?
pwn.guide
pwn.guide
pwn.guide
Follow
Apr 21
How I transformed my career from software engineer to a penetration tester?
#
cybersecurity
#
hacking
#
pentest
#
learning
Comments
Add Comment
2 min read
Otimizando Wordlists para Pentests
Ronaldo Modesto
Ronaldo Modesto
Ronaldo Modesto
Follow
Mar 2
Otimizando Wordlists para Pentests
#
security
#
pentest
#
hacking
#
go
3
 reactions
Comments
Add Comment
7 min read
O que vem depois do Pentesting?
Gabriel Galdino
Gabriel Galdino
Gabriel Galdino
Follow
Jan 31
O que vem depois do Pentesting?
#
braziliandevs
#
pentest
#
security
#
appsec
14
 reactions
Comments
Add Comment
13 min read
Cloud Pentest 101
Juliana Gaioso
Juliana Gaioso
Juliana Gaioso
Follow
for
AWS Community Builders
Dec 3 '23
Cloud Pentest 101
#
cloud
#
security
#
pentest
#
cloudnative
35
 reactions
Comments
Add Comment
2 min read
Information Gathering
Fawazkh80
Fawazkh80
Fawazkh80
Follow
Jul 1 '23
Information Gathering
#
web
#
security
#
pentest
#
cybersecurity
5
 reactions
Comments
Add Comment
2 min read
Pentesting Tools I Use Everyday
Adem Kouki
Adem Kouki
Adem Kouki
Follow
Feb 8 '23
Pentesting Tools I Use Everyday
#
pentest
#
tools
#
tutorials
1
 reaction
Comments
Add Comment
6 min read
Using Node.js to Parse a JSON File Generated from WPScan
Adem Kouki
Adem Kouki
Adem Kouki
Follow
Feb 8 '23
Using Node.js to Parse a JSON File Generated from WPScan
#
node
#
javascript
#
pentest
1
 reaction
Comments
1
 comment
3 min read
'; SQL_Injection ( ) ;--
Luiz Zulian
Luiz Zulian
Luiz Zulian
Follow
Dec 16 '22
'; SQL_Injection ( ) ;--
#
security
#
hacker
#
pentest
#
sql
6
 reactions
Comments
2
 comments
7 min read
Find your way in GraphQL applications - Paths explained
c3b5aw
c3b5aw
c3b5aw
Follow
for
Escape - API discovery and security
Sep 1 '22
Find your way in GraphQL applications - Paths explained
#
graphql
#
security
#
javascript
#
pentest
13
 reactions
Comments
4
 comments
1 min read
GraphDNA: Fingerprint GraphQL engines
c3b5aw
c3b5aw
c3b5aw
Follow
Jul 21 '22
GraphDNA: Fingerprint GraphQL engines
#
graphql
#
security
#
pentest
#
python
9
 reactions
Comments
Add Comment
1 min read
A new tool for recon Office365 users
Chihiro Hasegawa
Chihiro Hasegawa
Chihiro Hasegawa
Follow
May 19 '22
A new tool for recon Office365 users
#
azure
#
pentest
#
go
#
security
4
 reactions
Comments
Add Comment
1 min read
Como eu descobri uma falha de segurança em um sistema na minha universidade
Iaan Mesquita
Iaan Mesquita
Iaan Mesquita
Follow
May 17 '22
Como eu descobri uma falha de segurança em um sistema na minha universidade
#
security
#
api
#
pentest
6
 reactions
Comments
Add Comment
6 min read
How did I discover a security vulnerability in a system of my university
Iaan Mesquita
Iaan Mesquita
Iaan Mesquita
Follow
May 17 '22
How did I discover a security vulnerability in a system of my university
#
security
#
api
#
pentest
3
 reactions
Comments
Add Comment
6 min read
Abusing Managed Identities
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 4 '22
Abusing Managed Identities
#
azure
#
pentest
#
cloudsecurity
9
 reactions
Comments
Add Comment
4 min read
Soft Deleted Blobs
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 8 '22
Soft Deleted Blobs
#
azure
#
pentest
#
cloudsecurity
4
 reactions
Comments
Add Comment
3 min read
Extracting credentials from App Service
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 3 '22
Extracting credentials from App Service
#
azure
#
cloudsecurity
#
pentest
5
 reactions
Comments
Add Comment
1 min read
Exfiltering VM disks using PowerZure
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 2 '22
Exfiltering VM disks using PowerZure
#
azure
#
cloudsecurity
#
pentest
3
 reactions
Comments
Add Comment
2 min read
Anonymous Blob Access
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
May 5 '22
Anonymous Blob Access
#
azure
#
pentest
#
cloudsecurity
9
 reactions
Comments
Add Comment
2 min read
Extracting stored passwords and certificates from Automation accounts
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 4 '22
Extracting stored passwords and certificates from Automation accounts
#
azure
#
pentest
#
cloudsecurity
5
 reactions
Comments
Add Comment
2 min read
Escalating Privileges using a misconfigured service principal
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 5 '22
Escalating Privileges using a misconfigured service principal
#
azure
#
pentest
#
cloudsecurity
5
 reactions
Comments
Add Comment
3 min read
Enumerating subscription information with MicroBurst
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Apr 2 '22
Enumerating subscription information with MicroBurst
#
azure
#
cloudsecurity
#
pentest
11
 reactions
Comments
Add Comment
2 min read
Gathering Subscription access information with PowerZure
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Mar 31 '22
Gathering Subscription access information with PowerZure
#
azure
#
pentest
#
cloudsecurity
5
 reactions
Comments
Add Comment
2 min read
Things To Keep In Mind About Software Development Penetration Testing
Ariaa Reeds
Ariaa Reeds
Ariaa Reeds
Follow
Feb 19 '22
Things To Keep In Mind About Software Development Penetration Testing
#
beginners
#
devops
#
testing
#
pentest
3
 reactions
Comments
1
 comment
4 min read
Rebind Socket Shellcode
Faiz Azhar
Faiz Azhar
Faiz Azhar
Follow
Jun 12 '21
Rebind Socket Shellcode
#
shellcode
#
pentest
#
assembly
#
debugging
3
 reactions
Comments
1
 comment
22 min read
Conceal - HackTheBox Writeup
Tudor Gheorghiu
Tudor Gheorghiu
Tudor Gheorghiu
Follow
Oct 18 '20
Conceal - HackTheBox Writeup
#
security
#
pentest
#
hackthebox
#
hacking
7
 reactions
Comments
Add Comment
8 min read
Learning pentesting path
Francisco Navarro
Francisco Navarro
Francisco Navarro
Follow
Oct 9 '20
Learning pentesting path
#
kali
#
security
#
pentest
#
paths
6
 reactions
Comments
Add Comment
1 min read
What is ethical hacking and penetration testing? Get paid to hack
Amanda Fawcett
Amanda Fawcett
Amanda Fawcett
Follow
for
Educative
Sep 3 '20
What is ethical hacking and penetration testing? Get paid to hack
#
hacking
#
cybersecurity
#
pentest
#
career
45
 reactions
Comments
2
 comments
8 min read
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Aug 23 '20
Buffer Overflow ASLR Bypass on HackTheBox October - with Metasploit
#
pentest
#
hacking
#
security
#
hackthebox
3
 reactions
Comments
Add Comment
14 min read
Website Penetration Testing
Eng Soon Cheah
Eng Soon Cheah
Eng Soon Cheah
Follow
Aug 7 '20
Website Penetration Testing
#
kalilinux
#
azure
#
owasp
#
pentest
68
 reactions
Comments
4
 comments
1 min read
Information Gathering with "theHarvester"
sumanbasuli
sumanbasuli
sumanbasuli
Follow
for
Tropyl
Jul 20 '20
Information Gathering with "theHarvester"
#
security
#
pentest
#
redteamtools
#
infosec
9
 reactions
Comments
Add Comment
9 min read
Buffer Overflow on HackTheBox Frolic - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Jun 28 '20
Buffer Overflow on HackTheBox Frolic - with Metasploit
#
pentest
#
hacking
15
 reactions
Comments
Add Comment
14 min read
How to do a quick network recon during a pentest or CTF
Raz
Raz
Raz
Follow
Jun 7 '20
How to do a quick network recon during a pentest or CTF
#
security
#
nmap
#
pentest
#
ctf
19
 reactions
Comments
Add Comment
2 min read
Writeup: HackTheBox Bastard - NO Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
May 24 '20
Writeup: HackTheBox Bastard - NO Metasploit
#
pentest
#
hacking
7
 reactions
Comments
Add Comment
9 min read
Writeup: HackTheBox Arctic - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
May 23 '20
Writeup: HackTheBox Arctic - with Metasploit
#
pentest
#
hacking
5
 reactions
Comments
Add Comment
3 min read
Repl.it Open URL Redirection Vulnerability Writeup
Gerald Nash ⚡️
Gerald Nash ⚡️
Gerald Nash ⚡️
Follow
Apr 4 '20
Repl.it Open URL Redirection Vulnerability Writeup
#
security
#
webdev
#
hacking
#
pentest
2
 reactions
Comments
Add Comment
3 min read
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup
Gerald Nash ⚡️
Gerald Nash ⚡️
Gerald Nash ⚡️
Follow
Apr 4 '20
Substack Open URL Redirection / Reflected XSS Vulnerability Writeup
#
security
#
webdev
#
hacking
#
pentest
3
 reactions
Comments
Add Comment
3 min read
How'd I Get Here? Exploiting Redirection
Gerald Nash ⚡️
Gerald Nash ⚡️
Gerald Nash ⚡️
Follow
Apr 4 '20
How'd I Get Here? Exploiting Redirection
#
security
#
webdev
#
hacking
#
pentest
3
 reactions
Comments
Add Comment
4 min read
Week 3: Introduction to John the Ripper
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Apr 2 '20
Week 3: Introduction to John the Ripper
#
security
#
infosec
#
blogpost
#
pentest
6
 reactions
Comments
Add Comment
5 min read
Week 2: Knowing the penetration testing steps
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 26 '20
Week 2: Knowing the penetration testing steps
#
security
#
infosec
#
blogpost
#
pentest
18
 reactions
Comments
1
 comment
4 min read
Week 1: Being conscious about your attack surface
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 19 '20
Week 1: Being conscious about your attack surface
#
security
#
infosec
#
blogpost
#
pentest
7
 reactions
Comments
Add Comment
5 min read
Week 0: Security blog posts introduction
J2RGEZ
J2RGEZ
J2RGEZ
Follow
Mar 13 '20
Week 0: Security blog posts introduction
#
security
#
infosec
#
blogpost
#
pentest
16
 reactions
Comments
Add Comment
2 min read
Writeup: HackTheBox Optimum - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Feb 17 '20
Writeup: HackTheBox Optimum - with Metasploit
#
pentest
#
hacking
5
 reactions
Comments
Add Comment
3 min read
Writeup: HackTheBox Devel - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Feb 17 '20
Writeup: HackTheBox Devel - with Metasploit
#
pentest
#
hacking
4
 reactions
Comments
Add Comment
4 min read
Writeup: HackTheBox Legacy - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Feb 9 '20
Writeup: HackTheBox Legacy - with Metasploit
#
pentest
#
hacking
8
 reactions
Comments
Add Comment
1 min read
Writeup: HackTheBox Lame - with Metasploit
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Feb 9 '20
Writeup: HackTheBox Lame - with Metasploit
#
pentest
#
hacking
10
 reactions
Comments
Add Comment
5 min read
Writeup: SANS Holiday Hack Challenge 2019
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Jan 14 '20
Writeup: SANS Holiday Hack Challenge 2019
#
pentest
#
ctf
#
security
#
hacking
7
 reactions
Comments
2
 comments
16 min read
Writeup: Derbycon 9: Bank of America CTF
Ari Kalfus
Ari Kalfus
Ari Kalfus
Follow
Sep 28 '19
Writeup: Derbycon 9: Bank of America CTF
#
pentest
#
security
#
ctf
#
hacking
12
 reactions
Comments
Add Comment
34 min read
How to set up Metasploitable 3 on macOS Mojave
Arbaoui Mehdi
Arbaoui Mehdi
Arbaoui Mehdi
Follow
Sep 26 '19
How to set up Metasploitable 3 on macOS Mojave
#
metasploit
#
security
#
macos
#
pentest
8
 reactions
Comments
1
 comment
4 min read
10 Useful Tools to Exploit Your Security
Silvio Buss
Silvio Buss
Silvio Buss
Follow
Jul 21 '19
10 Useful Tools to Exploit Your Security
#
security
#
pentest
#
hacking
52
 reactions
Comments
Add Comment
3 min read
Making easier a NoSQLi pentest
Igor Souza Martins
Igor Souza Martins
Igor Souza Martins
Follow
May 14 '19
Making easier a NoSQLi pentest
#
security
#
pentest
#
node
5
 reactions
Comments
Add Comment
2 min read
VAs, Scans and PenTests; not the same thing
Tanya Janca
Tanya Janca
Tanya Janca
Follow
for
Microsoft Azure
Apr 16 '19
VAs, Scans and PenTests; not the same thing
#
pentest
#
security
#
appsec
#
beginners
29
 reactions
Comments
4
 comments
4 min read
How to fully leverage your pentest
Sqreen
Sqreen
Sqreen
Follow
for
Sqreen
Apr 16 '19
How to fully leverage your pentest
#
security
#
bestpractices
#
pentest
9
 reactions
Comments
1
 comment
11 min read
Using the Digispark as a cheap USB Rubber Ducky
Peter Eysermans
Peter Eysermans
Peter Eysermans
Follow
Apr 5 '19
Using the Digispark as a cheap USB Rubber Ducky
#
digispark
#
arduino
#
pentest
#
experiment
7
 reactions
Comments
Add Comment
4 min read
About penetration testing
Uladzislau Murashka
Uladzislau Murashka
Uladzislau Murashka
Follow
Feb 20 '19
About penetration testing
#
penetrationtesting
#
pentest
#
cybersecurity
11
 reactions
Comments
1
 comment
3 min read
loading...
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account