DEV Community

# hacker

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Day 1 - Learning Bug Bounty

Day 1 - Learning Bug Bounty

Comments
1 min read
Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

Beyond the Hoodie: What “Thinking Like an Attacker” Actually Means

1
Comments 2
5 min read
LiveShell — Interactive Reverse Shell Generator

LiveShell — Interactive Reverse Shell Generator

10
Comments 1
2 min read
BYOD or BYOB? Why Bring Your Own Device Often Means Bring Your Own Breach

BYOD or BYOB? Why Bring Your Own Device Often Means Bring Your Own Breach

Comments
2 min read
My Journey into Programming: From Curiosity to Code

My Journey into Programming: From Curiosity to Code

Comments
1 min read
Threat Hunting With ZoomEye 2025

Threat Hunting With ZoomEye 2025

Comments
5 min read
Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Comments
3 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)

Boring Cybersecurity Theory: Hats (Understand Attackers)

1
Comments
5 min read
ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

1
Comments
2 min read
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

1
Comments
2 min read
Hacker Using Metasploit and Nmap for Offensive Security in 2025

Hacker Using Metasploit and Nmap for Offensive Security in 2025

7
Comments
1 min read
Kevin Mitnick: The Life and Legacy of the World's Most Notorious Hacker

Kevin Mitnick: The Life and Legacy of the World's Most Notorious Hacker

Comments
5 min read
Week 3 - You're not Stuck - You just skipped the Basics: What Really Happens When You Type a URL?

Week 3 - You're not Stuck - You just skipped the Basics: What Really Happens When You Type a URL?

3
Comments 4
2 min read
🚨 Cyber Attack Alert

🚨 Cyber Attack Alert

2
Comments
1 min read
The Rise of Autonomous Hacking: AI Attacks Without Hackers

The Rise of Autonomous Hacking: AI Attacks Without Hackers

Comments
2 min read
👋 Sign in for the ability to sort posts by relevant, latest, or top.