Skip to content
Navigation menu
Search
Powered by Algolia
Search
Log in
Create account
DEV Community
Close
#
pentest
Follow
Hide
Posts
Left menu
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
Right menu
Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective
kt
kt
kt
Follow
Jan 30
Kubernetes Pentest Methodology: Cluster Security from an Attacker's Perspective
#
kubernetes
#
security
#
pentest
#
rbac
Comments
Add Comment
3 min read
Cracking the Shell: Enumerating SMB and SSH in the INE Skill Check Lab
James K.
James K.
James K.
Follow
Jan 4
Cracking the Shell: Enumerating SMB and SSH in the INE Skill Check Lab
#
cybersecurity
#
pentest
Comments
Add Comment
4 min read
🚀 AstralGuard Cyber Night Talk: Exploring the Future of AI & Cybersecurity 🛡️🤖
Dallen Sadru
Dallen Sadru
Dallen Sadru
Follow
Nov 27 '25
🚀 AstralGuard Cyber Night Talk: Exploring the Future of AI & Cybersecurity 🛡️🤖
#
cybersecurity
#
ethicalhacking
#
pentest
#
ai
Comments
Add Comment
2 min read
Linux Filesystem Hierarchy
Sehran Rasool Jan
Sehran Rasool Jan
Sehran Rasool Jan
Follow
Nov 1 '25
Linux Filesystem Hierarchy
#
linux
#
ubuntu
#
devops
#
pentest
1
reaction
Comments
Add Comment
2 min read
Hacking Hidden Paths with ffuf - Web Fuzzing Made Simple
Jadi
Jadi
Jadi
Follow
Aug 20 '25
Hacking Hidden Paths with ffuf - Web Fuzzing Made Simple
#
web
#
fuzz
#
security
#
pentest
Comments
Add Comment
1 min read
MCP + VS Code: Assisted pentest on an HTB box — from install to first flag
Tristan Veyet
Tristan Veyet
Tristan Veyet
Follow
Aug 14 '25
MCP + VS Code: Assisted pentest on an HTB box — from install to first flag
#
cybersecurity
#
automation
#
opensource
#
pentest
Comments
Add Comment
14 min read
Hack The Box - Redeemer (Redis)
Adhishri Kothiyal
Adhishri Kothiyal
Adhishri Kothiyal
Follow
Sep 1 '25
Hack The Box - Redeemer (Redis)
#
programming
#
pentest
#
hackthebox
#
security
2
reactions
Comments
Add Comment
5 min read
HackTeam.RED: From API Keys to Full Infrastructure Compromise
KL3FT3Z
KL3FT3Z
KL3FT3Z
Follow
Aug 26 '25
HackTeam.RED: From API Keys to Full Infrastructure Compromise
#
cybersecurity
#
redteam
#
pentest
#
cloudnative
21
reactions
Comments
12
comments
4 min read
The Art of Recon: What Happens When a Target Only Has One Door?
Samuel Adeduntan
Samuel Adeduntan
Samuel Adeduntan
Follow
Aug 22 '25
The Art of Recon: What Happens When a Target Only Has One Door?
#
infosec
#
nmap
#
reconnaissance
#
pentest
Comments
Add Comment
4 min read
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data
Samuel Adeduntan
Samuel Adeduntan
Samuel Adeduntan
Follow
Aug 21 '25
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data
#
vulnerabilities
#
databreach
#
pentest
#
webappsecurity
Comments
Add Comment
5 min read
Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown
Leon Fazliu
Leon Fazliu
Leon Fazliu
Follow
Jul 2 '25
Misusing OAuth 2.0 Client Credentials in Public Apps — A Security Breakdown
#
cybersecurity
#
security
#
oauth
#
pentest
Comments
Add Comment
1 min read
Getting Started - Web Enumeration Walkthrough (Hack The Box) [Hindi]
madhiashabih
madhiashabih
madhiashabih
Follow
Jul 30 '25
Getting Started - Web Enumeration Walkthrough (Hack The Box) [Hindi]
#
hindi
#
pentest
#
hackthebox
Comments
Add Comment
1 min read
Getting Started - Web Enumeration Walkthrough (Hack The Box) [Urdu]
madhiashabih
madhiashabih
madhiashabih
Follow
Jul 30 '25
Getting Started - Web Enumeration Walkthrough (Hack The Box) [Urdu]
#
urdu
#
pentest
#
hackthebox
Comments
Add Comment
1 min read
Getting Started - Web Enumeration Walkthrough (Hack The Box)
madhiashabih
madhiashabih
madhiashabih
Follow
Jul 30 '25
Getting Started - Web Enumeration Walkthrough (Hack The Box)
#
pentest
#
hackthebox
#
webenumeration
Comments
Add Comment
1 min read
Инструменты пентестера: nmap, sqlmap, netcat – Исследование, Эксплуатация, Взаимодействие
CyberSec Pro
CyberSec Pro
CyberSec Pro
Follow
Jul 15 '25
Инструменты пентестера: nmap, sqlmap, netcat – Исследование, Эксплуатация, Взаимодействие
#
cybersecurity
#
pentest
#
netcat
#
nmap
Comments
Add Comment
2 min read
👋
Sign in
for the ability to sort posts by
relevant
,
latest
, or
top
.
We're a place where coders share, stay up-to-date and grow their careers.
Log in
Create account