Hydra Practical Labs: Mastering Brute-Force Attacks on Telnet, SSH & HTTP Post date June 29, 2025 Post author By Labby Post categories In bruteforce, cybersecurity, hacking, hydra
The Kill Switch: A Coder’s Act of Revenge Post date June 19, 2025 Post author By Omkar Bhalekar Post categories In attack, code, coders, cyber-attack, fire, hacking, kill-switches, python
Anonymous vs “ICE Air:” GlobaIX Needs A Security Fix Post date May 14, 2025 Post author By Nebojsa "Nesha" Todorovic Post categories In anonymous, anonymous-vs-ice, data-security, hackers, hacking, ice, immigration, trump
Digital Defenders: Meet Syed Shahzaib Shah, Pakistan’s Ethical Hacker Changing the Game Post date May 10, 2025 Post author By YYNEWS Post categories In ethical-hacking, good-company, hacking, indie-hackers, international-cyberspace, syed-shahzaib, who-is-syed-shahzaib, writing-prompts
The Ethical Hacker’s Guide to Hacking WiFi with Termux Post date May 8, 2025 Post author By Stephano Post categories In hacking, tips-to-secure-your-network, wifi, wifi-hacking, wifi-hacking-with-termux, wifi-hacking-with-wipwn, wifi-pixie-dust-attacks, wps-brute-force
Understanding Network Attacks: Types, Impact, and Prevention Strategies Post date April 28, 2025 Post author By Stephano Kambeta Post categories In cybersecurity, hacking, network, networkattack
Hallucination by Design: How Embedding Models Misunderstand Language Post date March 29, 2025 Post author By Ritesh Modi Post categories In ai-applications, artificial-intelligence, future-of-ai, generative-ai, hackernoon-top-story, hacking, investigating-embedding-models, what-are-text-embeddings
RootMe CTF Post date March 17, 2025 Post author By khelil Cherfi Mohamed Farid Post categories In ctf, hacking, linux, security
How to protect yourself against cyber threats Post date February 8, 2025 Post author By Daniel Lacatus Post categories In cybersecurity, hacking, phishing, ransomware
DIY Enthusiast Hacks His Way Into Building His Own Musical Instrument (And It Rocks!) Post date February 5, 2025 Post author By Matteo P. Post categories In build-your-own-bass-guitar, diy-bass-guitar, diy-music-instrument, electronics, hackernoon-top-story, hacking, Music, reverse-engineering
How a Single Open Port Exposed Our Entire Database to Hackers Post date January 28, 2025 Post author By Crafting-Code Post categories In database, hacking, programming, software-development, technology
100% CSS: Fetch and Exfiltrate 512 bits of Server-Generated Data Embedded in an Animated SVG Post date January 17, 2025 Post author By Jane Ori Post categories In css, hacking, svg, webdev
The Curious Case of the $15,000 Spam: My Unexpected Investigation Post date November 2, 2024 Post author By Boopathi Post categories In aws, chatgpt, hacking, webdev
How I Hacked a Colorfit Pro 4 Post date October 13, 2024 Post author By Atul (iamatulsingh) Post categories In ble, cybersecurity, hacking, IoT, penetration-testing, python, reverse-engineering, smart-watch
Understanding Network Hacking Post date October 5, 2024 Post author By S3CloudHub Post categories In hacking, network, networkhacking
An Anti-Facial Recognition Mask: Fighting for Privacy Post date September 27, 2024 Post author By Sukhpinder Singh Post categories In ai, anti-surveillance, hacking, News, privacy, privacy-against-ai, privacy-protection, technology
Unknown Botnet Using Mozilla/5.0 (X11; Linux x86_ User Agent Ignoring Crawl Delay on WordPress Sites Post date September 24, 2024 Post author By Technology News Australia Post categories In botnet, firewall, hacking, ip-address, rules, scraping, spam, wordpress
It’s Estimated That 91% Of Cyber Attacks Begin With Phishing Emails Post date September 22, 2024 Post author By Technology News Australia Post categories In cyberattacks, cybersecurity-awareness, data-breaches, hackernoon-top-story, hacking, phishing, phishing-and-malware, phishing-email
Cache Poisoning: How Hackers Manipulate Web Caches Post date September 5, 2024 Post author By Stealth Security Post categories In cybersecurity, ethical-hacking, hacking, penetration-testing, security
Hackers Tapping into Company Systems to Test Security Features Post date August 30, 2024 Post author By Saeed Ashif Ahmed Post categories In cyber-security-awareness, cyber-threats, cybersecurity, cybersecurity-tips, ethical-hacker, ethical-hacking, hacking, white-hat-hackers
70% Of All Software Hacks Will Be Gone If We Move To Rust Post date August 20, 2024 Post author By Daniel Craciun Post categories In C#, cpp, hacking, programming, rust
Not Knowing About CSRF Will Get You Hacked Post date August 18, 2024 Post author By Daniel Craciun Post categories In cybersecurity, hacking, JavaScript, programming, software engineering
You Can Hack People, Too: The Art of Social Engineering Post date August 13, 2024 Post author By Daily Muck Teresa Post categories In cybersecurity-awareness, hacking, hacking-people, network-security, network-security-basics, social-engineering, social-engineering-attacks, the-art-of-social-engineering
Code Smell 260 – Crowdstrike NULL Post date July 20, 2024 Post author By Maxi Contieri Post categories In cleancode, hacking, null, security
Flipper Zero The Ultimate Guide to Setup Functionality and Technical Insights Post date June 27, 2024 Post author By Eric Dequevedo Post categories In cybersecurity, flipperzero, hacking, IoT
Hacking Chat GPT! Post date June 23, 2024 Post author By Krishi shah Post categories In ai, artificial-intelligence, chatgpt, hacking, programming
Hacking Chat GPT! Post date June 23, 2024 Post author By Krishi shah Post categories In ai, artificial-intelligence, chatgpt, hacking, programming
Hacking Chat GPT! Post date June 23, 2024 Post author By Krishi shah Post categories In ai, artificial-intelligence, chatgpt, hacking, programming
Hacking Chat GPT! Post date June 23, 2024 Post author By Krishi shah Post categories In ai, artificial-intelligence, chatgpt, hacking, programming
How to Create the Ultimate Unstoppable Robotic Combat Unit Post date June 17, 2024 Post author By Thomas Cherickal Post categories In advanced-ai-algorithms, ai, armed-robot-units, gemini-1.5-pro, hacking, incredible-danger, robots, unstoppable-robots
How My College Project Database Got Held For Ransom Post date June 17, 2024 Post author By Tim Juic Post categories In college, cybersecurity, hacking, software-development, technology
AssaultCube | Writing your first external cheat in RustLang Post date June 16, 2024 Post author By Zofia Post categories In gamedev, hacking, reversing
8 Dangerous PowerShell Commands That Will Break A Computer Post date April 23, 2023 Post author By Dr. Ashish Bamania Post categories In hacking, powershell, programming, software-development, technology
The Dark Web: A Hidden World Revealed Post date April 21, 2023 Post author By Pannaga Perumal Post categories In beginners, darkweb, hacking, techtalks
Hack The Box – Encoding [Medium] – Walkthrough Post date February 18, 2023 Post author By Dimitar Post categories In hacking, hackthebox
Hack The Box – Vessel [Hard] – Walkthrough Post date February 18, 2023 Post author By Dimitar Post categories In hacking, hackthebox, pentest, python
Advent of Cyber 2 writeup: The trial before Christmas Post date February 10, 2023 Post author By Aleksey Post categories In ctf, cybersecurity, hacking, infosec, technology
Meet George Hotz, The Hacker Elon Musk Hired to Resurrect Twitter Post date January 9, 2023 Post author By The woman Post categories In apple, hacking, programming, technology, twitter
Jonathon James — The Teenager Who Hacked Nasa Committed Suicide in The end Post date December 6, 2022 Post author By The woman Post categories In hacking, nasa, programming, technology
How to setup Metasploitable in a Mac with M1 chip Post date November 30, 2022 Post author By merlos Post categories In hacking, mac, security, tutorial
A Step-By-Step Guide to Crack Wifi Password with Python Post date November 28, 2022 Post author By Peng Cao Post categories In coding, hacking, programming, python, wifi
Cracking Your Encryption Is Damn Simple Post date October 17, 2022 Post author By Luca Piccinelli Post categories In coding, cracking, encryption, hacking, programming
Dynamic Linker Hijacking Experiments – Evasive Techniques (Part 2) Post date October 8, 2022 Post author By Dimitar Post categories In devjournal, hacking, linux, malware
10 Most Dangerous Hackers Of All Time Post date September 15, 2022 Post author By The woman Post categories In hacking, programming, technology
Ferramentas não-devs pra fazer sua carreira decolar Post date September 5, 2022 Post author By Fabiana Rodrigues Post categories In beginners, hacking, tips
Cracking a hashed password with hashcat Post date June 16, 2022 Post author By wrongbyte Post categories In hacking, security
2 hours of fun completing the game. 20+ hours of fun hacking the game. Post date April 27, 2022 Post author By James Read Post categories In hacking, reverse-engineering, speedrun
🚀 Space Heroes 2022 CTF write-up Post date April 4, 2022 Post author By Krypton Post categories In challenge, ctf, hacking, space
3 Movies About Hacking That Will Make You Think Twice. Post date March 20, 2022 Post author By MisterJay Post categories In hacking, movies, whoami
One-click attack nima? Post date March 16, 2022 Post author By DEV Community Post categories In beginners, dotnet, hacking, uzbek
How I hacked My Neighbor’s Wi-Fi 📶 Post date March 8, 2022 Post author By DEV Community Post categories In challenge, hacking, linux, tutorial