Forem

# hacker

Posts

👋 Sign in for the ability to sort posts by relevant, latest, or top.
Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025
Cover image for Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Inside the Hacker’s Playbook: How Your Passwords Are Cracked in 2025

Comments
3 min read
SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

SHENRON (Part 3): Mutation, Misdirection, and Modern Anti Forensics

1
Comments
2 min read
Boring Cybersecurity Theory: Hats (Understand Attackers)
Cover image for Boring Cybersecurity Theory: Hats (Understand Attackers)

Boring Cybersecurity Theory: Hats (Understand Attackers)

1
Comments
5 min read
ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

ScarCruft’s Sophisticated Malware Attack: Rust, PubNub, and Compromised Repos

1
Comments
2 min read
Guide pratique pour sécuriser votre PME contre les cybermenaces

Guide pratique pour sécuriser votre PME contre les cybermenaces

Comments
1 min read
🧠 Metasploit Framework: The Hacker’s Swiss Army Knife 🔐💻

🧠 Metasploit Framework: The Hacker’s Swiss Army Knife 🔐💻

5
Comments
2 min read
Hacker Using Metasploit and Nmap for Offensive Security in 2025
Cover image for Hacker Using Metasploit and Nmap for Offensive Security in 2025

Hacker Using Metasploit and Nmap for Offensive Security in 2025

6
Comments
1 min read
Kevin Mitnick: The Life and Legacy of the World's Most Notorious Hacker
Cover image for Kevin Mitnick: The Life and Legacy of the World's Most Notorious Hacker

Kevin Mitnick: The Life and Legacy of the World's Most Notorious Hacker

Comments
5 min read
Week 3 - You're not Stuck - You just skipped the Basics: What Really Happens When You Type a URL?
Cover image for Week 3 - You're not Stuck - You just skipped the Basics: What Really Happens When You Type a URL?

Week 3 - You're not Stuck - You just skipped the Basics: What Really Happens When You Type a URL?

3
Comments 4
2 min read
🚨 Cyber Attack Alert
Cover image for 🚨 Cyber Attack Alert

🚨 Cyber Attack Alert

2
Comments
1 min read
The Rise of Autonomous Hacking: AI Attacks Without Hackers

The Rise of Autonomous Hacking: AI Attacks Without Hackers

Comments
2 min read
XSS URL Analysis and SQL Injection Workflow

XSS URL Analysis and SQL Injection Workflow

Comments
4 min read
Recap of the Next.js Bug That Got Apps Hacked (And How to Protect Yours)

Recap of the Next.js Bug That Got Apps Hacked (And How to Protect Yours)

1
Comments
2 min read
Censys.io

Censys.io

Comments
2 min read
Whois

Whois

Comments
1 min read
Segurança da Informação

Segurança da Informação

Comments
2 min read
How AI is Transforming Ethical Hacking and Cybersecurity

How AI is Transforming Ethical Hacking and Cybersecurity

Comments
2 min read
Why Kenyan Top Tech Companies Would Secretly Engage LIQU3D for Ethical Operations
Cover image for Why Kenyan Top Tech Companies Would Secretly Engage LIQU3D for Ethical Operations

Why Kenyan Top Tech Companies Would Secretly Engage LIQU3D for Ethical Operations

1
Comments
2 min read
🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security
Cover image for 🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security

🔐 Demystifying Penetration Testing: A Hacker’s Mindset for Better Security

2
Comments
2 min read
Como 'hackear' a linguagem de programação Ter/Terlang
Cover image for Como 'hackear' a linguagem de programação Ter/Terlang

Como 'hackear' a linguagem de programação Ter/Terlang

1
Comments
3 min read
LAKASA-WIFI - Wi-Fi Connection Script
Cover image for LAKASA-WIFI - Wi-Fi Connection Script

LAKASA-WIFI - Wi-Fi Connection Script

Comments
1 min read
From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading
Cover image for From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

From Code to Capital: The Hacker Mindset Revolutionizing Algorithmic Trading

Comments
3 min read
El Astrónomo que Derrotó a un Hacker 🚨💻
Cover image for El Astrónomo que Derrotó a un Hacker 🚨💻

El Astrónomo que Derrotó a un Hacker 🚨💻

3
Comments 1
3 min read
How to Become a Successful Bug Hunter: A Comprehensive Guide
Cover image for How to Become a Successful Bug Hunter: A Comprehensive Guide

How to Become a Successful Bug Hunter: A Comprehensive Guide

3
Comments
3 min read
El futuro del desarrollo de software: por qué los creadores de productos tomarán el control
Cover image for El futuro del desarrollo de software: por qué los creadores de productos tomarán el control

El futuro del desarrollo de software: por qué los creadores de productos tomarán el control

2
Comments 1
5 min read
loading...