33 Stories To Learn About Hacks

Written by learn | Published 2023/09/12
Tech Story Tags: hacks | learn | learn-hacks | cybersecurity | hacking | web-monetization | hacker

TLDRvia the TL;DR App

Let's learn about Hacks via these 33 free stories. They are ordered by most time reading created on HackerNoon. Visit the /Learn Repo to find the most read stories about any technology.

1. How to Use PKHex On Switch to Mod Pokemon Scarlet & Violet

Here's how to use PKHex on the Nintendo Switch to edit what Pokemon are in your party.

2. "Hackers Need To Get Lucky Only Once" - Excerpts on Fighting Crypto Hacks, Theft and Fraud

What do trust & safety leaders expect in 2022 with the rise of blockchain and crypto? Find out why next year is the year for compliance, regtech, trust & safety

3. How to Spy on an iPhone Without The User Knowing

Learn how to use the latest spy apps to monitor an iPhone remotely! Discover step-by-step instructions on how to spy on an iPhone without them knowing.

4. Introduction to One Gadget: A Necessary Tool for Exploitation

This post uses a concrete CTF problem to show you step-by-step how to find and execute a one gadget and eventually spawn a shell.

5. 3 Impressive Cyberattacks of 2020: What we Can Learn From Them

When it comes to cyberattacks, everybody is at risk, whether it be big corporations, government bodies, small businesses, or private individuals.

6. DAI/USDC/USDT Free Transfer?

DAI/USDC/USDT Free Transfer?

7. 3 Flipper Zero Hacks to Wow Your Friends (and How They Work)

It is theoretically possible to use these Flipper Zero hacks for nefarious purposes, including the tricks in this article. But you know…don’t do that.

8. How to Hack Someone's Phone Remotely

There are many Hackers in this world who may be currently watching your activities daily and will try to snatch your personal information from you.

9. GoDaddy Hit with Widespread Redirect Hack

Over the last few days, website owners, specifically those hosting on GoDaddy, have been experiencing strange redirects to various websites.

10. Can you Hire a Hacker on the Dark Web?

If you are here, you have probably heard about how to hire a hacker on the dark or deep web. Using regular web browsers, we can only have access to four percent of the net. The other 96% must be accessed through a unique browser, Tor.

11. 5 Secrets to Making More Money as a Gig Driver on Uber, Lyft, and More

To take full advantage of the rapidly growing ride-sharing and delivery market, we offer 5 hacks for drivers to maximize their profits by identifying problems.

12. How Do I Sending Non Printing Character On Some Apps

This morning I just thinking how to send an empty message on Standuply channel(Slack). Fortunately, I just found an answer at stackexchange, also an article on wikipedia about non-printing character.

13. Recent Hacks in the Crypto and Defi Spaces Show the Security Loopholes

Over the past year, we have seen a massive jump in activity and value for the crypto and decentralized finance (DeFi) spaces.

14. How to Get Unlimited Cloud Storage on Telegram App

Unlimited cloud storage for storing photos, videos, and files using the Telegram App. The best alternative to Google Drive and Google Photos.

15. 10 Coding Hacks to Remember in 2023

Let’s take a look at some of the best coding hacks to remember in the new year.

16. Changes and Trends in DeFi Security

Ever since it emerged in mid-2020, DeFi has been a major trend in the cryptocurrency industry, which was (and still is) quite understandable. It brought a way to make money passively, it enabled loans that you can get in exchange for providing collateral, but most importantly, it allowed you to use your existing money to make more money, without the risks that accompany crypto trading.

17. Secret Tecniques To Improve Dependency Resolution On App Class Loader

Recently I had the need to change certain classes -from external dependencies- loaded on a Spring Boot application. All this happened in a very restrictive environment, where I was not allowed to use other libraries or tweak the JRE, it was only possible to modify the fat JAR and environment variables or system properties.

18. The Infamous Hacker Bjorka's Top 7 Leaks that Shocked the Public

In addition to sharing personal data of essential people in Indonesia, Bjorka also studied death cases such as Munir and Brigadier J. Who was Bjorka?

19. How to protect against cyberthreats while employees work from home

With the COVID-19 pandemic, more and more employees have had to work from home, creating new cybersecurity challenges for businesses. Some workers will have to relearn everything about cybersecurity because they must keep their work documents and email secure even on their home network.

20. How to Use Airtable as a CMS for a Startup

Lear how you can speed up the process of product creation and how you can create an admin panel in the shortest possible time with Airtable

21. How to Get Your Android Phone Read Your Texts to You

Give your eyes a rest and permit your Android gadget to peruse your writings to you. This element (just as sending writings utilizing your voice) is accessible through Google and the free applications that you can download from Google Play. Here are the manners in which you can make your Android read instant messages.

22. Getting Into a Flow State and Bringing Your A-Game

The flow state: A state of hyperfocus where you perform at an amazing level. Read about our different approaches to getting into this wellspring of focus.

23. How to Exploit the Heap Overflow Bug *CTF 2019 oob-v8

This post shows you how to exploit a v8 heap overflow bug - *CTF 2019 oob-v8. It presents two novel points: similar exploitation, primitive escalation.

24. DAOMaker and Eminence Included in The Biggest DeFi Hacks of 2020

Decentralized finance (DeFi) was created back in 2015, when the pioneer application, MakerDAO, allowed any crypto holders to take out loans in the DAI stablecoin. Years of steady growth followed and a palpable buzz around DeFi started to emerge in the crypto community, leading to the breakout year that was 2020.

25. Nintendo Files Lawsuit and Wins Injunction Against Switch Mod & Pirate Game Seller

In 2018, Nintendo filed a lawsuit against a California man accused of selling pirated Nintendo games, modding devices, and modding services.

26. What Is the Purpose of Hacking Gambling Sites?

The online gambling industry is a lucrative target for various fraudsters and hackers. Mainly, it’s because casino websites are a gateway to the customers’ credit cards, bank accounts, and other sensitive data. By hacking an online casino, malicious actors can easily get access to the financial and/or personal info of clients. However, there are more reasons for the growing number of gambling-related hacks. What are they? Let’s figure out.

27. How To Fool Prices: Price Discrimination in the Digital Economy

Price discrimination have been around for years. It is seen as a benefit for both companies and buyers, but there is a line that price discrimination can cross to become illegal and harmful for our digital life.

28. A Linux Cheat-sheet So Good, You'll Want to Save It

Are you a Linux admin or want to? this is a list of Linux tricks that you might know.

29. How do You Hack Whatsapp Chats? - 7 Vulnerabilities Explained

You can Hack WhatsApp chats by syncing the web version of the app, exporting chat logs, using POCWAPP, WhatsAPP Scan Pro, spoofing, and spy apps.

30. The Biggest Recent Cryptocurrency Hacks: What Is Behind Them?

2021 was marked by multiple DeFi frauds, with rug-pulls and exit scams being among the most popular.

31. How to Convert Your Android Device Into a Hacking Machine

In this article, I discuss how you can convert one android phone into a fully working Kali Linux hacking machine.

32. Decoding the Biggest Blockchain Hacks and Blockchain Cybersecurity with Yotam Dar

This interview with blockchain cybersecurity expert Yotam Dar discusses blockchain cybersecurity and blockchain hacks in detail and with case studies.

33. Pokémon Radical Red: The Perfect Reimagining of a Classic

Pokémon Radical Red is one of the best Pokémon ROM hacks available and should be played by any franchise fan.

Thank you for checking out the 33 most read stories about Hacks on HackerNoon.

Visit the /Learn Repo to find the most read stories about any technology.


Written by learn | Lets geek out. The HackerNoon library is now ranked by reading time created. Start learning by what others read most.
Published by HackerNoon on 2023/09/12