Skip links

  • Skip to primary navigation
  • Skip to content
  • Skip to footer
Menu
  • Home
  • Tags
  • Search

HackGPTDeveloper: Exploring Cybersecurity with AI

Never stop learning, stay hungry.

50 React Development Rules with Examples (Part2)

June 13, 2025

50 React Development Rules with Examples

June 13, 2025

Exploring and investigating the vulnerabilities of a GraphQL implementation

June 10, 2025

GitHub Tools and its problems: Actions, Marketplace, and Extensions

June 8, 2025

Top 10 statistical principle that pushed data science to dominant position in AI

June 7, 2025

Vulnerabilities in AI Pipelines

June 7, 2025

Techniques for Discovering Vulnerabilities using AI Pipeline engine

June 7, 2025

AI assisted chat popup implementation (with server)

June 7, 2025

AI assisted chat

June 7, 2025

What is swagger.json and it is used in recon for enumerating attacking APIs

May 24, 2025

How to hide in memory without being detected by any scanner

May 24, 2025

50 attack surface for a webapp

May 24, 2025

10 examples of cloud migration scenario

May 24, 2025

20 Gamification Ideas for Teenager-AI Dialogue

May 9, 2025

Rotating IP addresses using Squid and Docker

April 22, 2025

What are the purposes of rotating IP addresses

April 22, 2025

20 Gamification Ideas for Teenager-AI Dialogue

April 20, 2025

Dialogue generation experiment

April 20, 2025

list of 50 different patterns that could lead to a CSRF vulnerability

April 9, 2025

50 distinct CORS misconfiguration patterns

April 9, 2025

100 patterns for Web Application Firewall (WAF) bypass

April 9, 2025

postMessage() usage

April 7, 2025

iframe internals when design applications

April 7, 2025

Chrome browser extension for webapp security

April 7, 2025

Hugging Face for video generation

April 2, 2025

Building a Text-to-Speech (TTS) system

April 1, 2025

Building a Retrieval-Augmented Generation (RAG) system

April 1, 2025

Prototype pollution leading to XSS

March 29, 2025

HPROF dump file

March 28, 2025

Time Series Database

March 27, 2025

50 key characteristics of Agile development

March 12, 2025

10 examples of coding with Redis using different programming languages and Redis functionalities

March 12, 2025

100 key aspects of Redis

March 12, 2025

Why is UNION Query-Based SQLi the Fastest SQL Injection Type?

March 2, 2025

Top 100 common compilation and runtime errors encountered in Visual Studio IDE environment

March 2, 2025

Comparing different LLM models: what are the key differentiator

March 2, 2025

DeepSeek: key characteristics that differentiate DeepSeek’s LLM implementations

March 2, 2025

中国谚语: 涵盖了智慧、人生、道德、时间、友谊、家庭、成功等多个方面。

March 2, 2025

Catch the Hearts - Valentine’s Day Game

February 14, 2025

Move your mouse to generate hearts!

February 14, 2025

Comparing DeepSeek and ChatGPT: 30 different ways of using X-FORWARDED-FOR header

February 1, 2025

10 different ways of using proxychains

January 26, 2025

10 different ways you can use Postman

January 26, 2025

10 different ways of using React Hooks with examples

January 26, 2025

Client Side CSP Bypass

January 23, 2025

Bypassing a Web Application Firewall (WAF) for XSS exploits

January 23, 2025

Double Ping Pong Game by ClaudeAI

January 21, 2025

Privilege escalation in Linx

January 18, 2025

30 different stealing authentication tokens mechanism

January 10, 2025

top 30 CSP bypass techniques

January 9, 2025

Top 100 Content Security Policy (CSP) features

January 9, 2025

Top GitLab’s bug bounty program hunters

January 9, 2025

60 jQuery exercises

January 2, 2025

60 AngularJS exercises

January 2, 2025

50 different Wireshark or TCPDump filters for network anomalies detection

January 2, 2025

30 common mistakes in JSON Web Tokens (JWT) : authentication or authorization

January 1, 2025

Tools for deobfuscating, decoding, or decrypting JavaScript (II)

December 26, 2024

Tools for deobfuscating, decoding, or decrypting JavaScript

December 26, 2024

20 examples of using gobuster for directory traversal and discovery

December 24, 2024

20 command-line examples to enumerate SNMP (Simple Network Management Protocol) information

December 24, 2024

Identifying Access Control Bugs

December 24, 2024

Identifying access control bugs through automation

December 24, 2024

Opensource Security Operation Centers and Incident Response system

December 20, 2024

Linux user space rootkit technologies

December 20, 2024

Linux kernel rootkits

December 20, 2024

Linux C2 attack emulation

December 20, 2024

Continuity of thoughts problems in AI

December 20, 2024

Using Groq to build AI agents framework

December 19, 2024

Process of AI agent implementations using Groq

December 19, 2024

AI agents framework

December 19, 2024

Implement a AI agent for bug hunting

December 19, 2024

RFCs related to load balancers and their associated protocols

December 12, 2024

Assetnote.io Vulnerabilities Writeup

December 12, 2024

100 differeny ways to test WordPress vulnerabilities

December 11, 2024

Path traversal vulnerability and how its different types of manifestation

December 10, 2024

List of linux privilege escalation methods

December 9, 2024

Examples of development of applications using Amazon Bedrocks

December 8, 2024

400 Plus questions to test any generative AI system

December 8, 2024

100 ways of API Hacking

December 8, 2024

100 ways to achieve privilege escalation in Linux

December 8, 2024

Odoo Setup Guides

December 6, 2024

Crypto Currency Setup Notes

December 6, 2024

Variable Petal Lines Animation

December 5, 2024

Microsoft Entra: SSO design from the start

December 5, 2024

How to run Android headless in the cloud

December 5, 2024

Epitrochoid (v2) Curves

December 5, 2024

Epitrochoid Curves

December 5, 2024

Double polygon double rotation

December 5, 2024

AI generated checklist: Apache Kafka

December 5, 2024

List of LangChain applications

December 5, 2024

Chasing polygon

December 5, 2024

Adding two hypotrochoid curves

December 4, 2024

Joining points on the hypotrochoids

December 4, 2024

Joining points on the circle

December 4, 2024

Joining points on the hypotrochoids (generalized)

December 4, 2024

Three Flower in Motion (v3)

December 3, 2024

Flower in Motion (v2)

December 3, 2024

Hypotrochoid Curves with Slow Rotation and Offset Control

December 3, 2024

Hypotrochoid Curves with Rotation and Offset Control

December 3, 2024

Hypotrochoid Curve (v4)

December 2, 2024

Flower in Motion

December 2, 2024

Epicycloid Curves

December 2, 2024

Epicycloid Curves

December 2, 2024

Epicycloid Curves

December 2, 2024

Hypotrochoid Curve (v3)

December 1, 2024

Donut animation drawn using characters

December 1, 2024

Hypotrochoid Curve (v2)

November 30, 2024

Hypotrochoid Curves with Scrollbars, Labels, and Color Picker

November 30, 2024

Hypotrochoid Curves (save as PNG feature)

November 30, 2024

Vortex Parametric Equation Visualization

November 28, 2024

Generalized Cardioid Shape

November 28, 2024

Dynamic Petals

November 28, 2024

Dynamic Petals with Red-Blue-Yellow Gradient

November 28, 2024

Animated Sinusoidal Wave on Ellipse

November 27, 2024

Polygon Midpoint Generator

November 25, 2024

Polygon with Colored Lines

November 25, 2024

Epicycloid Curves with Petal with Scrollbars, Labels, and Color Picker

November 25, 2024

Variable Petal Lines Animation

November 24, 2024

Variable Petal Lines Animation

November 24, 2024

Variable Petal Lines Animation

November 24, 2024

Square with Colored Lines

November 24, 2024

Generalized chasing rotating polygon

November 24, 2024

Parametric Equation Visualization with Rotation

November 23, 2024

Drawing double polygon

November 23, 2024

Pentagon with Colored Line

November 22, 2024

Chasing rotating triangle

November 22, 2024

Drawing chasing triangle

November 22, 2024

Chasing and rotating square

November 22, 2024

Chasing on square

November 22, 2024

Chasing on rotating pentagon

November 22, 2024

Chasing pentagon

November 22, 2024

Chasing lines on rotating hexagon

November 22, 2024

Chasing lines and running color

November 22, 2024

Chasing diagram on rotating hexagon

November 22, 2024

Chasing on hexagon

November 22, 2024

Chasing diagram on diamond around a diamond

November 22, 2024

Chasing diagram on a circle

November 22, 2024

Chasing diagram on hexagon around hexagon animated with color.

November 22, 2024

Chasing hexagon around hexagon

November 22, 2024

Chasing diagram on pentagon around pentagon

November 22, 2024

Chasing diagram on squares around squares

November 22, 2024

Chasing diagram inside a square

November 22, 2024

Triangle around triangle with chasing diagram

November 22, 2024

Chasing diagram on triangle

November 22, 2024

© 2025 HackGPTDeveloper: Exploring Cybersecurity with AI. Powered by Jekyll & So Simple.