
HackingHub
@hackinghub_io
Educating the next generation of ethical hackers.
You might like
My @defcon 33 video "Regex For Hackers" is finally out on YouTube: youtube.com/watch?v=mYC-rQ… For only 24 hours you can grab my "Regex For Hackers" course on @hackinghub_io for only $10 ( that's $40 off ) using the voucher REGEX24, it'll never be this cheap again! Please share so…
youtube.com
YouTube
DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben...
Reverse-engineer a real-world exploit on CypherDrive. The CypherDrive lab breaks down the attack chain: DNS Brute-forcing, Account Takeover via Insecure Password Reset, and Client-Side 2FA Evasion. Ready to learn? Get Started: app.hackinghub.io/hubs/cypherdri…

Getting blocked by servers while using cURL? Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header, like this: curl "https: //hackinghub[.]io" -A "<NEW-USER-AGENT>"
![hackinghub_io's tweet image. Getting blocked by servers while using cURL?
Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools.
Try changing your User-Agent header, like this:
curl "https: //hackinghub[.]io" -A "&lt;NEW-USER-AGENT&gt;"](https://pbs.twimg.com/media/G3PtkzQXkAE9Bed.jpg)
Got two hours to learn Blind XSS? @NahamSec condenses the exact, battle-tested process he used to earn $250k+ from BXSS into a hands-on course. You’ll learn: ✅ Correct BXSS lab setup ✅ Where blind XSS hides ✅ Common mistakes to avoid Get Started: tinyurl.com/hackinghub
Unlock Server-Side RCE success with these core principles: 1️⃣Find the Vector: RCE is the impact; focus on entry points (cmd inj, SSTI, SSRF). 2️⃣Enumerate: Recon is key. ID tech/versions to find exploits. 3️⃣Think like an Attacker. Learn interactive RCE: tinyurl.com/HubRCE

Dive Inside HackingHub and explore Missions! These aren't one-and-done challenges. Our Missions are multi-step, comprehensive tasks designed to simulate real-world engagements. It's time for a deeper dive. Are you up for the challenge? Sign up now: app.hackinghub.io/hubs

✅Pro tip: Don't miss a step! Here's a powerful one-liner using @pdiscoveryio to automate your enumeration: find subdomains, filter for live hosts, check for web servers, and use tee to save the results of each stage to a file.

Stuck in theory with no hands-on experience? Our Hands-On Web Exploitation course by @NahamSec and @BuildHackSecure you how to find bugs through practical labs, pro strategies, and a cert that proves your skills. Sign up today👇 app.hackinghub.io/hubs/nahamsec-…

In our Regex For Hackers course, @nahamsec and @BuildHackSecure will take you from basic pattern matching to real-world hacking applications in under 3 hours. Access the course: tinyurl.com/Regexforhackers

Getting blocked by servers while using cURL? Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header, like this: curl "https://hackinghub[.] io" -A "<NEW-USER-AGENT>"
![hackinghub_io's tweet image. Getting blocked by servers while using cURL?
Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools.
Try changing your User-Agent header, like this:
curl "https://hackinghub[.] io" -A "&lt;NEW-USER-AGENT&gt;"](https://pbs.twimg.com/media/G2mGT5qW8AASlNt.jpg)
Want to be part of the conversations and meet the community? Join us on Discord! ➡️ Join here: discord.com/invite/Nnde3Yp…

Plans for Saturday? RemoteBinge is a Netflix-inspired hub where you can exploit a remote command execution vulnerability to gain safe, authorized control of a test app. Ready to try it? Get started here 👉 app.hackinghub.io/hubs/remotebin…
What if your app could keep a constant two-way connection and send data in real time? That’s what WebSockets do. At NahamCon 2025, @InsiderPhD showed how WebSockets work and how to exploit them. 👉 Try it yourself in the demo lab she built for the talk: tinyurl.com/nahamcon25
United States Trends
- 1. Flacco 51K posts
- 2. Bengals 59K posts
- 3. Bengals 59K posts
- 4. Ramsey 15.2K posts
- 5. Tomlin 12.4K posts
- 6. Chase 95.5K posts
- 7. Chase 95.5K posts
- 8. #TNFonPrime 4,274 posts
- 9. #WhoDey 4,303 posts
- 10. #HereWeGo 9,425 posts
- 11. #PITvsCIN 5,719 posts
- 12. Teryl Austin 1,070 posts
- 13. Max Scherzer 9,892 posts
- 14. Zac Taylor 2,031 posts
- 15. Darnell Washington 2,270 posts
- 16. Ace Frehley 80.8K posts
- 17. Cuomo 67K posts
- 18. DK Metcalf 3,293 posts
- 19. Andrew Berry 1,565 posts
- 20. #criticalrolespoilers 3,945 posts
You might like
-
XSS Payloads
@XssPayloads -
The Bug Bounty Hunter
@tbbhunter -
Pentester Land
@PentesterLand -
Sam Curry
@samwcyo -
Altered Security
@AlteredSecurity -
ProjectDiscovery
@pdiscoveryio -
InfoSec Community
@InfoSecComm -
Patrik Fehrenbach
@ITSecurityguard -
Suraj
@PwnFunction -
Nuclei by ProjectDiscovery
@pdnuclei -
Adam Langley
@BuildHackSecure -
Farah Hawa
@Farah_Hawaa -
todayisnew
@codecancare -
Nicolas Grégoire
@Agarri_FR -
Tib3rius
@0xTib3rius
Something went wrong.
Something went wrong.