hackinghub_io's profile picture. Educating the next generation of ethical hackers.

HackingHub

@hackinghub_io

Educating the next generation of ethical hackers.

HackingHub reposted

My @defcon 33 video "Regex For Hackers" is finally out on YouTube: youtube.com/watch?v=mYC-rQ… For only 24 hours you can grab my "Regex For Hackers" course on @hackinghub_io for only $10 ( that's $40 off ) using the voucher REGEX24, it'll never be this cheap again! Please share so…

BuildHackSecure's tweet card. DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben...

youtube.com

YouTube

DEF CON 33 - Regex For Hackers - Adam 'BuildHackSecure' Langley, Ben...


Reverse-engineer a real-world exploit on CypherDrive. The CypherDrive lab breaks down the attack chain: DNS Brute-forcing, Account Takeover via Insecure Password Reset, and Client-Side 2FA Evasion. Ready to learn? Get Started: app.hackinghub.io/hubs/cypherdri…

hackinghub_io's tweet image. Reverse-engineer a real-world exploit on CypherDrive.

The CypherDrive lab breaks down the attack chain: DNS Brute-forcing, Account Takeover via Insecure Password Reset, and Client-Side 2FA Evasion.

Ready to learn?

Get Started: app.hackinghub.io/hubs/cypherdri…

Getting blocked by servers while using cURL? Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header, like this: curl "https: //hackinghub[.]io" -A "<NEW-USER-AGENT>"

hackinghub_io's tweet image. Getting blocked by servers while using cURL?

Most sites don’t like requests from cURL and will often block it because it&apos;s a red flag for bots or scraping tools.

Try changing your User-Agent header, like this:

curl &quot;https: //hackinghub[.]io&quot; -A &quot;&amp;lt;NEW-USER-AGENT&amp;gt;&quot;

Got two hours to learn Blind XSS? @NahamSec  condenses the exact, battle-tested process he used to earn $250k+ from BXSS into a hands-on course. You’ll learn: ✅ Correct BXSS lab setup ✅ Where blind XSS hides ✅ Common mistakes to avoid Get Started: tinyurl.com/hackinghub


Unlock Server-Side RCE success with these core principles: 1️⃣Find the Vector: RCE is the impact; focus on entry points (cmd inj, SSTI, SSRF). 2️⃣Enumerate: Recon is key. ID tech/versions to find exploits. 3️⃣Think like an Attacker. Learn interactive RCE: tinyurl.com/HubRCE

hackinghub_io's tweet image. Unlock Server-Side RCE success with these core principles:

1️⃣Find the Vector: RCE is the impact; focus on entry points (cmd inj, SSTI, SSRF).
2️⃣Enumerate: Recon is key. ID tech/versions to find exploits.
3️⃣Think like an Attacker.

Learn interactive RCE: tinyurl.com/HubRCE

Dive Inside HackingHub and explore Missions! These aren't one-and-done challenges. Our Missions are multi-step, comprehensive tasks designed to simulate real-world engagements.  It's time for a deeper dive. Are you up for the challenge? Sign up now: app.hackinghub.io/hubs

hackinghub_io's tweet image. Dive Inside HackingHub and explore Missions!

These aren&apos;t one-and-done challenges. Our Missions are multi-step, comprehensive tasks designed to simulate real-world engagements. 

It&apos;s time for a deeper dive. Are you up for the challenge?

Sign up now: app.hackinghub.io/hubs

✅Pro tip: Don't miss a step! Here's a powerful one-liner using @pdiscoveryio to automate your enumeration: find subdomains, filter for live hosts, check for web servers, and use tee to save the results of each stage to a file.

hackinghub_io's tweet image. ✅Pro tip: Don&apos;t miss a step! Here&apos;s a powerful one-liner using @pdiscoveryio to automate your enumeration: find subdomains, filter for live hosts, check for web servers, and use tee to save the results of each stage to a file.

Stuck in theory with no hands-on experience? Our Hands-On Web Exploitation course by @NahamSec and @BuildHackSecure  you how to find bugs through practical labs, pro strategies, and a cert that proves your skills. Sign up today👇 app.hackinghub.io/hubs/nahamsec-…

hackinghub_io's tweet image. Stuck in theory with no hands-on experience?

Our Hands-On Web Exploitation course by @NahamSec and @BuildHackSecure  you how to find bugs through practical labs, pro strategies, and a cert that proves your skills.

Sign up today👇
app.hackinghub.io/hubs/nahamsec-…

In our Regex For Hackers course, @nahamsec and @BuildHackSecure will take you from basic pattern matching to real-world hacking applications in under 3 hours. Access the course:  tinyurl.com/Regexforhackers

hackinghub_io's tweet image. In our Regex For Hackers course, @nahamsec and @BuildHackSecure will take you from basic pattern matching to real-world hacking applications in under 3 hours.

Access the course:  tinyurl.com/Regexforhackers

Getting blocked by servers while using cURL? Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header, like this: curl "https://hackinghub[.] io" -A "<NEW-USER-AGENT>"

hackinghub_io's tweet image. Getting blocked by servers while using cURL?

Most sites don’t like requests from cURL and will often block it because it&apos;s a red flag for bots or scraping tools.

Try changing your User-Agent header, like this:

curl &quot;https://hackinghub[.] io&quot; -A &quot;&amp;lt;NEW-USER-AGENT&amp;gt;&quot;

Want to be part of the conversations and meet the community? Join us on Discord! ➡️ Join here: discord.com/invite/Nnde3Yp…

hackinghub_io's tweet image. Want to be part of the conversations and meet the community?

Join us on Discord!

➡️ Join here: discord.com/invite/Nnde3Yp…

Plans for Saturday? RemoteBinge is a Netflix-inspired hub where you can exploit a remote command execution vulnerability to gain safe, authorized control of a test app. Ready to try it? Get started here 👉 app.hackinghub.io/hubs/remotebin…


What if your app could keep a constant two-way connection and send data in real time? That’s what WebSockets do. At NahamCon 2025, @InsiderPhD showed how WebSockets work and how to exploit them. 👉 Try it yourself in the demo lab she built for the talk: tinyurl.com/nahamcon25


Loading...

Something went wrong.


Something went wrong.