
HackingHub
@hackinghub_io
Followers
10K
Following
244
Media
154
Statuses
3K
Educating the next generation of ethical hackers.
United Kingdom
Joined April 2019
Getting blocked by servers while using cURL? Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header👇
0
0
5
In Nov 2024, researchers used minimal data (name, email, or plate) to access engine controls, door locks, location tracking, and PII on Subaru STARLINK vehicles. Master this high-impact exploit chain in our new CypherDrive lab! Get started: https://t.co/77a66aczur
0
3
31
Need quick, free subdomain data for Bug Bounty programs? @pdiscoveryio' Chaos actively monitors companies and gives you thousands of domains 👇
0
2
40
My @defcon 33 video "Regex For Hackers" is finally out on YouTube: https://t.co/Oj64PRAsKR For only 24 hours you can grab my "Regex For Hackers" course on @hackinghub_io for only $10 ( that's $40 off ) using the voucher REGEX24, it'll never be this cheap again! Please share so
3
22
96
Reverse-engineer a real-world exploit on CypherDrive. The CypherDrive lab breaks down the attack chain: DNS Brute-forcing, Account Takeover via Insecure Password Reset, and Client-Side 2FA Evasion. Ready to learn? Get Started: https://t.co/77a66aczur
0
6
21
Getting blocked by servers while using cURL? Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header, like this: curl "https: //hackinghub[.]io" -A "<NEW-USER-AGENT>"
0
15
48
Screenshotting is perfect for triage, POCs, spotting odd responses, app fingerprinting, and sharing findings. Here are 3 screenshotting tools you should try out 👇
1
0
3
Got two hours to learn Blind XSS? @NahamSec condenses the exact, battle-tested process he used to earn $250k+ from BXSS into a hands-on course. You’ll learn: ✅ Correct BXSS lab setup ✅ Where blind XSS hides ✅ Common mistakes to avoid Get Started: https://t.co/5a1IiW8Rym
2
9
32
Unlock Server-Side RCE success with these core principles: 1️⃣Find the Vector: RCE is the impact; focus on entry points (cmd inj, SSTI, SSRF). 2️⃣Enumerate: Recon is key. ID tech/versions to find exploits. 3️⃣Think like an Attacker. Learn interactive RCE: https://t.co/q4evrgSt0Z
0
1
10
Dive Inside HackingHub and explore Missions! These aren't one-and-done challenges. Our Missions are multi-step, comprehensive tasks designed to simulate real-world engagements. It's time for a deeper dive. Are you up for the challenge? Sign up now: https://t.co/O1Goz4JCuy
0
2
6
✅Pro tip: Don't miss a step! Here's a powerful one-liner using @pdiscoveryio to automate your enumeration: find subdomains, filter for live hosts, check for web servers, and use tee to save the results of each stage to a file.
0
9
61
Stuck in theory with no hands-on experience? Our Hands-On Web Exploitation course by @NahamSec and @BuildHackSecure you how to find bugs through practical labs, pro strategies, and a cert that proves your skills. Sign up today👇 https://t.co/561Wji7Xsl
1
2
17
In our Regex For Hackers course, @nahamsec and @BuildHackSecure will take you from basic pattern matching to real-world hacking applications in under 3 hours. Access the course: https://t.co/mmOHJoiNq0
1
1
8
Getting blocked by servers while using cURL? Most sites don’t like requests from cURL and will often block it because it's a red flag for bots or scraping tools. Try changing your User-Agent header, like this: curl " https://hackinghub[.] io" -A "<NEW-USER-AGENT>"
0
5
28
Want to be part of the conversations and meet the community? Join us on Discord! ➡️ Join here: https://t.co/1V3AgjDPrK
0
1
9
Plans for Saturday? RemoteBinge is a Netflix-inspired hub where you can exploit a remote command execution vulnerability to gain safe, authorized control of a test app. Ready to try it? Get started here 👉
app.hackinghub.io
HackingHub offers training and challenges for ethical web application hacking.
0
1
18