HackingHub
@hackinghub.bsky.social
📤 35
📥 1
📝 210
Educating the next generation of ethical hackers @
https://hackinghub.io
Keep your eyes peeled on these endpoints. 👀 /login ➡️ authentication bugs /reset-password ➡️ATO /upload ➡️ RCE /api/v1/user/1001 ➡️ BOLA /search?q=query ➡️ Injection bugs /view?file= ➡️ SSRF /admin ➡️ internal access Which endpoint have you found the most bugs on? 👇
about 5 hours ago
0
0
0
The latest Hubs are live. We aren’t playing here. You either own the logic or you’re out of the deal. 🕶️ Stop playing at being a hacker and prove you're one 👇
https://app.hackinghub.io/hubs/
loading . . .
1 day ago
0
0
0
They moved the stack to nginx. They thought the migration was clean. But they forgot to scrub the recursive paths.
2 days ago
0
0
0
Does this look secure enough to you, or are you already seeing the bypass? Confirm below. 👇
3 days ago
1
0
1
You can master the Linux fundamentals required for hacking in just 7 hours. We’ve updated the course with @JohnHammond to include the "big three" of text manipulation and editing: Sed, Awk, and Vim. 2 hours of fresh content are waiting for you.
4 days ago
1
0
0
Tampering attempt failed. What’s your next move? 🕶️ Drop your answers below👇
5 days ago
1
0
1
IIS Filename Enum Hub 🕶️ The system recently migrated from IIS to nginx, but the developers left a trace behind. A single file remains from the old environment. Can you find it? 👇 ✅Get started:
https://app.hackinghub.io/hubs/iis-filename-enum
loading . . .
7 days ago
0
0
0
Confirm below. 👇
loading . . .
8 days ago
1
0
0
Where is the write-up?" is the wrong question. 🚩 The right question is: "How did you find the entry point?" Logic beats automation (and copy-pasting) every time. 🛠️
9 days ago
0
0
0
Tell us, how busted is this one?👀
10 days ago
1
0
0
Find subdomain takeovers, before they can find you. A one-liner pipeline with subfinder, httpx and nuclei. Surface the high-impact subdomain takeover risks in seconds.
11 days ago
0
0
0
Look closely! Running Microsoft IIS on a Windows server. Can you find the vulnerability here? 👀
12 days ago
0
0
0
Turn one URL into parameters goldmine. 💰 One-liner that does 👇 Clean crawl → Extract query URLs → Deduplicate → Verify live endpoints. Maximise the signal.
13 days ago
0
0
0
Bug Bounty in 2026: 50% creativity. 30% skill + program selection. 20% created luck. Tools don’t make this work.
loading . . .
18 days ago
0
1
0
Hot take: watching cybersecurity content ≠ building cybersecurity skill. You don’t learn to think like an attacker by memorizing slides, you learn by breaking things safely, getting stuck, and debugging your way out. That’s why HackingHub labs mimic real-world environments,
20 days ago
0
1
0
NEW: Linux for Hackers Fundamentals just leveled up!🚀 We’ve updated one of our most popular courses with our very own @JohnHammond. We’ve added 3 powerful new modules: Sed - Awk - Vim That’s 2 hours of fresh content! 🔥 Get 40% OFF today 🎟️Use Code: Linux2026
21 days ago
1
0
0
Turn your targets list into a prioritized attack surface with this mass recon one-liner. 👇
21 days ago
0
0
0
Stop manually clicking and start piping. 🛠️ This kickstarter recon command is the ultimate first step for your pipeline.👇
22 days ago
0
0
0
🐧NEW: Linux for Hackers Fundamentals just got a massive update! Led by @JohnHammond, we’ve added 3 powerful new modules: ✅ Sed ✅ Awk ✅ Vim That’s 2 hours of fresh content to level up your skills. Get 40% OFF today. Use Code: Linux2026 Get Started:
https://hhub.io/Linux2026
22 days ago
0
0
0
The prestige is free. The paycheck? Also free.
23 days ago
0
0
0
🚨To everyone in the HackingHub community: we want your honest feedback. What’s working? What’s not? What courses should exist? Survey takes 2 min + raffle entry. 👉
https://forms.gle/2KSMehv8XKHZPb4Z6
24 days ago
0
0
0
Would you have found the zip? Try solving our IIS Filename Enum Lab 👇
https://app.hackinghub.io/hubs/iis-filename-enum
loading . . .
24 days ago
0
0
0
In hacking, what does ABC stand for? (Wrong answers only). Our answer: Always Be Crying (over duplicates). 🥲 Let’s hear yours! 👇
25 days ago
0
0
0
Can you really claim a compromise, if you lose access after logout? Here are 3 Bash one-liners to make it stick.👇
26 days ago
0
0
0
When you encounter Regex+ WAF, do you know what to push? 👀
27 days ago
0
0
0
Sometimes IDOR isn't just about changing 123 to 124 Try changing types. 👇
28 days ago
1
0
0
Let’s hack a Windows Web Application running IIS. After a short scan, one small detail stood out. Most people would scroll past it. Checkout the IIS Filename Enum lab 👇
https://app.hackinghub.io/hubs/iis-filename-enum
loading . . .
29 days ago
0
0
0
Without naming the bug class, tell me 3 things about it that only a real hacker would recognize. 🕶️ Let's see who’s actually been in the terminal. 👇
loading . . .
about 1 month ago
0
0
0
To everyone in the HackingHub community: we want your honest feedback. 🫵 What’s working? What’s not? What courses should exist? Survey takes 2 min + raffle entry. ✅
https://forms.gle/2KSMehv8XKHZPb4Z6
about 1 month ago
0
0
0
Stop asking for permission and start injecting your own headers with cURL. Try it.👇
about 1 month ago
0
0
0
$5K on the line. 💰 3 minutes to find one bug. Which vuln class are you betting on? 👇
about 1 month ago
0
0
0
Think you have the hacker mindset? Prove it. New challenges are live. Explore them here 👇
https://app.hackinghub.io/hubs?type=challenge
about 1 month ago
0
0
0
When a developer trusts the server-side without proper validation, they aren't just building an app, they're building a $10k payout for the first person who notices. 🕵️♂️
about 1 month ago
0
0
0
Does this look safe to you? If yes, then you are trusting the backend too much.👀 Spot what goes wrong 👇
about 1 month ago
0
0
0
🚨LAST CALL: Tomorrow is the big day! Fetch the Flag 2026 with @snyksec and @NahamSec officially kicks off. This is your final chance to sign up and test your skills against the best in the community. Register now! 👇
https://snyk.io/es/events/ctf/?utm_campaign=evt__snyk-ftf26-nahamsec_gbl
loading . . .
about 1 month ago
0
0
0
What are the top skills for starting in Bug Bounty hunting? 🎯 @nahamsec shares his take👇
loading . . .
about 1 month ago
1
0
0
Think a migration to Nginx fixed everything? Think again. In this new lab, @nahamsec demonstrates how to exploit legacy filename enumeration to leak hidden files that "don't exist" on the front end. Watch the video and launch the lab👇
https://app.hackinghub.io/hubs/iis-filename-enum
loading . . .
about 1 month ago
0
0
0
🚩We're teaming up with @snyksec to bring you 24 hours of hands-on hacking challenges. What's waiting for you: 🔒 15 challenges across web, binary, exploitation & more 🏆 Compete against 1,000+ teams for prizes ⚡ Sharpen your skills in real-world scenarios
about 1 month ago
1
0
0
How do you turn a “maybe bug” into a real payout? 💰 Most hunters stop when they see odd behavior. Serious ones push until the impact is undeniable. If your bug doesn’t survive step 5, was it ever real?
about 1 month ago
0
0
1
Bug Bounty Rule #1: Read the scope.
about 1 month ago
0
0
0
Sometimes Web Cache Deception isn’t about bypassing auth. It’s about how the cache sees the URL. If /account is private, try: ✅ /account.css ✅ /account.jpg ✅ /account;test.css If the cache thinks it’s static, it might store authenticated content. Worth testing
about 1 month ago
0
0
0
🚩 Fetch the Flag CTF is next week! HackingHub and @NahamSec are teaming up with @snyksec to bring you 24 hours of hands-on hacking challenges. Register today👉
https://snyk.co/ujxq4
loading . . .
about 1 month ago
0
0
0
Most Python devs scroll past this. Should they? 👇
about 1 month ago
0
0
0
Want to find the bugs everyone else is missing? Go where they won't follow. 👀 Most hackers stick to the easy, public-facing apps. But the real "jackpots" are often hiding behind gated applications built for businesses, not just consumers. (With @NahamSec)
loading . . .
about 1 month ago
0
0
0
Fetch the Flag 2026 with @snyksec and @NahamSec is here! Sign up and test your skills against the best in the community. Event Details: 📅 February 12-13 ⏰ 12 PM ET start Ready to compete? Register today👉
https://snyk.co/ujxq4
loading . . .
about 1 month ago
0
0
0
Stop hoarding URLs. Start filtering. Wayback isn’t noisy by default, your intent is.👀 Check this👇
about 2 months ago
0
0
0
Try it if you can👇
about 2 months ago
0
0
0
Only real hackers know the power of this.
about 2 months ago
0
0
0
How do you turn a "boring" observation into a $70,000 bounty? 💰 Most hackers are looking for complex exploits, but this legend walked away with a massive payout just by paying attention. Check out the full story in our latest Hub!👇 ✅
https://app.hackinghub.io/hubs/2fa-madness
👤(@NahamSec)
loading . . .
about 2 months ago
0
0
0
Stop running manual recon. Start piping🛠️ By chaining subfinder, dnsx, and httpx, you can move from a single domain to a live, probed asset list in seconds.👇
about 2 months ago
0
0
0
Load more
feeds!
log in