<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
     xmlns:atom="http://www.w3.org/2005/Atom"
     xmlns:content="http://purl.org/rss/1.0/modules/content/"
     xmlns:dc="http://purl.org/dc/elements/1.1/"
     xmlns:media="http://search.yahoo.com/mrss/">
  <channel>
    <title>Hacker Sidekick Blog</title>
    <link>https://hackersidekick.com/blog.html</link>
    <description>Insights, tutorials, product demos, and platform updates from Hacker Sidekick—the AI assistant and integrated hacking environment built for cybersecurity professionals.</description>
    <language>en-us</language>
    <copyright>Copyright 2025–2026 Hacker Sidekick. All rights reserved.</copyright>
    <managingEditor>info@hackersidekick.com (Hacker Sidekick)</managingEditor>
    <webMaster>info@hackersidekick.com (Hacker Sidekick)</webMaster>
    <lastBuildDate>Wed, 20 May 2026 12:00:00 +0000</lastBuildDate>
    <pubDate>Wed, 20 May 2026 00:00:00 +0000</pubDate>
    <ttl>1440</ttl>
    <docs>https://www.rssboard.org/rss-specification</docs>
    <generator>Hacker Sidekick static site (manual)</generator>
    <image>
      <url>https://hackersidekick.com/images/hackersidekick-logo.png</url>
      <title>Hacker Sidekick Blog</title>
      <link>https://hackersidekick.com/blog.html</link>
      <width>260</width>
      <height>60</height>
    </image>
    <atom:link href="https://hackersidekick.com/blog-feed.xml" rel="self" type="application/rss+xml"/>
    <dc:publisher>Hacker Sidekick</dc:publisher>
    <dc:rights>Copyright 2025–2026 Hacker Sidekick</dc:rights>
    <dc:language>en</dc:language>
    <dc:creator>info@hackersidekick.com</dc:creator>

    <item>
      <title>Hacker Sidekick Update: Smarter Models, Workspace Indexing, and Dozens of Threat Intel Tools</title>
      <link>https://hackersidekick.com/hacker-sidekick-update-smarter-models-local-code-search-threat-intel.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/hacker-sidekick-update-smarter-models-local-code-search-threat-intel.html</guid>
      <pubDate>Wed, 20 May 2026 00:00:00 +0000</pubDate>
      <description>Automatic model routing for offensive security, workspace indexing with hsk-emb embeddings, auto top-up billing, and dozens of threat intelligence MCP tools ship in the latest Hacker Sidekick update.</description>
      <category>Platform Update</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2026-05-20T00:00:00Z</dc:date>
      <dc:subject>model routing, workspace indexing, threat intelligence, MCP, auto top-up, hsk-emb</dc:subject>
      <media:content url="https://hackersidekick.com/images/blog-update-workspace-indexing.png" medium="image" type="image/png">
        <media:title>Hacker Sidekick Workspace Indexing settings</media:title>
        <media:description>Platform update: workspace indexing, model routing, auto top-up billing, and built-in threat intelligence MCP tools.</media:description>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/blog-update-workspace-indexing.png"/>
      <content:encoded><![CDATA[
<p><img src="https://hackersidekick.com/images/blog-update-workspace-indexing.png" alt="Hacker Sidekick Workspace Indexing settings" width="1200" height="800"/></p>
<p>Model routing for offensive security, workspace indexing, auto top-up billing, and dozens of threat intel MCP tools—now in Hacker Sidekick.</p>
<p><strong>Tags:</strong> model routing, workspace indexing, threat intelligence, MCP, auto top-up, hsk-emb</p>
<p><a href="https://hackersidekick.com/hacker-sidekick-update-smarter-models-local-code-search-threat-intel.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Hacker Sidekick Achieves Remote Code Execution on n8n with CVE-2026-21858</title>
      <link>https://hackersidekick.com/hacker-sidekick-cve-2026-21858-n8n-rce.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/hacker-sidekick-cve-2026-21858-n8n-rce.html</guid>
      <pubDate>Wed, 14 May 2026 00:00:00 +0000</pubDate>
      <description>One prompt, no guidance: Hacker Sidekick built a PoC for CVE-2026-21858, mapped file read to RCE on n8n, validated vulnerable vs patched Docker targets, and documented the full chain. Watch the session on video.</description>
      <category>Product Demo</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2026-05-14T00:00:00Z</dc:date>
      <dc:subject>CVE-2026-21858, n8n, Form Trigger, exploit development, remote code execution</dc:subject>
      <media:content url="https://hackersidekick.com/images/858-1.png" medium="image" type="image/png">
        <media:title>Hacker Sidekick CVE-2026-21858 n8n exploit development session</media:title>
        <media:description>Recorded session: PoC, Docker lab validation, file-read to RCE chain, and technical report for CVE-2026-21858 on n8n.</media:description>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/858-1.png"/>
      <content:encoded><![CDATA[
<p><img src="https://hackersidekick.com/images/858-1.png" alt="Hacker Sidekick CVE-2026-21858 n8n exploit development session" width="1200" height="630"/></p>
<p>One prompt, no guidance: Hacker Sidekick built a PoC for CVE-2026-21858, mapped file read to RCE on n8n, validated vulnerable vs patched Docker targets, and documented the full chain—with failures on camera.</p>
<p><strong>Tags:</strong> CVE-2026-21858, n8n, Form Trigger, exploit development, remote code execution, video</p>
<p><a href="https://hackersidekick.com/hacker-sidekick-cve-2026-21858-n8n-rce.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Exploiting a 4-Day-Old CVE with Hacker Sidekick in 40 Minutes</title>
      <link>https://hackersidekick.com/exploiting-four-day-old-cve-hacker-sidekick-40-minutes.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/exploiting-four-day-old-cve-hacker-sidekick-40-minutes.html</guid>
      <pubDate>Sat, 09 May 2026 00:00:00 +0000</pubDate>
      <description>Watch the full session: Hacker Sidekick researched CVE-2026-23918, built a Docker lab, delivered a Python PoC, explored RCE, validated patched vs vulnerable targets, and wrote detection guidance—in about forty minutes, one prompt.</description>
      <category>Product Demo</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2026-05-09T00:00:00Z</dc:date>
      <dc:subject>CVE-2026-23918, Apache httpd, mod_http2, exploit development, AI security research</dc:subject>
      <media:content url="https://hackersidekick.com/images/blog-cve-2026-23918-report.png" medium="image" type="image/png">
        <media:title>CVE-2026-23918 exploit development with Hacker Sidekick</media:title>
        <media:description>Full recorded session from one prompt to PoC, lab, validation, and technical report.</media:description>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/blog-cve-2026-23918-report.png"/>
      <content:encoded><![CDATA[
<p><img src="https://hackersidekick.com/images/blog-cve-2026-23918-report.png" alt="CVE-2026-23918 exploit development with Hacker Sidekick" width="1200" height="630"/></p>
<p>Watch the full session: one prompt, no follow-ups—CVE-2026-23918 research, Docker lab, Python PoC, RCE exploration, validation harness, and a technical report with detection guidance in about forty minutes.</p>
<p><strong>Tags:</strong> CVE-2026-23918, Apache httpd, mod_http2, exploit development, video</p>
<p><a href="https://hackersidekick.com/exploiting-four-day-old-cve-hacker-sidekick-40-minutes.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>The Desktop, the Server, and What We Mean by "Fusion"</title>
      <link>https://hackersidekick.com/the-desktop-the-server-and-fusion.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/the-desktop-the-server-and-fusion.html</guid>
      <pubDate>Tue, 28 Apr 2026 00:00:00 +0000</pubDate>
      <description>Hacker Sidekick started as a web app on Open WebUI. The desktop is where work happens; the enterprise fusion server is the organizational backbone. How the pieces fit together.</description>
      <category>Platform</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2026-04-28T00:00:00Z</dc:date>
      <dc:subject>fusion server, enterprise, desktop, Open WebUI, cybersecurity</dc:subject>
      <media:content url="https://hackersidekick.com/images/tools-screenshot.png" medium="image" type="image/png">
        <media:title>Hacker Sidekick desktop and fusion server architecture</media:title>
        <media:description>How the desktop, enterprise fusion server, and Open WebUI roots fit together for security teams.</media:description>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/tools-screenshot.png"/>
      <content:encoded><![CDATA[
<p><img src="https://hackersidekick.com/images/tools-screenshot.png" alt="Hacker Sidekick desktop and fusion server" width="1200" height="630"/></p>
<p>From our Open WebUI web app to the new desktop and the enterprise fusion server: how the pieces fit, what &quot;fusion&quot; means, and which path is right for you.</p>
<p><strong>Tags:</strong> Hacker Sidekick, Enterprise, Fusion, Desktop, Security, Open WebUI</p>
<p><a href="https://hackersidekick.com/the-desktop-the-server-and-fusion.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>What We've Been Building</title>
      <link>https://hackersidekick.com/what-weve-been-building.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/what-weve-been-building.html</guid>
      <pubDate>Thu, 23 Apr 2026 00:00:00 +0000</pubDate>
      <description>Now that we're posting again: the past eighteen months—from frustration with LLM guardrails to the Hacker Sidekick desktop app, and why it matters.</description>
      <category>Company</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2026-04-23T00:00:00Z</dc:date>
      <dc:subject>Hacker Sidekick, IHE, integrated hacking environment, Open WebUI, desktop</dc:subject>
      <media:content url="https://hackersidekick.com/images/what-weve-been-building.png" medium="image" type="image/png">
        <media:title>What we've been building at Hacker Sidekick</media:title>
        <media:description>Hacker Sidekick logo on a laptop covered in cybersecurity and conference stickers.</media:description>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/what-weve-been-building.png"/>
      <content:encoded><![CDATA[
<p><img src="https://hackersidekick.com/images/what-weve-been-building.png" alt="Hacker Sidekick logo on a laptop covered in cybersecurity and conference stickers" width="1200" height="630"/></p>
<p>Now that we're posting again: the past eighteen months—how Hacker Sidekick started, the Open WebUI rebuild, conference feedback, enterprise and desktop, Chicago workshops, the Cyphercon sprint, and why the IHE is the product.</p>
<p><strong>Tags:</strong> Hacker Sidekick, IHE, Product, Company Update</p>
<p><a href="https://hackersidekick.com/what-weve-been-building.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Introducing the new Hacker Sidekick - an integrated hacking environment</title>
      <link>https://hackersidekick.com/hacker-sidekick-desktop-ihe-announcement.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/hacker-sidekick-desktop-ihe-announcement.html</guid>
      <pubDate>Tue, 14 Apr 2026 00:00:00 +0000</pubDate>
      <description>Introducing the new Hacker Sidekick: the public web chat experience is going away in favor of the desktop app—an integrated hacking environment for security work. Enterprise deployments remain as the fusion backend.</description>
      <category>Platform Updates</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2026-04-14T00:00:00Z</dc:date>
      <dc:subject>integrated hacking environment, desktop security, agentic AI, offensive security</dc:subject>
      <media:content url="https://hackersidekick.com/images/desktop1.png" medium="image" type="image/png">
        <media:title>Hacker Sidekick desktop integrated hacking environment</media:title>
        <media:description>Introducing the Hacker Sidekick desktop IHE and enterprise fusion backend architecture.</media:description>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/desktop1.png"/>
      <content:encoded><![CDATA[
<p><img src="https://hackersidekick.com/images/desktop1.png" alt="Hacker Sidekick desktop integrated hacking environment" width="1200" height="630"/></p>
<p>What an integrated hacking environment is, why the public web chat experience is going away in favor of Hacker Sidekick on the desktop, and how enterprise deployments keep their web tier as the fusion backend—integrations and org knowledge feeding one platform for the agentic desktop app.</p>
<p><strong>Tags:</strong> Hacker Sidekick, Desktop, Agentic AI, Platform Update</p>
<p><a href="https://hackersidekick.com/hacker-sidekick-desktop-ihe-announcement.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>From Defcon Podium to Product Feedback - How Sanaan Used Hacker Sidekick to Win Adversary Wars</title>
      <link>https://hackersidekick.com/sanaan-defcon-adversary-wars-win.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/sanaan-defcon-adversary-wars-win.html</guid>
      <pubDate>Sat, 29 Nov 2025 00:00:00 +0000</pubDate>
      <description>At DEFCON 33, Sanaan and his team used Hacker Sidekick during Adversary Wars and secured first place. Learn how Hacker Sidekick helped them excel at binary reversing and CTF challenges.</description>
      <category>Community</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2025-11-29T00:00:00Z</dc:date>
      <dc:subject>DEFCON, CTF, Adversary Wars, binary reversing, capture the flag</dc:subject>
      <media:content url="https://hackersidekick.com/images/1764363025798.jpeg" medium="image" type="image/jpeg">
        <media:title>Sanaan wins Adversary Wars at DEFCON 33 with Hacker Sidekick</media:title>
        <media:description>Community success story from DEFCON 33 Adversary Wars.</media:description>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/1764363025798.jpeg"/>
      <content:encoded><![CDATA[
<p><img src="https://hackersidekick.com/images/1764363025798.jpeg" alt="Sanaan wins Adversary Wars at DEFCON 33 with Hacker Sidekick" width="1200" height="630"/></p>
<p>At DEFCON 33, Sanaan and his team used Hacker Sidekick during Adversary Wars and secured first place. Learn how Hacker Sidekick helped them excel at binary reversing and CTF challenges.</p>
<p><strong>Tags:</strong> CTF, Community, DEFCON, Success Story</p>
<p><a href="https://hackersidekick.com/sanaan-defcon-adversary-wars-win.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Introducing the CTF Win Bounty Program: Win up to $1,000 for First Place</title>
      <link>https://hackersidekick.com/win-bounty-blog.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/win-bounty-blog.html</guid>
      <pubDate>Fri, 15 Aug 2025 00:00:00 +0000</pubDate>
      <description>Hacker Sidekick is launching a CTF Win Bounty program where first place at select CTFs can win up to $1,000. Apply now or meet us at conferences.</description>
      <category>Community</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2025-08-15T00:00:00Z</dc:date>
      <dc:subject>CTF, win bounty, capture the flag, hacking competition, cybersecurity bounty</dc:subject>
      <media:content url="https://hackersidekick.com/images/hackersidekick-logo.png" medium="image" type="image/png">
        <media:title>Hacker Sidekick CTF Win Bounty program</media:title>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/hackersidekick-logo.png"/>
      <content:encoded><![CDATA[
<p>We're excited to launch the Hacker Sidekick CTF Win Bounty program—win up to $1,000 for first place at select CTFs. Meet us at conferences or apply now.</p>
<p><strong>Tags:</strong> CTF, Community, Bounties</p>
<p><a href="https://hackersidekick.com/win-bounty-blog.html">Read the full article</a> · <a href="https://hackersidekick.com/ctf-win-bounty.html">Program details</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Game-Changing Intelligence: MITRE ATT&amp;CK, Exploit-DB &amp; EPSS Scoring Now Live</title>
      <link>https://hackersidekick.com/cybersecurity-intelligence-tools-announcement.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/cybersecurity-intelligence-tools-announcement.html</guid>
      <pubDate>Sun, 03 Aug 2025 00:00:00 +0000</pubDate>
      <description>Revolutionary cybersecurity intelligence expansion with three powerful new tools: MITRE ATT&amp;CK threat mapping, Exploit-DB vulnerability research, and EPSS risk scoring. Transform your threat intelligence and vulnerability management workflows.</description>
      <category>Platform Updates</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2025-08-03T00:00:00Z</dc:date>
      <dc:subject>MITRE ATT&amp;CK, Exploit-DB, EPSS, threat intelligence, vulnerability management</dc:subject>
      <media:content url="https://hackersidekick.com/images/hackersidekick-logo.png" medium="image" type="image/png">
        <media:title>Hacker Sidekick cybersecurity intelligence tools</media:title>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/hackersidekick-logo.png"/>
      <content:encoded><![CDATA[
<p>Revolutionary cybersecurity intelligence expansion with three powerful new tools: MITRE ATT&amp;CK threat mapping, Exploit-DB vulnerability research, and EPSS risk scoring. Transform your threat intelligence and vulnerability management workflows with industry-standard frameworks.</p>
<p><strong>Tags:</strong> Platform Updates, Intelligence Tools, MITRE ATT&amp;CK, Exploit-DB, EPSS</p>
<p><a href="https://hackersidekick.com/cybersecurity-intelligence-tools-announcement.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Hacker Sidekick Expands Arsenal: 6 New Security Tool Integrations Now Live</title>
      <link>https://hackersidekick.com/new-tool-integrations-announcement.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/new-tool-integrations-announcement.html</guid>
      <pubDate>Thu, 17 Jul 2025 00:00:00 +0000</pubDate>
      <description>Major platform expansion with 6 powerful new security tool integrations including the complete Shodan suite, Certificate Transparency, AbuseIPDB, and Have I Been Pwned. Enhanced reconnaissance and threat intelligence now available.</description>
      <category>Platform Updates</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2025-07-17T00:00:00Z</dc:date>
      <dc:subject>Shodan, Certificate Transparency, AbuseIPDB, Have I Been Pwned, threat intelligence</dc:subject>
      <media:content url="https://hackersidekick.com/images/hackersidekick-logo.png" medium="image" type="image/png">
        <media:title>Hacker Sidekick new security tool integrations</media:title>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/hackersidekick-logo.png"/>
      <content:encoded><![CDATA[
<p>Major platform expansion with 6 powerful new security tool integrations including the complete Shodan suite, Certificate Transparency, AbuseIPDB, and Have I Been Pwned. Enhanced reconnaissance, threat intelligence, and security research capabilities now available to all users.</p>
<p><strong>Tags:</strong> Platform Updates, Tool Integrations, Shodan, Threat Intelligence</p>
<p><a href="https://hackersidekick.com/new-tool-integrations-announcement.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Ensuring Strict Data Separation with Hacker Sidekick's Private LLM Deployments</title>
      <link>https://hackersidekick.com/ensuring-strict-data-separation-with-private-llm-deployments.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/ensuring-strict-data-separation-with-private-llm-deployments.html</guid>
      <pubDate>Fri, 04 Jul 2025 00:00:00 +0000</pubDate>
      <description>Learn how Hacker Sidekick's private LLM deployments guarantee complete data isolation for cybersecurity teams. Zero data sharing, full compliance, and enterprise-grade privacy for sensitive security operations.</description>
      <category>Security</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2025-07-04T00:00:00Z</dc:date>
      <dc:subject>private LLM deployment, data separation, cybersecurity privacy, enterprise LLM security</dc:subject>
      <media:content url="https://hackersidekick.com/images/hackersidekick-logo.png" medium="image" type="image/png">
        <media:title>Hacker Sidekick private LLM deployments</media:title>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/hackersidekick-logo.png"/>
      <content:encoded><![CDATA[
<p>Learn how Hacker Sidekick's private LLM deployments guarantee complete data isolation for cybersecurity teams. Zero data sharing, full compliance, and enterprise-grade privacy for sensitive security operations.</p>
<p><strong>Tags:</strong> Data Privacy, LLM Security, Enterprise AI, Cybersecurity</p>
<p><a href="https://hackersidekick.com/ensuring-strict-data-separation-with-private-llm-deployments.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Why Cybersecurity Needs Domain-Specific LLMs: The Technical Case</title>
      <link>https://hackersidekick.com/why-cybersecurity-needs-domain-specific-llms.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/why-cybersecurity-needs-domain-specific-llms.html</guid>
      <pubDate>Mon, 23 Jun 2025 00:00:00 +0000</pubDate>
      <description>General-purpose AI models lack the specialized knowledge, context, and safety constraints required for effective cybersecurity operations. Explore why purpose-built models like Hacker Sidekick deliver superior results.</description>
      <category>Technical Analysis</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2025-06-23T00:00:00Z</dc:date>
      <dc:subject>domain-specific LLMs, cybersecurity AI, ChatGPT limitations, penetration testing</dc:subject>
      <media:content url="https://hackersidekick.com/images/hackersidekick-logo.png" medium="image" type="image/png">
        <media:title>Why cybersecurity needs domain-specific LLMs</media:title>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/hackersidekick-logo.png"/>
      <content:encoded><![CDATA[
<p>General-purpose AI models lack the specialized knowledge, context, and safety constraints required for effective cybersecurity operations. Explore the technical limitations of ChatGPT and Claude in security contexts, and why purpose-built models like Hacker Sidekick deliver superior results for vulnerability analysis, threat detection, and security research.</p>
<p><strong>Tags:</strong> AI, Cybersecurity, LLMs, Penetration Testing, Security Automation</p>
<p><a href="https://hackersidekick.com/why-cybersecurity-needs-domain-specific-llms.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>

    <item>
      <title>Agentic Hacking in VS Code with Roo Code + Hacker Sidekick</title>
      <link>https://hackersidekick.com/turbo-charge-vs-code-with-roo-code.html</link>
      <guid isPermaLink="true">https://hackersidekick.com/turbo-charge-vs-code-with-roo-code.html</guid>
      <pubDate>Thu, 19 Jun 2025 00:00:00 +0000</pubDate>
      <description>Transform VS Code into an AI-powered offensive security platform. Enable AI-powered agentic workflows for penetration testing, exploit development, and advanced attack simulations. Complete setup guide in 5 minutes.</description>
      <category>Tutorial</category>
      <dc:creator>Hacker Sidekick</dc:creator>
      <dc:date>2025-06-19T00:00:00Z</dc:date>
      <dc:subject>VS Code, Roo Code, agentic hacking, cybersecurity AI, penetration testing</dc:subject>
      <media:content url="https://hackersidekick.com/images/hackersidekick-logo.png" medium="image" type="image/png">
        <media:title>Agentic hacking in VS Code with Roo Code and Hacker Sidekick</media:title>
      </media:content>
      <media:thumbnail url="https://hackersidekick.com/images/hackersidekick-logo.png"/>
      <content:encoded><![CDATA[
<p>Transform VS Code into an AI-powered offensive security platform. Learn how to enable AI-powered penetration testing workflows, crack hashes, gain root access, and execute complex attack chains using AI agents under your control.</p>
<p><strong>Tags:</strong> VS Code, Roo Code, Agentic Hacking, Cybersecurity, AI</p>
<p><a href="https://hackersidekick.com/turbo-charge-vs-code-with-roo-code.html">Read the full article</a></p>
      ]]></content:encoded>
    </item>
  </channel>
</rss>
