Termux

How to block DNS queries with only 1 config file

Leave a Comment on How to block DNS queries with only 1 config file

Hello everyone, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today, I will discuss about DNS query blocking. But first, if you don’t know what DNS is or what they […]

READ MORE

Pentesting / Reconnaissance / Termux

How to use Nmap for network scanning

Leave a Comment on How to use Nmap for network scanning

Hello, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today we will be discussing about one of the most essential steps in hacking: Scanning, and it’s representative, Nmap. Now, hacking […]

READ MORE

Tutorials / Hash cracking

Brute forcing emails with Hyrda v8.9.1

Leave a Comment on Brute forcing emails with Hyrda v8.9.1

welcome to hacking a rise in this post we are going to show you how to brute a email account with not password list using hydra pre-installed tool on kali linux as […]

READ MORE

FEATURED / Exploits / Tutorials

XHydra to brute ssh

Leave a Comment on XHydra to brute ssh

Welcome to hacking a rise in this we are going to show you how to brute a ssh with xhydra pre installed on kali linux this the gui of hydra (aka Thc-Hydra) […]

READ MORE

Information Gathering / Reconnaissance / Vulnerability Analysis / Web-app hacking

Whatweb web app vulnerability Scanner 0.4.9

84 Comments on Whatweb web app vulnerability Scanner 0.4.9

welcome to hacking a rise in this post i will show u how to use whatweb a simple vulnerability scanner pre installed on kali linux What is Whatsweb WhatWeb is a next […]

READ MORE

Forensics / Pentesting

Recovering Formatted files with Photorec

Leave a Comment on Recovering Formatted files with Photorec

Welcome to hacking a rise in this post we are going to show you step by step to recovering deleted files or lost data from a reformatted partition or corrupted file system […]

READ MORE

Reverse Engineering / Termux

How to use Radare2 – Reverse engineering tool

Leave a Comment on How to use Radare2 – Reverse engineering tool

Hello everybody~~ This is IRISnoir from hackingarise. Bringing to you another Termux tutorial. Today we’ll be discussing about the handy-dandy reverse engineering toolkit, Radare2. Now, a brief description of it’s usage, shall […]

READ MORE

Free courses / programing courses

Python 3 Masterclass, Learn Python Programming

Leave a Comment on Python 3 Masterclass, Learn Python Programming

Python 3 Masterclass, Learn Python Programming and build your own Python programs: Data Science, Machine Learning, etc Created by Denis Panjuta, Jannis Seemann, Tutorials.eu by Denis Panjuta Last updated 12/2018 English English […]

READ MORE

FEATURED / Pentesting / Tutorials

Lunar a python Pen testing Framework

Leave a Comment on Lunar a python Pen testing Framework

Welcome back to hacking a rise i am the one and only laughing man coming from the middle of no were hahaha in this post we going to look at lunar a […]

READ MORE

Pentesting

Java Key tool – Create Key store

Leave a Comment on Java Key tool – Create Key store

Welcome to Hacking a rise in this post we are going to talk about keytool this is used to gen keystores for making apk payloads fud Introduction Who of us didn’t visit […]

READ MORE

pentesting courses

Web hacking for Beginners

Leave a Comment on Web hacking for Beginners

What you’ll learn Understand How Websites Work. Intercept and manipulate HTTP communication using Wireshark. Discover, fix and exploit SQL injections. How to Hack and Secure a WordPress Website. Cross-Site Scripting (XSS). Cross-Site […]

READ MORE

pentesting courses / Free courses

Cloud Ethical Hacking : Use Kali Linux on Amazon AWS

Leave a Comment on Cloud Ethical Hacking : Use Kali Linux on Amazon AWS

The only course you need to start running Kali Linux and ethical hacking tasks on Amazon cloud! What you’ll learn Setup an Amazon Free Tier Account Create Amazon AWS EC2 Instances Create […]

READ MORE

Ebooks

Termux Tutorials by Techncyber

Leave a Comment on Termux Tutorials by Techncyber

HomeHackingUltimate Guide To : Ethical Hacking With Termux Hi there , Now You can use Almost all Useful Hacking Tools, Scripts on Your Android Mobile There are several apps and Hacking Tools […]

READ MORE

Tutorials / FEATURED

Netset Operational Security utility and automator

Leave a Comment on Netset Operational Security utility and automator

Welcome to hacking a rise in this post we are going to show you how to install netset on kali linux as allways i am the laughingman and this is hacking a […]

READ MORE

Android / Termux

How to use Weechat, the IRC client in Termux

Leave a Comment on How to use Weechat, the IRC client in Termux

Hello everyone~~ This is IRISnoir from Hackingarise. Bringing another Termux tutorial. This time about Weechat. Brief description of its usage: You want to talk to your friends. But you don’t want the […]

READ MORE

Information Gathering / Reconnaissance

Sherlock social meadia username search

Leave a Comment on Sherlock social meadia username search

Welcome to hacking a rise in this one we are going to show you how to install and use Sherlock python tool for searching social media as alway i am the laughing […]

READ MORE

Reconnaissance / Information Gathering

snoopy online username search

Leave a Comment on snoopy online username search

Welcome to hacking a rise today we going to show to you snoopy the online username search tool and as always im the laughingman lets start like we always do with the […]

READ MORE

Ebooks

Hackers _ Heroes of the Computer Revolution

Leave a Comment on Hackers _ Heroes of the Computer Revolution

This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers — those brilliant and eccentric nerds from the late 1950s through the early ’80s […]

READ MORE

Ebooks

Wireless Networks for Dummies

1 Comment on Wireless Networks for Dummies

Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm […]

READ MORE

Ebooks

Metasploit-The Penetration Tester s Guide

Leave a Comment on Metasploit-The Penetration Tester s Guide

The best guide to the Metasploit Framework.” —HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used […]

READ MORE

FEATURED / Free courses

Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

A Manual Bug Bounty Hunting Course Created by Vikash Chaudhary Last updated 8/2018 English What you’ll learn Hall of Fame | Rewards | Bug Bounty | Appreciation | Bug Bounty Hunting | […]

READ MORE

FEATURED

Offensive Security OSCP v2020 pdf

Offensive Security OSCP v2020 pdf We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational […]

READ MORE

FEATURED

Turn your android in to web server

Leave a Comment on Turn your android in to web server

Welcome to hacking a rise i am the laughing man and today im going to show you how to turn your android in to webserver with out root using termux and golag […]

READ MORE

FEATURED / Free courses / pentesting courses

Website Hacking / Penetration Testing & Bug Bounty Hunting

Leave a Comment on Website Hacking / Penetration Testing & Bug Bounty Hunting

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts. What you’ll learn with Website Hacking / Penetration Testing & Bug Bounty Hunting […]

READ MORE