Termux

How to block DNS queries with only 1 config file

Leave a Comment on How to block DNS queries with only 1 config file

Hello everyone, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today, I will discuss about DNS query blocking. But first, if you don’t know what DNS is or what they […]

READ MORE

Pentesting / Reconnaissance / Termux

How to use Nmap for network scanning

Leave a Comment on How to use Nmap for network scanning

Hello, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today we will be discussing about one of the most essential steps in hacking: Scanning, and it’s representative, Nmap. Now, hacking […]

READ MORE

Tutorials / Hash cracking

Brute forcing emails with Hyrda v8.9.1

Leave a Comment on Brute forcing emails with Hyrda v8.9.1

welcome to hacking a rise in this post we are going to show you how to brute a email account with not password list using hydra pre-installed tool on kali linux as […]

READ MORE

FEATURED / Exploits / Tutorials

XHydra to brute ssh

Leave a Comment on XHydra to brute ssh

Welcome to hacking a rise in this we are going to show you how to brute a ssh with xhydra pre installed on kali linux this the gui of hydra (aka Thc-Hydra) […]

READ MORE

Information Gathering / Reconnaissance / Vulnerability Analysis / Web-app hacking

Whatweb web app vulnerability Scanner 0.4.9

84 Comments on Whatweb web app vulnerability Scanner 0.4.9

welcome to hacking a rise in this post i will show u how to use whatweb a simple vulnerability scanner pre installed on kali linux What is Whatsweb WhatWeb is a next […]

READ MORE

Forensics / Pentesting

Recovering Formatted files with Photorec

Leave a Comment on Recovering Formatted files with Photorec

Welcome to hacking a rise in this post we are going to show you step by step to recovering deleted files or lost data from a reformatted partition or corrupted file system […]

READ MORE

Reverse Engineering / Termux

How to use Radare2 – Reverse engineering tool

Leave a Comment on How to use Radare2 – Reverse engineering tool

Hello everybody~~ This is IRISnoir from hackingarise. Bringing to you another Termux tutorial. Today we’ll be discussing about the handy-dandy reverse engineering toolkit, Radare2. Now, a brief description of it’s usage, shall […]

READ MORE

Free courses / programing courses

Python 3 Masterclass, Learn Python Programming

Leave a Comment on Python 3 Masterclass, Learn Python Programming

Python 3 Masterclass, Learn Python Programming and build your own Python programs: Data Science, Machine Learning, etc Created by Denis Panjuta, Jannis Seemann, Tutorials.eu by Denis Panjuta Last updated 12/2018 English English […]

READ MORE

FEATURED / Pentesting / Tutorials

Lunar a python Pen testing Framework

Leave a Comment on Lunar a python Pen testing Framework

Welcome back to hacking a rise i am the one and only laughing man coming from the middle of no were hahaha in this post we going to look at lunar a […]

READ MORE

Pentesting

Java Key tool – Create Key store

Leave a Comment on Java Key tool – Create Key store

Welcome to Hacking a rise in this post we are going to talk about keytool this is used to gen keystores for making apk payloads fud Introduction Who of us didn’t visit […]

READ MORE

pentesting courses

Web hacking for Beginners

Leave a Comment on Web hacking for Beginners

What you’ll learn Understand How Websites Work. Intercept and manipulate HTTP communication using Wireshark. Discover, fix and exploit SQL injections. How to Hack and Secure a WordPress Website. Cross-Site Scripting (XSS). Cross-Site […]

READ MORE

pentesting courses / Free courses

Cloud Ethical Hacking : Use Kali Linux on Amazon AWS

Leave a Comment on Cloud Ethical Hacking : Use Kali Linux on Amazon AWS

The only course you need to start running Kali Linux and ethical hacking tasks on Amazon cloud! What you’ll learn Setup an Amazon Free Tier Account Create Amazon AWS EC2 Instances Create […]

READ MORE

Ebooks

Termux Tutorials by Techncyber

Leave a Comment on Termux Tutorials by Techncyber

HomeHackingUltimate Guide To : Ethical Hacking With Termux Hi there , Now You can use Almost all Useful Hacking Tools, Scripts on Your Android Mobile There are several apps and Hacking Tools […]

READ MORE

Tutorials / FEATURED

Netset Operational Security utility and automator

Leave a Comment on Netset Operational Security utility and automator

Welcome to hacking a rise in this post we are going to show you how to install netset on kali linux as allways i am the laughingman and this is hacking a […]

READ MORE

Android / Termux

How to use Weechat, the IRC client in Termux

Leave a Comment on How to use Weechat, the IRC client in Termux

Hello everyone~~ This is IRISnoir from Hackingarise. Bringing another Termux tutorial. This time about Weechat. Brief description of its usage: You want to talk to your friends. But you don’t want the […]

READ MORE

Information Gathering / Reconnaissance

Sherlock social meadia username search

Leave a Comment on Sherlock social meadia username search

Welcome to hacking a rise in this one we are going to show you how to install and use Sherlock python tool for searching social media as alway i am the laughing […]

READ MORE

Reconnaissance / Information Gathering

snoopy online username search

Leave a Comment on snoopy online username search

Welcome to hacking a rise today we going to show to you snoopy the online username search tool and as always im the laughingman lets start like we always do with the […]

READ MORE

Ebooks

Hackers _ Heroes of the Computer Revolution

Leave a Comment on Hackers _ Heroes of the Computer Revolution

This 25th anniversary edition of Steven Levy’s classic book traces the exploits of the computer revolution’s original hackers — those brilliant and eccentric nerds from the late 1950s through the early ’80s […]

READ MORE

Ebooks

Wireless Networks for Dummies

1 Comment on Wireless Networks for Dummies

Wireless Networks For Dummies was coauthored by Barry D. Lewis, CISSP, and Peter T. Davis, who also coauthored Computer Security For Dummies. Barry Lewis is president of an information security consulting firm […]

READ MORE

Ebooks

Metasploit-The Penetration Tester s Guide

Leave a Comment on Metasploit-The Penetration Tester s Guide

The best guide to the Metasploit Framework.” —HD Moore, Founder of the Metasploit Project The Metasploit Framework makes discovering, exploiting, and sharing vulnerabilities quick and relatively painless. But while Metasploit is used […]

READ MORE

Free courses / Linux / Programing / programing courses / Python / Tutorials

Python Programming Series Part 1 – Dev Setup

Greetings everyone, I’m red_riot, Hacking A Rise’s very own Forward Defence Minister, and today I am here to teach you all python programming with a specific focus on sockets.  After we learn […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

FEATURED / Ebooks

SQL Injection Strategies July 15, 2020 E-book

Hey guys how are all of you welcome to hacking a rise i am the Laughing man and this is the SQL Injection Strategies July 15, 2020 E-book downloaded for free so […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

how to find the owner of a number with phoneinfoga

Leave a Comment on how to find the owner of a number with phoneinfoga

welcome to Hacking a rise in this post we are going to search for a phone number as sometimes we only have a number two go on the tool we are going […]

READ MORE