FEATURED / Tutorials

How to use Katana Framework v1.0

welcome to Hacking a rise i am the laughingman and this a tutoral on Katnana framework what is Kantana Frame work katana is a framework written in python for making penetration testing, […]

READ MORE

Exploits / FEATURED / Tutorials

how to use easysploit to hack

Welcome to hacking a rise. I am the laughing man and in this post we are going to talk about easysploit automated metasploit script in bash its a little like sploitgen but […]

READ MORE

FEATURED / Linux / News / Operating Systems

Kali Linux 2019.4 includes new undercover mode

Leave a Comment on Kali Linux 2019.4 includes new undercover mode

Wasap my little hackers hope you are all doing good ?? in this post we are going to talk about kali undercover mode. What is undercover mode i hear you ask well […]

READ MORE

FEATURED

Hunter person search v 1.0

Welcome to hacking a rise i am the laughing man and today i got a treat for ye since you all enjoy my tools i made a new script as you can […]

READ MORE

FEATURED / HTML, CSS, PHP / Tutorials

Building a link shortener under 20 mins

Welcome to hacking a rise guys and gals i am the Laughingman and today i am going to show you how to build a link shortener service many hackers use this to […]

READ MORE

Exploits / Exploits / FEATURED / Metasploit / Pentesting

Using Netcat with Ngrok part 1

Welcome to hacking a rise i am the Laughing man in this short post im going to show ya a handy way to use ncat with ngrok to forward ports over ssh […]

READ MORE

Android / darknet / FEATURED / Networks / OpenSSL / Termux / Tutorials

How to create a Tor SSL hidden service – Termux

Hello ladies and gentlemen, boys and girls, to tonight’s show. I will be your host. Now, let me explain to you how to create a Tor hidden service, and as a bonus, […]

READ MORE

Hash cracking

dehash: Hash decryptor – by IRISnoir

Good evening, lads and lassies. This is IRISnoir from Hackingarise. Bringing to you today’s post: about dehash. A tool made by me. This tool is a hash decryptor that supports 12 hash […]

READ MORE

FEATURED / Free courses

Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

A Manual Bug Bounty Hunting Course Created by Vikash Chaudhary Last updated 8/2018 English What you’ll learn Hall of Fame | Rewards | Bug Bounty | Appreciation | Bug Bounty Hunting | […]

READ MORE

FEATURED

Offensive Security OSCP v2020 pdf

Offensive Security OSCP v2020 pdf We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational […]

READ MORE

FEATURED

Turn your android in to web server

Leave a Comment on Turn your android in to web server

Welcome to hacking a rise i am the laughing man and today im going to show you how to turn your android in to webserver with out root using termux and golag […]

READ MORE

FEATURED / Free courses / pentesting courses

Website Hacking / Penetration Testing & Bug Bounty Hunting

Leave a Comment on Website Hacking / Penetration Testing & Bug Bounty Hunting

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts. What you’ll learn with Website Hacking / Penetration Testing & Bug Bounty Hunting […]

READ MORE