Linux / Tutorials

Checkra1n on a phone

Leave a Comment on Checkra1n on a phone

Checkra1n is a jailbreak for the IOS ,IPadOS, and MacOS It is currently the most free jailbreak publicly out there, To install it to an Apple device follow these instructions Go to […]

READ MORE

Forensics / Pentesting

Recovering Formatted files with Photorec

Leave a Comment on Recovering Formatted files with Photorec

Welcome to hacking a rise in this post we are going to show you step by step to recovering deleted files or lost data from a reformatted partition or corrupted file system […]

READ MORE

Pentesting / Information Gathering / Reconnaissance / Vulnerability Analysis

How to use raccoon-scanner

Leave a Comment on How to use raccoon-scanner

Introduction Hello and welcome to another post and in this one we will be going over raccoon-scanner. This is a high performance offensive security tool that is made for recon and vuln […]

READ MORE

Pentesting

How to use netmask

Leave a Comment on How to use netmask

Introduction Hello and welcome to another post, today we are going to be talking about the tool already packed into ParrotSec and Blackarch. Well netmask is an address netmask generation utility as […]

READ MORE

Pentesting

How to use dnsmap 0.30

Leave a Comment on How to use dnsmap 0.30

Introduction Hello and welcome to another post, in this one we will go over dnsmap and how it works. I hope you enjoy it!! What is dnsmap? dnsmap was originally released back […]

READ MORE

Programing / Python / Tutorials

Make a program that flips a coin in Python 3

Leave a Comment on Make a program that flips a coin in Python 3

Welcome back to another tutorial, today we will be making a script that flips a coin and randomly selects heads or tails. To start, make a new python file and name it […]

READ MORE

Android / Information Gathering / Linux / Mac / Reconnaissance / Tutorials / Windows

Get a location with an IP adress

Leave a Comment on Get a location with an IP adress

Get a Location using an IP adress   Hey guys ! Lasr here 🙂 Today I’m gonna show you how to get the approximate location of an IP with iplocation.net. For this […]

READ MORE

darknet

Darknet part 1

Leave a Comment on Darknet part 1

hi and thankyou for joining us to night on darks dark guide to the dark net ( hahaha) for those that get the pun well done!!!! for the other younger members/readers its […]

READ MORE

Programing / Python / Tutorials

Make an IP finder using python 3

Leave a Comment on Make an IP finder using python 3

Welcome Everyone, in today’s tutorial I will be teaching you how to make an IP finder using socket in Python. To start, fire up Pycharm and create a new file for this […]

READ MORE

Pentesting

1 Tool, all you need, urlcrazy

Leave a Comment on 1 Tool, all you need, urlcrazy

Welcome Friends Welcome back to another post and today we’ll be looking at the tool urlcrazy, this tool is used to: Generate and test domain typos and variations to detect and perform […]

READ MORE

Pentesting

How To use sslscan for Beginners Part 1

Leave a Comment on How To use sslscan for Beginners Part 1

Welcome Hello readers, welcome back to another post and today we are going to take a look at the tool sslscan which lets you query SSL services like HTTPS and SMTP to […]

READ MORE

Tutorials / FEATURED

Cryptography Basics

Leave a Comment on Cryptography Basics

As hackers, we are often faced with the hurdle of cryptography and encryption. In some cases, we use it to hide our actions and messages. Many applications and protocols use encryption to […]

READ MORE

ctf's / FEATURED

hack the box guide

Tagged Leave a Comment on hack the box guide

hi good day and welcome to my first walkthough on the HTB series today in this hack the box guide we are going to learn how to get the invite code on […]

READ MORE

Database assessment / FEATURED / Information Gathering / Linux / Pentesting / Tutorials

Userrecon-Py – Find Usernames In Social Networks

Leave a Comment on Userrecon-Py – Find Usernames In Social Networks

  Find usernames in social networks Installation 1. Install dependencies(Debian/Ubuntu): sudo apt install python3 python3-pip 2. Install with pip3: sudo -H pip3 install git+https://github.com/decoxviii/userrecon-py.git userrecon-py –help Building from Source Clone this repository, and: […]

READ MORE

FEATURED / Windows

windows hints and tips

Leave a Comment on windows hints and tips

good day hope your all well? a quick introduction i am darkgrumpyoldman over 20 years of IT experience both Windows and Linux mixed in with the IT experience i have got pen […]

READ MORE

FEATURED / Pentesting

Python Tutorial 5 – Outputting mouse location to GUI

Leave a Comment on Python Tutorial 5 – Outputting mouse location to GUI

Welcome back to another Python tutorial, in this tutorial you will learn how to output the mouse position to an alert. First, let’s start with the previous code we made. import time […]

READ MORE

FEATURED / Pentesting / Reconnaissance

How to use brut0s DFW – Doxing Tool

Leave a Comment on How to use brut0s DFW – Doxing Tool

Welcome to the tutorial Hello and welcome to this tutorial, in this I will show you how to use brut0s DFW. Now brut0s DFW is a simple doxing framework that makes profiles […]

READ MORE

FEATURED / Website Security

Acunetix: The Best in Class Vulnerability Scanner for Linux

Leave a Comment on Acunetix: The Best in Class Vulnerability Scanner for Linux

Linux is the server operating system of choice for top businesses including Facebook, Twitter, and Google. Linux is also the desktop OS of choice for many information security analysts and penetration testers […]

READ MORE

Pentesting / FEATURED / Malicious software

how to set up a soul qbot ddos botnet on centos6.9 64bit

Leave a Comment on how to set up a soul qbot ddos botnet on centos6.9 64bit

right this ones for the script kiddies out there who wanna hit their mates off on xbox or some shit, ddosing can be useful occasionally but most of the time its kinda […]

READ MORE

Free courses / Linux / Programing / programing courses / Python / Tutorials

Python Programming Series Part 1 – Dev Setup

Greetings everyone, I’m red_riot, Hacking A Rise’s very own Forward Defence Minister, and today I am here to teach you all python programming with a specific focus on sockets.  After we learn […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

FEATURED / Ebooks

SQL Injection Strategies July 15, 2020 E-book

Hey guys how are all of you welcome to hacking a rise i am the Laughing man and this is the SQL Injection Strategies July 15, 2020 E-book downloaded for free so […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

how to find the owner of a number with phoneinfoga

Leave a Comment on how to find the owner of a number with phoneinfoga

welcome to Hacking a rise in this post we are going to search for a phone number as sometimes we only have a number two go on the tool we are going […]

READ MORE