Web-app hacking / FEATURED

XSS DORKING

Leave a Comment on XSS DORKING

welcome to hacking a rise i’m the one and only laughing man i am him lol this post is a list of google dorks for xss “cross scripting vulnerabilities” websites copy and […]

READ MORE

Database assessment / FEATURED / Pentesting / SQL injection / Tutorials

Hacking with JSQL on Kali Linux

Leave a Comment on Hacking with JSQL on Kali Linux

All right my little noob’s so due to my google dorks post i mite as well show u how to use them in an attack so since my man nife did sqlmap […]

READ MORE

FEATURED / Information Gathering / Tutorials

Google dorks

6 Comments on Google dorks

Welcome to hacking a rise in this post we provide you with google dorks.Pentesters use this to minmize there search one google as well as finding vulnerable sites What are google dorks […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

Exploits / FEATURED / Pentesting / sniffing and spoofing / Tutorials

Man in the Middle simple attack

Leave a Comment on Man in the Middle simple attack

so today we are going to learn man in the middle attack. What is a man in the middle attack?? well a man in the middle attack is when a hacker connect’s […]

READ MORE

FEATURED / Tutorials

hacking wps with bully

Leave a Comment on hacking wps with bully

Welcome to another one by the laughing man whoop whoop so we are going to hack a WiFi with bully now wps have 8 numbers in it this makes it easier to […]

READ MORE

FEATURED / Pentesting

Basic Netcat part one

Leave a Comment on Basic Netcat part one

Net cat started of as a network analysis tool in 1995 till it was left on supported then nmap man toke over and revamped it to the Swiss army knife of having […]

READ MORE

Web-app hacking / FEATURED / Tutorials

How to set Burp suite proxy

Leave a Comment on How to set Burp suite proxy

Burp suite is one the best tools for web app testing it has many options e.g SQL injection, Brute force fuzzing etc.. Burp suite is installed on Kali Linux so u don’t […]

READ MORE

Operating Systems / FEATURED / Tutorials

Installing Kali Linux In Virtual Box

Leave a Comment on Installing Kali Linux In Virtual Box

Today we are going to be installing Kali Linux in virtual box. First, open virtual box and hit the new button. Then, this menu will pop up, for type hit Linux and […]

READ MORE

Bash / FEATURED / Programing

BASICS OF BASH SCRIPTING

Leave a Comment on BASICS OF BASH SCRIPTING

Bash aka (shell) is used mostly in the Unix and Linux systems this the commands we use Example ls list files in a directory or are mostly use cd changes the shells […]

READ MORE

ctf's / Ebooks / FEATURED

KALI LINUX CTF BLUEPRINTS

Leave a Comment on KALI LINUX CTF BLUEPRINTS

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own […]

READ MORE

Ebooks / FEATURED

Hackers Handbook

Leave a Comment on Hackers Handbook

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own […]

READ MORE

Cryptocurrency / FEATURED / Monero

Browser Mining

Leave a Comment on Browser Mining

So Monero aka XMR has taking a crash coinhive is bankrupt but have no fear the laughing man is here coming to you with the next best thing to Coin-hive these sites […]

READ MORE

News / FEATURED

Coin hive shutting down

Leave a Comment on Coin hive shutting down

So on the February 26, 2019 coin hive a xmr mining platform is closing its doors since the crash in crypto they have no choice to stop in there post the said […]

READ MORE

Ebooks / FEATURED

Advanced Bash Shell Scripting Gude

Leave a Comment on Advanced Bash Shell Scripting Gude

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own […]

READ MORE

FEATURED / Pentesting

Google Hacking for Penetration Testers

Leave a Comment on Google Hacking for Penetration Testers

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own […]

READ MORE

Ebooks / FEATURED

All In One CEH Certified Ethical Hacker Exam Guide

Leave a Comment on All In One CEH Certified Ethical Hacker Exam Guide

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own […]

READ MORE

Ebooks / FEATURED

Honeypots and Routers_ Collecting Internet Attacks

Leave a Comment on Honeypots and Routers_ Collecting Internet Attacks

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own […]

READ MORE

Ebooks / FEATURED

A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf

Tagged , , Leave a Comment on A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks.pdf

Disclaimer The contributor(s) cannot be held responsible for any misuse of the data. This repository is just a collection of URLs to download eBooks for free. Download the eBooks at your own […]

READ MORE

FEATURED / Pentesting

Advanced Javascript Video Course

Leave a Comment on Advanced Javascript Video Course

Disclaimer The contributor(s) cannot be held responsible for any misuse of this data. All credits go to Tyler Ginnis. Download the video course at your own risks and pre-cautions. DMCA take down […]

READ MORE

FEATURED / Free courses

Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

A Manual Bug Bounty Hunting Course Created by Vikash Chaudhary Last updated 8/2018 English What you’ll learn Hall of Fame | Rewards | Bug Bounty | Appreciation | Bug Bounty Hunting | […]

READ MORE

FEATURED

Offensive Security OSCP v2020 pdf

Offensive Security OSCP v2020 pdf We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational […]

READ MORE

FEATURED

Turn your android in to web server

Leave a Comment on Turn your android in to web server

Welcome to hacking a rise i am the laughing man and today im going to show you how to turn your android in to webserver with out root using termux and golag […]

READ MORE

FEATURED / Free courses / pentesting courses

Website Hacking / Penetration Testing & Bug Bounty Hunting

Leave a Comment on Website Hacking / Penetration Testing & Bug Bounty Hunting

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts. What you’ll learn with Website Hacking / Penetration Testing & Bug Bounty Hunting […]

READ MORE