FEATURED / Free courses / pentesting courses

Cybersecurity Attacks (Red Team Activity)

Leave a Comment on Cybersecurity Attacks (Red Team Activity)

Learn about the different kinds of cyber attacks and how they can be executed Welcome to hackingarise i am the laughingman back agen offering more free courses this one on Cybersecurity Attacks […]

READ MORE

FEATURED

Install Nethunter on Termux without root

Leave a Comment on Install Nethunter on Termux without root

Welcome to hacking a rise. Here is how to install rootless Nethunter on android devices using Termux. This is handy for people that can’t root their devices. What is Termux Termux is […]

READ MORE

Exploits / Exploits / FEATURED / Information Gathering / Pentesting

Phishing accounts

Leave a Comment on Phishing accounts

Welcome to hacking a rise, I am the laughing man and in this post i will show you how to phish peoples accounts the tool i will be using is Going Phishing […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

TIDoS Framework for scanning sites

Leave a Comment on TIDoS Framework for scanning sites

Welcome one and all to hacking a rise is feels so good to be back writing agen whoop whoop for those that know me and those that dont i am the one […]

READ MORE

FEATURED / Free courses / pentesting courses

Practical Ethical Hacking – The Complete Course

Leave a Comment on Practical Ethical Hacking – The Complete Course

Practical Ethical Hacking The complete course Learn how to hack like a pro by a pro. Up to date practical hacking techniques with absolutely no filler. What you’ll learn in this course […]

READ MORE

Malicious software

VirusTotal – The Special Online Virus Database Scanner

Leave a Comment on VirusTotal – The Special Online Virus Database Scanner

Good evening everyone. This is IRISnoir from Hackingarise. Bringing to you another tutorial. This time about viruses and VirusTotal, a virus database scanner. Sit back and keep reading. Overview Now, viruses are […]

READ MORE

C / Programing / Tutorials

Exiting in C – Program Tutorial

Leave a Comment on Exiting in C – Program Tutorial

Hey there today I will show you two ways to exit your program in C language, I will make this simple as possible and include examples so you know how to use […]

READ MORE

FEATURED

Simple Command Injection

Leave a Comment on Simple Command Injection

Breif Command injection is a vuln that allows you to submit sys commands to a computer running a website. This happens when the app fails to encode user input that goes to […]

READ MORE

Web-app hacking / Pentesting

Taking a look into Directory Traversal

Leave a Comment on Taking a look into Directory Traversal

Yo! Wassup lads, wolf is back and today we be looking at some web hacking, directory traversal in particular. Directory Traversal is a vuln where an application takes user input and uses […]

READ MORE

FEATURED / Information Gathering / sniffing and spoofing

Bettercap v2 – Ettercap but better

Leave a Comment on Bettercap v2 – Ettercap but better

Hello, everyone. This is IRISnoir from Hackingarise. How are you all today. I’m here with another tutorial. This time, I will discuss about Bettercap. Overview: Bettercap is the Swiss Army knife for […]

READ MORE

FEATURED / Tutorials

How to use Katana Framework v1.0

welcome to Hacking a rise i am the laughingman and this a tutoral on Katnana framework what is Kantana Frame work katana is a framework written in python for making penetration testing, […]

READ MORE

Exploits / FEATURED / Tutorials

how to use easysploit to hack

Welcome to hacking a rise. I am the laughing man and in this post we are going to talk about easysploit automated metasploit script in bash its a little like sploitgen but […]

READ MORE

FEATURED / Linux / News / Operating Systems

Kali Linux 2019.4 includes new undercover mode

Leave a Comment on Kali Linux 2019.4 includes new undercover mode

Wasap my little hackers hope you are all doing good ?? in this post we are going to talk about kali undercover mode. What is undercover mode i hear you ask well […]

READ MORE

FEATURED

Hunter person search v 1.0

Welcome to hacking a rise i am the laughing man and today i got a treat for ye since you all enjoy my tools i made a new script as you can […]

READ MORE

FEATURED / HTML, CSS, PHP / Tutorials

Building a link shortener under 20 mins

Welcome to hacking a rise guys and gals i am the Laughingman and today i am going to show you how to build a link shortener service many hackers use this to […]

READ MORE

Exploits / Exploits / FEATURED / Metasploit / Pentesting

Using Netcat with Ngrok part 1

Welcome to hacking a rise i am the Laughing man in this short post im going to show ya a handy way to use ncat with ngrok to forward ports over ssh […]

READ MORE

Android / darknet / FEATURED / Networks / OpenSSL / Termux / Tutorials

How to create a Tor SSL hidden service – Termux

Hello ladies and gentlemen, boys and girls, to tonight’s show. I will be your host. Now, let me explain to you how to create a Tor hidden service, and as a bonus, […]

READ MORE

Hash cracking

dehash: Hash decryptor – by IRISnoir

Good evening, lads and lassies. This is IRISnoir from Hackingarise. Bringing to you today’s post: about dehash. A tool made by me. This tool is a hash decryptor that supports 12 hash […]

READ MORE

FEATURED / Website Security

How to reverse DNS in Termux

Hi everyone, this is the Termux Hacker of Hackingarise, it’s me, IRISnoir. Bringing another tutorial to you to help with your pentesting skills. Now I will get straight into it, today’s topic […]

READ MORE

Ebooks / FEATURED

Hands-On Penetration Testing with Kali NetHunter

Welcome to hacking a rise today we got a treat for you all hands on pentesting with nethunter what can i say to this only i use nethunter more my laptop lol […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

FEATURED / Ebooks

SQL Injection Strategies July 15, 2020 E-book

Hey guys how are all of you welcome to hacking a rise i am the Laughing man and this is the SQL Injection Strategies July 15, 2020 E-book downloaded for free so […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

how to find the owner of a number with phoneinfoga

Leave a Comment on how to find the owner of a number with phoneinfoga

welcome to Hacking a rise in this post we are going to search for a phone number as sometimes we only have a number two go on the tool we are going […]

READ MORE

FEATURED / ctf's / Tutorials / Vulnerability Analysis / Website Security

Gaining hack the box invite code 2020

Hey guys and gals welcome to Im the one and only Laughingman and in this post i will be showing you how to get the invite code to hacking a rise as […]

READ MORE