Exploits / Exploits / FEATURED / Information Gathering / Pentesting

Phishing accounts

Leave a Comment on Phishing accounts

Welcome to hacking a rise, I am the laughing man and in this post i will show you how to phish peoples accounts the tool i will be using is Going Phishing […]

READ MORE

Exploits / Exploits / FEATURED / Metasploit / Pentesting

Using Netcat with Ngrok part 1

Welcome to hacking a rise i am the Laughing man in this short post im going to show ya a handy way to use ncat with ngrok to forward ports over ssh […]

READ MORE

Android / darknet / FEATURED / Networks / OpenSSL / Termux / Tutorials

How to create a Tor SSL hidden service – Termux

Hello ladies and gentlemen, boys and girls, to tonight’s show. I will be your host. Now, let me explain to you how to create a Tor hidden service, and as a bonus, […]

READ MORE

FEATURED / Exploits / Exploits / Metasploit / Pentesting / Tutorials

How to use TheFatRat and Ngrok and Armitage

Welcome to hacking a rise Welcome to Hacking A Rise Im the Laughingman the only legend you need to know Im here to show u how to hack any pc with TheFatRat […]

READ MORE

Android / Pentesting / Termux / Website Security

How to bruteforce website logins with Hydra

Leave a Comment on How to bruteforce website logins with Hydra

Hello everyone, this is IRISnoir from Hackingarise. Coming at you hot with another post for our blog. This time, it’s about website logins and how to crack them open. You ready? Let’s […]

READ MORE

Android / Pentesting / Tutorials

Top 5 ways to attack an account through Android

Leave a Comment on Top 5 ways to attack an account through Android

Hello everyone, this is IRISnoir from Hackingarise. Today I am back for another post. As you can see in the title, I will list and discuss about the top 5 ways to […]

READ MORE

Android / FEATURED / Operating Systems / Pentesting / Tutorials

How to install android 8.0 on virtual box for a test lab

Leave a Comment on How to install android 8.0 on virtual box for a test lab

Wassap people laughing man here with another one to start are Monday off with how to install android ROM on a virtual box for testing payloads and apps so on . See […]

READ MORE

Termux / sniffing and spoofing

How to view websites with Tor router in Termux

Leave a Comment on How to view websites with Tor router in Termux

Hello everyone~, this is IRISnoir from Hackingarise. Bringing to you another tutorial. This time about how to use Termux to look at a site anonymously with Tor. This is dedicated for those […]

READ MORE

Pentesting / sniffing and spoofing / Termux

How to capture phone-call packets

Leave a Comment on How to capture phone-call packets

Hey guys~ This is IRISnoir from Hackingarise. Bringing to you another tutorial. This time it’s about how we can observe phone-call packets using the ultimate network sniffer: Tshark. Now, if you are […]

READ MORE

Termux

How to block DNS queries with only 1 config file

Leave a Comment on How to block DNS queries with only 1 config file

Hello everyone, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today, I will discuss about DNS query blocking. But first, if you don’t know what DNS is or what they […]

READ MORE

Pentesting / Reconnaissance / Termux

How to use Nmap for network scanning

Leave a Comment on How to use Nmap for network scanning

Hello, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today we will be discussing about one of the most essential steps in hacking: Scanning, and it’s representative, Nmap. Now, hacking […]

READ MORE

Reverse Engineering / Termux

How to use Radare2 – Reverse engineering tool

Leave a Comment on How to use Radare2 – Reverse engineering tool

Hello everybody~~ This is IRISnoir from hackingarise. Bringing to you another Termux tutorial. Today we’ll be discussing about the handy-dandy reverse engineering toolkit, Radare2. Now, a brief description of it’s usage, shall […]

READ MORE

Android / Termux

How to use Weechat, the IRC client in Termux

Leave a Comment on How to use Weechat, the IRC client in Termux

Hello everyone~~ This is IRISnoir from Hackingarise. Bringing another Termux tutorial. This time about Weechat. Brief description of its usage: You want to talk to your friends. But you don’t want the […]

READ MORE

Termux / Tutorials

OpenSSL instruction: How to encypher and decypher files

Leave a Comment on OpenSSL instruction: How to encypher and decypher files

Hello everyone~~~ This is IRISnoir from Hackingarise. Coming back with a Termux based tutorial. This time about OpenSSL, the encryption tool. Now, a brief description of it’s usage: In this world, everyone […]

READ MORE

Android / Reconnaissance / Termux

How to use Tshark – the brother of Wireshark

Leave a Comment on How to use Tshark – the brother of Wireshark

Hello everyone~~ This is IRISnoir from Hackingarise. Bringing to you a tutorial. Let’s get started. Now, this tutorial’s gonna show you about the usage of Tshark Now, a little description: Tshark is […]

READ MORE

Android / Termux

How to use traceroute in Termux.

Leave a Comment on How to use traceroute in Termux.

Hello guys~~ This is IRISnoir. And I’ll be making this tutorial for yall. This tutorial is about how to traceroute a remote IP through hops. Now, how does this work? You may […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

FEATURED / Ebooks

SQL Injection Strategies July 15, 2020 E-book

Hey guys how are all of you welcome to hacking a rise i am the Laughing man and this is the SQL Injection Strategies July 15, 2020 E-book downloaded for free so […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

how to find the owner of a number with phoneinfoga

Leave a Comment on how to find the owner of a number with phoneinfoga

welcome to Hacking a rise in this post we are going to search for a phone number as sometimes we only have a number two go on the tool we are going […]

READ MORE

FEATURED / ctf's / Tutorials / Vulnerability Analysis / Website Security

Gaining hack the box invite code 2020

Hey guys and gals welcome to Im the one and only Laughingman and in this post i will be showing you how to get the invite code to hacking a rise as […]

READ MORE