Skip to content
  • Donate to support hacking a rise
  • Home
  • Pentesting tutorials and ebooks
    • Tutorials
    • Metasploit
    • sniffing and spoofing
    • Exploits
    • Android
    • Web-app hacking
    • Information Gathering
      • Reconnaissance
    • Hash cracking
    • WIFI HACKING
    • Social Engineering
    • Forensics
    • ctf’s
    • Vulnerability Analysis
    • post exploitation
    • Reverse Engineering
    • Free eBooks and course’s
      • pentesting courses
      • Ebooks
      • programing courses
  • penetration testing info
  • Website hosting
  • Our services
    • Facebook
    • Twitter
    • Twitch
    • Youtube
    • Github
    • Discord
    • Store
    • Hacking a rise link shortner
  • Cryptocurrency
    • Monero
  • Privacy Policy
  • Terms of Service
  • DMCA – Copyrights
  • useful links
    • VPNS
      • Purevpn
      • Nord vpn
      • Labs
  • CPHSEC
  • Donate to support hacking a rise
  • Home
  • Pentesting tutorials and ebooks
    • Tutorials
    • Metasploit
    • sniffing and spoofing
    • Exploits
    • Android
    • Web-app hacking
    • Information Gathering
    • Hash cracking
    • WIFI HACKING
    • Social Engineering
    • Forensics
    • ctf’s
    • Vulnerability Analysis
    • post exploitation
    • Reverse Engineering
    • Free eBooks and course’s
  • penetration testing info
  • Website hosting
  • Our services
    • Facebook
    • Twitter
    • Twitch
    • Youtube
    • Github
    • Discord
    • Store
    • Hacking a rise link shortner
  • Cryptocurrency
    • Monero
  • Privacy Policy
  • Terms of Service
  • DMCA – Copyrights
  • useful links
    • VPNS
  • CPHSEC

Hacking A Rise

Providing a safe world

  • Donate to support hacking a rise
  • Home
  • Pentesting tutorials and ebooks
    • Tutorials
    • Metasploit
    • sniffing and spoofing
    • Exploits
    • Android
    • Web-app hacking
    • Information Gathering
      • Reconnaissance
    • Hash cracking
    • WIFI HACKING
    • Social Engineering
    • Forensics
    • ctf’s
    • Vulnerability Analysis
    • post exploitation
    • Reverse Engineering
    • Free eBooks and course’s
      • pentesting courses
      • Ebooks
      • programing courses
  • penetration testing info
  • Website hosting
  • Our services
    • Facebook
    • Twitter
    • Twitch
    • Youtube
    • Github
    • Discord
    • Store
    • Hacking a rise link shortner
  • Cryptocurrency
    • Monero
  • Privacy Policy
  • Terms of Service
  • DMCA – Copyrights
  • useful links
    • VPNS
      • Purevpn
      • Nord vpn
      • Labs
  • CPHSEC
  • How to use Katana Framework v1.0 1
    FEATURED / Tutorials

    How to use Katana Framework v1.0

    30th November 2019
  • how to use easysploit to hack 2
    Exploits / FEATURED / Tutorials

    how to use easysploit to hack

    29th November 2019
  • Kali Linux 2019.4 includes new undercover mode 3
    FEATURED / Linux / News / Operating Systems

    Kali Linux 2019.4 includes new undercover mode

    28th November 2019
  • Hunter person search v 1.0 4
    FEATURED

    Hunter person search v 1.0

    25th November 2019
  • Building a link shortener under 20 mins 5
    FEATURED / HTML, CSS, PHP / Tutorials

    Building a link shortener under 20 mins

    24th November 2019
  • Using Netcat with Ngrok part 1 6
    Exploits / Exploits / FEATURED / Metasploit / Pentesting

    Using Netcat with Ngrok part 1

    7th November 2019
  • How to create a Tor SSL hidden service - Termux 7
    Android / darknet / FEATURED / Networks / OpenSSL / Termux / Tutorials

    How to create a Tor SSL hidden service – Termux

    5th November 2019
  • How to reverse DNS in Termux 8
    FEATURED / Website Security

    How to reverse DNS in Termux

    26th October 2019
  • Hands-On Penetration Testing with Kali NetHunter 9
    Ebooks / FEATURED

    Hands-On Penetration Testing with Kali NetHunter

    24th October 2019
  • Hack a pc with pdf using msfconsole 10
    Metasploit / Exploits / FEATURED

    Hack a pc with pdf using msfconsole

    19th October 2019

Category: Android

Android Hacking. Hacking applications,tools and resources, and securing your device from getting hacked.

Using Netcat with Ngrok part 1
Exploits Exploits FEATURED Metasploit Pentesting 

Using Netcat with Ngrok part 1

On 7th November 2019 by Laughingman

Welcome to hacking a rise i am the Laughing man in this short post im going to show ya a handy way to use ncat with ngrok to forward ports over ssh whoop let just say how fucking great ngrok is whoop…

Comments Off on Using Netcat with Ngrok part 1
Continue Reading
How to create a Tor SSL hidden service – Termux
Android darknet FEATURED Networks OpenSSL Termux Tutorials 

How to create a Tor SSL hidden service – Termux

On 5th November 2019 by X-termux

Hello ladies and gentlemen, boys and girls, to tonight’s show. I will be your host. Now, let me explain to you how to create a Tor hidden service, and as a bonus, I will teach you how to set SSL to it…

Comments Off on How to create a Tor SSL hidden service – Termux
Continue Reading
How to use  TheFatRat and Ngrok and Armitage
FEATURED Exploits Exploits Metasploit Pentesting Tutorials 

How to use TheFatRat and Ngrok and Armitage

On 5th October 2019 by Laughingman

Welcome to hacking a rise Welcome to Hacking A Rise Im the Laughingman the only legend you need to know Im here to show u how to hack any pc with TheFatRat and Ngrok and Armitage this tutorial is for windows Pc’s…

Comments Off on How to use TheFatRat and Ngrok and Armitage
Continue Reading
How to bruteforce website logins with Hydra
Android Pentesting Termux Website Security 

How to bruteforce website logins with Hydra

On 6th September 2019 by X-termux

Hello everyone, this is IRISnoir from Hackingarise. Coming at you hot with another post for our blog. This time, it’s about website logins and how to crack them open. You ready? Let’s bounce. The first thing that you wanna do before all…

No comment
Continue Reading
Top 5 ways to attack an account through Android
Android Pentesting Tutorials 

Top 5 ways to attack an account through Android

On 5th September 2019 by X-termux

Hello everyone, this is IRISnoir from Hackingarise. Today I am back for another post. As you can see in the title, I will list and discuss about the top 5 ways to access another user’s account… just through your phone. Let’s get…

No comment
Continue Reading
How to install android 8.0 on virtual box for a test lab
Android FEATURED Operating Systems Pentesting Tutorials 

How to install android 8.0 on virtual box for a test lab

On 21st August 2019 by Laughingman

Wassap people laughing man here with another one to start are Monday off with how to install android ROM on a virtual box for testing payloads and apps so on . See the beauty of vms are no matter what you do…

No comment
Continue Reading
How to view websites with Tor router in Termux
Termux sniffing and spoofing 

How to view websites with Tor router in Termux

On 16th August 2019 by X-termux

Hello everyone~, this is IRISnoir from Hackingarise. Bringing to you another tutorial. This time about how to use Termux to look at a site anonymously with Tor. This is dedicated for those who wants to do stuff in their Termux without having…

No comment
Continue Reading
How to capture phone-call packets
Pentesting sniffing and spoofing Termux 

How to capture phone-call packets

On 6th August 2019 by X-termux

Hey guys~ This is IRISnoir from Hackingarise. Bringing to you another tutorial. This time it’s about how we can observe phone-call packets using the ultimate network sniffer: Tshark. Now, if you are unfamiliar with it then maybe you should check this out….

No comment
Continue Reading
How to block DNS queries with only 1 config file
Termux 

How to block DNS queries with only 1 config file

On 29th July 2019 by X-termux

Hello everyone, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today, I will discuss about DNS query blocking. But first, if you don’t know what DNS is or what they even mean, you should take a look at this. Also…

No comment
Continue Reading
How to use Nmap for network scanning
Pentesting Reconnaissance Termux 

How to use Nmap for network scanning

On 26th July 2019 by X-termux

Hello, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today we will be discussing about one of the most essential steps in hacking: Scanning, and it’s representative, Nmap. Now, hacking has 5 phases: – Reconnaissance – Scanning – Gaining access…

No comment
Continue Reading
How to use Radare2 – Reverse engineering tool
Reverse Engineering Termux 

How to use Radare2 – Reverse engineering tool

On 21st July 2019 by X-termux

Hello everybody~~ This is IRISnoir from hackingarise. Bringing to you another Termux tutorial. Today we’ll be discussing about the handy-dandy reverse engineering toolkit, Radare2. Now, a brief description of it’s usage, shall we? Radare2 is a very handy reverse engineering tool. It…

No comment
Continue Reading
How to use Weechat, the IRC client in Termux
Android Termux 

How to use Weechat, the IRC client in Termux

On 17th July 2019 by X-termux

Hello everyone~~ This is IRISnoir from Hackingarise. Bringing another Termux tutorial. This time about Weechat. Brief description of its usage: You want to talk to your friends. But you don’t want the usual, boring, tame Calibri text. You want something new, something…

No comment
Continue Reading
Termux Tutorials 

OpenSSL instruction: How to encypher and decypher files

On 13th July 2019 by X-termux

Hello everyone~~~ This is IRISnoir from Hackingarise. Coming back with a Termux based tutorial. This time about OpenSSL, the encryption tool. Now, a brief description of it’s usage: In this world, everyone has the right to privacy. But there are some people…

No comment
Continue Reading
How to use Tshark – the brother of Wireshark
Android Reconnaissance Termux 

How to use Tshark – the brother of Wireshark

On 7th July 2019 by X-termux

Hello everyone~~ This is IRISnoir from Hackingarise. Bringing to you a tutorial. Let’s get started. Now, this tutorial’s gonna show you about the usage of Tshark Now, a little description: Tshark is the brother of Wireshark. But, Tshark is only compatible on…

No comment
Continue Reading
How to use traceroute in Termux.
Android Termux 

How to use traceroute in Termux.

On 6th July 2019 by X-termux

Hello guys~~ This is IRISnoir. And I’ll be making this tutorial for yall. This tutorial is about how to traceroute a remote IP through hops. Now, how does this work? You may ask. It traces the given IP by hopping from many…

No comment
Continue Reading
Termux 

Termux Tutorial: IPtables (Part 3-2 – Tables explanation)

On 2nd July 2019 by X-termux

Hiii guyyyys~~ It’s me IRISnoir and coming with a vid. I hope you enjoy.

No comment
Continue Reading
Termux 

Termux Tutorial: IPtables (Part 3-1 – IPtables explanation)

On 2nd July 2019 by X-termux

Hi guys, this is IRISnoir bringing to you my latest vids. Today about IPtables.

No comment
Continue Reading
Android Pentesting Termux 

Termux Tutorial: IPtables (Part 2-4 – IPtables usage)

On 27th June 2019 by X-termux

Aye guys, it’s me IRISnoir and made another part of the iptables tutorial. Hope you guys enjoy 🙂

No comment
Continue Reading
Tutorials Android Termux 

Termux Tutorial: IPtables (Part 2-3 – IPtables usage)

On 23rd June 2019 by X-termux

welcome to hacking a rise im X-termux (irisnoir )in this video i show you how to use iptables in termux

No comment
Continue Reading
Get a location with an IP adress
Android Information Gathering Linux Mac Reconnaissance Tutorials Windows 

Get a location with an IP adress

On 23rd June 2019 by sergeyBrin

Get a Location using an IP adress   Hey guys ! Lasr here 🙂 Today I’m gonna show you how to get the approximate location of an IP with iplocation.net. For this tutorial, you will need : A computer/smartphone/tablet with any OS…

No comment
Continue Reading

Posts navigation

1 2 Next

Rss feed

RSS Feed RSS - Posts

RSS Feed RSS - Comments

Check out hacking a rise on minds
Check out 3d lock

donate to hacking a rise

Nmap

How to use Nmap for network scanning

26th July 2019
No comment
How to reverse DNS in Termux 40

How to reverse DNS in Termux

26th October 2019
Comments Off on How to reverse DNS in Termux
Python Notes for Professionals 41

Python Notes for Professionals

24th February 2019
No comment
Free YouTube Subscribers & Video Likes
Facebook Like us on facebook
Twitter Tweet us on twitter
Hacking a rise
Designed & Developed by Sparkle Themes
en English
af Afrikaanssq Albanianam Amharicar Arabichy Armenianaz Azerbaijanieu Basquebe Belarusianbn Bengalibs Bosnianbg Bulgarianca Catalanceb Cebuanony Chichewazh-CN Chinese (Simplified)zh-TW Chinese (Traditional)co Corsicanhr Croatiancs Czechda Danishnl Dutchen Englisheo Esperantoet Estoniantl Filipinofi Finnishfr Frenchfy Frisiangl Galicianka Georgiande Germanel Greekgu Gujaratiht Haitian Creoleha Hausahaw Hawaiianiw Hebrewhi Hindihmn Hmonghu Hungarianis Icelandicig Igboid Indonesianga Irishit Italianja Japanesejw Javanesekn Kannadakk Kazakhkm Khmerko Koreanku Kurdish (Kurmanji)ky Kyrgyzlo Laola Latinlv Latvianlt Lithuanianlb Luxembourgishmk Macedonianmg Malagasyms Malayml Malayalammt Maltesemi Maorimr Marathimn Mongolianmy Myanmar (Burmese)ne Nepalino Norwegianps Pashtofa Persianpl Polishpt Portuguesepa Punjabiro Romanianru Russiansm Samoangd Scottish Gaelicsr Serbianst Sesothosn Shonasd Sindhisi Sinhalask Slovaksl Slovenianso Somalies Spanishsu Sudanesesw Swahilisv Swedishtg Tajikta Tamilte Teluguth Thaitr Turkishuk Ukrainianur Urduuz Uzbekvi Vietnamesecy Welshxh Xhosayi Yiddishyo Yorubazu Zulu