Exploits / Exploits / FEATURED / Information Gathering / Pentesting

Phishing accounts

Leave a Comment on Phishing accounts

Welcome to hacking a rise, I am the laughing man and in this post i will show you how to phish peoples accounts the tool i will be using is Going Phishing […]

READ MORE

Exploits / Exploits / FEATURED / Metasploit / Pentesting

Using Netcat with Ngrok part 1

Welcome to hacking a rise i am the Laughing man in this short post im going to show ya a handy way to use ncat with ngrok to forward ports over ssh […]

READ MORE

FEATURED / Exploits / Exploits / Metasploit / Pentesting / Tutorials

How to use TheFatRat and Ngrok and Armitage

Welcome to hacking a rise Welcome to Hacking A Rise Im the Laughingman the only legend you need to know Im here to show u how to hack any pc with TheFatRat […]

READ MORE

Android / Exploits / Exploits / Pentesting / Reverse Engineering

Embed apks with Evildroid

Leave a Comment on Embed apks with Evildroid

welcome to hacking a rise today we are going to show you how to embed a payload to a apk with evildroid this will help with av bypassing on android so lets […]

READ MORE

Android / Exploits / FEATURED / Github

Apkwash android antivirus evasion for Msfvemon

Leave a Comment on Apkwash android antivirus evasion for Msfvemon

Welcome back lads and gals hope you are all good 🙂 so what I’m going to show a simple trick to embed your msfvemon payloads this will help it bypass basic factory […]

READ MORE

Exploits / FEATURED / Pentesting / sniffing and spoofing / Tutorials

Man in the Middle simple attack

Leave a Comment on Man in the Middle simple attack

so today we are going to learn man in the middle attack. What is a man in the middle attack?? well a man in the middle attack is when a hacker connect’s […]

READ MORE

Free courses / Linux / Programing / programing courses / Python / Tutorials

Python Programming Series Part 1 – Dev Setup

Greetings everyone, I’m red_riot, Hacking A Rise’s very own Forward Defence Minister, and today I am here to teach you all python programming with a specific focus on sockets.  After we learn […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

FEATURED / Ebooks

SQL Injection Strategies July 15, 2020 E-book

Hey guys how are all of you welcome to hacking a rise i am the Laughing man and this is the SQL Injection Strategies July 15, 2020 E-book downloaded for free so […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

how to find the owner of a number with phoneinfoga

Leave a Comment on how to find the owner of a number with phoneinfoga

welcome to Hacking a rise in this post we are going to search for a phone number as sometimes we only have a number two go on the tool we are going […]

READ MORE