Exploits / Exploits / FEATURED / Information Gathering / Pentesting

Phishing accounts

Leave a Comment on Phishing accounts

Welcome to hacking a rise, I am the laughing man and in this post i will show you how to phish peoples accounts the tool i will be using is Going Phishing […]

READ MORE

Exploits / FEATURED / Tutorials

how to use easysploit to hack

Welcome to hacking a rise. I am the laughing man and in this post we are going to talk about easysploit automated metasploit script in bash its a little like sploitgen but […]

READ MORE

Exploits / Exploits / FEATURED / Metasploit / Pentesting

Using Netcat with Ngrok part 1

Welcome to hacking a rise i am the Laughing man in this short post im going to show ya a handy way to use ncat with ngrok to forward ports over ssh […]

READ MORE

Metasploit / Exploits / FEATURED

Hack a pc with pdf using msfconsole

Welcome back to hacking a rise i am the laughing man the one and only laughing man i am him whoop whoop so in this post we will be showing you now […]

READ MORE

Exploits / FEATURED / Metasploit / Pentesting

Hacking android with armitage

Welcome to hacking a rise Im the Laughingman and this is how to hack a android phone with armitage i will be doing a local hack as im to lazy to find […]

READ MORE

FEATURED / Exploits / Exploits / Metasploit / Pentesting / Tutorials

How to use TheFatRat and Ngrok and Armitage

Welcome to hacking a rise Welcome to Hacking A Rise Im the Laughingman the only legend you need to know Im here to show u how to hack any pc with TheFatRat […]

READ MORE

Exploits / FEATURED / Metasploit / post exploitation

Metasploit browser autopwn2

Leave a Comment on Metasploit browser autopwn2

Metasploit browser autopwn2 welcome to hacking a rise as always I’m the laughing man so in the last post we talked about metasploit and share links or browser auto pwn we today […]

READ MORE

Pentesting / Exploits / Metasploit

metasploit browser Autopwn 1

Leave a Comment on metasploit browser Autopwn 1

sup lads laughing man here with a new tutorial on browser auto pwn in metasploit in this i will be using it on my lan network so ( Two use over wan […]

READ MORE

FEATURED / Exploits / Metasploit / SQL injection / Sqlmap / Tutorials / Website Security

Sql injection to Metasploit session

Leave a Comment on Sql injection to Metasploit session

Wassap people i am him the one and only laughing man back with ye another post this one on sql injection to metasploit session I know most you thinking laughing man you […]

READ MORE

FEATURED / Exploits / Tutorials

XHydra to brute ssh

Leave a Comment on XHydra to brute ssh

Welcome to hacking a rise in this we are going to show you how to brute a ssh with xhydra pre installed on kali linux this the gui of hydra (aka Thc-Hydra) […]

READ MORE

Android / Exploits / Exploits / Pentesting / Reverse Engineering

Embed apks with Evildroid

Leave a Comment on Embed apks with Evildroid

welcome to hacking a rise today we are going to show you how to embed a payload to a apk with evildroid this will help with av bypassing on android so lets […]

READ MORE

FEATURED / Free courses

Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

A Manual Bug Bounty Hunting Course Created by Vikash Chaudhary Last updated 8/2018 English What you’ll learn Hall of Fame | Rewards | Bug Bounty | Appreciation | Bug Bounty Hunting | […]

READ MORE

FEATURED

Offensive Security OSCP v2020 pdf

Offensive Security OSCP v2020 pdf We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational […]

READ MORE

FEATURED

Turn your android in to web server

Leave a Comment on Turn your android in to web server

Welcome to hacking a rise i am the laughing man and today im going to show you how to turn your android in to webserver with out root using termux and golag […]

READ MORE

FEATURED / Free courses / pentesting courses

Website Hacking / Penetration Testing & Bug Bounty Hunting

Leave a Comment on Website Hacking / Penetration Testing & Bug Bounty Hunting

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts. What you’ll learn with Website Hacking / Penetration Testing & Bug Bounty Hunting […]

READ MORE