Hash cracking

dehash: Hash decryptor – by IRISnoir

Good evening, lads and lassies. This is IRISnoir from Hackingarise. Bringing to you today’s post: about dehash. A tool made by me. This tool is a hash decryptor that supports 12 hash […]

READ MORE

Tutorials / Hash cracking

How to brute a email with Medusa V2.2

Leave a Comment on How to brute a email with Medusa V2.2

Sup Guys been a long time i know i have been busy with a new kid on the way so im busy anyways i am the laughing man and this post is […]

READ MORE

Tutorials / Hash cracking

Brute forcing emails with Hyrda v8.9.1

Leave a Comment on Brute forcing emails with Hyrda v8.9.1

welcome to hacking a rise in this post we are going to show you how to brute a email account with not password list using hydra pre-installed tool on kali linux as […]

READ MORE

Hash cracking / Pentesting / Tutorials

how to use Crunch

Leave a Comment on how to use Crunch

welcome to hacking a rise im the laughingman in this post im going to show you how to make word lists using crunch pre installed on Kali Linux (Note) this is a […]

READ MORE

Hash cracking / FEATURED / Pentesting

FTPBruter

Leave a Comment on FTPBruter

Welcome to hacking a rise what in the agenda today is a tool called FTPBruter is a brute forcing tool for FTP server. FTPBruter can work on any OS if they have […]

READ MORE

Hash cracking / FEATURED

Cracking hash’s with john the ripper

Leave a Comment on Cracking hash’s with john the ripper

So lets crack some hash’s with john the ripper on Kali  Linux lets start by get the hash im using sha256  so lets log up is site  https://www.xorbin.com/tools/sha256-hash-calculator     now we […]

READ MORE

Free courses / Linux / Programing / programing courses / Python / Tutorials

Python Programming Series Part 1 – Dev Setup

Greetings everyone, I’m red_riot, Hacking A Rise’s very own Forward Defence Minister, and today I am here to teach you all python programming with a specific focus on sockets.  After we learn […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

FEATURED / Ebooks

SQL Injection Strategies July 15, 2020 E-book

Hey guys how are all of you welcome to hacking a rise i am the Laughing man and this is the SQL Injection Strategies July 15, 2020 E-book downloaded for free so […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

how to find the owner of a number with phoneinfoga

Leave a Comment on how to find the owner of a number with phoneinfoga

welcome to Hacking a rise in this post we are going to search for a phone number as sometimes we only have a number two go on the tool we are going […]

READ MORE