FEATURED / Free courses / Pentesting / pentesting courses

HACKING IN PRACTICE: CERTIFIED ETHICAL HACKING MEGA COURSE

Leave a Comment on HACKING IN PRACTICE: CERTIFIED ETHICAL HACKING MEGA COURSE

HACKING IN PRACTICE: CERTIFIED ETHICAL HACKING MEGA COURSE HACKING IN PRACTICE: CERTIFIED ETHICAL HACKING MEGA COURSE Sensible Moral Hacking Strategies. Essentially the most intensive moral hacking on-line course. Over 27+ HOURS OF […]

READ MORE

OpenSSL / Pentesting

Tutorial: Generate an SSL certificate – OpenSSL

Leave a Comment on Tutorial: Generate an SSL certificate – OpenSSL

Hello everyone, this is the Termux hacker of the whole team, IRISnoir. Do you miss me? If you do, I’m here with ya. If you don’t, then you’re an asshole (just kidding). […]

READ MORE

Android / Pentesting / Termux / Website Security

How to bruteforce website logins with Hydra

Leave a Comment on How to bruteforce website logins with Hydra

Hello everyone, this is IRISnoir from Hackingarise. Coming at you hot with another post for our blog. This time, it’s about website logins and how to crack them open. You ready? Let’s […]

READ MORE

Android / Pentesting / Tutorials

Top 5 ways to attack an account through Android

Leave a Comment on Top 5 ways to attack an account through Android

Hello everyone, this is IRISnoir from Hackingarise. Today I am back for another post. As you can see in the title, I will list and discuss about the top 5 ways to […]

READ MORE

Pentesting / FEATURED / Tutorials

exHACK – the automator framework – IRISnoir

Leave a Comment on exHACK – the automator framework – IRISnoir

Hello everyone, this is IRISnoir from Hackingarise. Bringing to you another tutorial. This time about my hand-crafted tool: exHACK. You will need these: git to download my tool python to activate the […]

READ MORE

wifi hacking / FEATURED / Tutorials / WEP hacking / WPA hacking / WPA2 hacking

Hashcatch V1.0 automated WiFi hacker

Leave a Comment on Hashcatch V1.0 automated WiFi hacker

Welcome to hackingarise I’m the laughing man and this a tutorial is on Hashcatch a bash tool to automate wifi hacking dosnt that sound sexy my people ahaha i bet all u […]

READ MORE

Pentesting

how to use rebel – framework V1.0

Leave a Comment on how to use rebel – framework V1.0

welcome to hacking a rise in this post we are going to show u how to use and install the easy rebel framework for pen-testers and hackers a like . Rebel is […]

READ MORE

FEATURED / Social Engineering / Tutorials

How to use Hidden eye v 1.0

Leave a Comment on How to use Hidden eye v 1.0

welcome to hackingarise i am the laughing man the one and only and today in this post for Wednesday bit late with posting but look has to be do lol anyways in […]

READ MORE

Pentesting / Website Security

Introducing AcuForum – the extra weak forum

Leave a Comment on Introducing AcuForum – the extra weak forum

Hello everyone, this is IRISnoir from Hackingarise. I am back with another post for you. Now, today, we will be discussing about AcuForum, as you see in the title. Now, AcuForum is […]

READ MORE

Android / FEATURED / Operating Systems / Pentesting / Tutorials

How to install android 8.0 on virtual box for a test lab

Leave a Comment on How to install android 8.0 on virtual box for a test lab

Wassap people laughing man here with another one to start are Monday off with how to install android ROM on a virtual box for testing payloads and apps so on . See […]

READ MORE

Pentesting

XBRUTE – Hydra automated wizard

Leave a Comment on XBRUTE – Hydra automated wizard

Hello everyone~ This is IRISnoir from Hackingarise. Bringing to you another one of our tutorials. This one is about how to use a hand-made hydra script. That script is made by me. […]

READ MORE

FEATURED / Pentesting / Tutorials / WEP hacking / wifi hacking / WPA hacking / WPA2 hacking

SniffAir framework for wireless attacks

Leave a Comment on SniffAir framework for wireless attacks

Wasap people laughing man here with another post this ones on sniff air made for sophisticated wireless attacks and data capture it is mead with python 2.7 bit out dated on the […]

READ MORE

FEATURED / Exploits / Metasploit / SQL injection / Sqlmap / Tutorials / Website Security

Sql injection to Metasploit session

Leave a Comment on Sql injection to Metasploit session

Wassap people i am him the one and only laughing man back with ye another post this one on sql injection to metasploit session I know most you thinking laughing man you […]

READ MORE

Information Gathering / Pentesting / Reconnaissance

The 99 website scanner

Leave a Comment on The 99 website scanner

welcome back to hacking a rise people i am him the one and only laughing man so i was on Facebook see lot noobs out there saying they dont know how to […]

READ MORE

Termux / sniffing and spoofing

How to view websites with Tor router in Termux

Leave a Comment on How to view websites with Tor router in Termux

Hello everyone~, this is IRISnoir from Hackingarise. Bringing to you another tutorial. This time about how to use Termux to look at a site anonymously with Tor. This is dedicated for those […]

READ MORE

Tutorials / Hash cracking

How to brute a email with Medusa V2.2

Leave a Comment on How to brute a email with Medusa V2.2

Sup Guys been a long time i know i have been busy with a new kid on the way so im busy anyways i am the laughing man and this post is […]

READ MORE

Pentesting

Termux: check wlan card for any compatiblilty

Leave a Comment on Termux: check wlan card for any compatiblilty

Hello, this is IRISnoir from Hackingarise. Today, I will demonstrate how to check your wlan card if a particular mode is compatible. First, you will need these commands: tsudo airmon-ng(from package: aircrack-ng […]

READ MORE

Pentesting / sniffing and spoofing / Termux

How to capture phone-call packets

Leave a Comment on How to capture phone-call packets

Hey guys~ This is IRISnoir from Hackingarise. Bringing to you another tutorial. This time it’s about how we can observe phone-call packets using the ultimate network sniffer: Tshark. Now, if you are […]

READ MORE

sniffing and spoofing

How to spoof MAC address

Leave a Comment on How to spoof MAC address

Hello everyone, this is IRISnoir from Hackingarise. Coming with another tutorial. This time about how to change your MAC. Now, let’s get to the point. Changing MAC requires 4 things. Root privilege […]

READ MORE

Termux

How to block DNS queries with only 1 config file

Leave a Comment on How to block DNS queries with only 1 config file

Hello everyone, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today, I will discuss about DNS query blocking. But first, if you don’t know what DNS is or what they […]

READ MORE

FEATURED / Social Engineering

Doxxing: Overview, Instructions and Effects

Hello, I’m IRISnoir. I will be talking about doxxing and its general use. Doxxing is a hacking-based skill to uncover one or many individual’s personal information. This can lead to blackmail, kidnapping […]

READ MORE

FEATURED / Free courses

Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

A Manual Bug Bounty Hunting Course Created by Vikash Chaudhary Last updated 8/2018 English What you’ll learn Hall of Fame | Rewards | Bug Bounty | Appreciation | Bug Bounty Hunting | […]

READ MORE

FEATURED

Offensive Security OSCP v2020 pdf

Offensive Security OSCP v2020 pdf We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational […]

READ MORE

FEATURED

Turn your android in to web server

Leave a Comment on Turn your android in to web server

Welcome to hacking a rise i am the laughing man and today im going to show you how to turn your android in to webserver with out root using termux and golag […]

READ MORE