Exploits / FEATURED / Metasploit / post exploitation

Metasploit browser autopwn2

Leave a Comment on Metasploit browser autopwn2

Metasploit browser autopwn2 welcome to hacking a rise as always I’m the laughing man so in the last post we talked about metasploit and share links or browser auto pwn we today […]

READ MORE

post exploitation / FEATURED / Tutorials

How to set up and use empire part one

Leave a Comment on How to set up and use empire part one

welcome to hacking a rise on this fine Sunday i am the one and only laughingman and in this post im going to show you how to set up empire on kali […]

READ MORE

Free courses / Linux / Programing / programing courses / Python / Tutorials

Python Programming Series Part 1 – Dev Setup

Greetings everyone, I’m red_riot, Hacking A Rise’s very own Forward Defence Minister, and today I am here to teach you all python programming with a specific focus on sockets.  After we learn […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

FEATURED / Ebooks

SQL Injection Strategies July 15, 2020 E-book

Hey guys how are all of you welcome to hacking a rise i am the Laughing man and this is the SQL Injection Strategies July 15, 2020 E-book downloaded for free so […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

how to find the owner of a number with phoneinfoga

Leave a Comment on how to find the owner of a number with phoneinfoga

welcome to Hacking a rise in this post we are going to search for a phone number as sometimes we only have a number two go on the tool we are going […]

READ MORE