Exploits / Exploits / FEATURED / Information Gathering / Pentesting

Phishing accounts

Leave a Comment on Phishing accounts

Welcome to hacking a rise, I am the laughing man and in this post i will show you how to phish peoples accounts the tool i will be using is Going Phishing […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

TIDoS Framework for scanning sites

Leave a Comment on TIDoS Framework for scanning sites

Welcome one and all to hacking a rise is feels so good to be back writing agen whoop whoop for those that know me and those that dont i am the one […]

READ MORE

FEATURED / Information Gathering / sniffing and spoofing

Bettercap v2 – Ettercap but better

Leave a Comment on Bettercap v2 – Ettercap but better

Hello, everyone. This is IRISnoir from Hackingarise. How are you all today. I’m here with another tutorial. This time, I will discuss about Bettercap. Overview: Bettercap is the Swiss Army knife for […]

READ MORE

FEATURED / Reconnaissance / Tutorials / Website Security

How to clone a site with Httrack

welcome to hacking a rise here another post this time on cloning website What is httrack HTTrack is a free and open-source Web crawler and offline browser, developed by Xavier Roche and […]

READ MORE

Information Gathering / Pentesting / Reconnaissance

The 99 website scanner

Leave a Comment on The 99 website scanner

welcome back to hacking a rise people i am him the one and only laughing man so i was on Facebook see lot noobs out there saying they dont know how to […]

READ MORE

Pentesting / Reconnaissance / Termux

How to use Nmap for network scanning

Leave a Comment on How to use Nmap for network scanning

Hello, this is IRISnoir from Hackingarise. Bringing to you another tutorial. Today we will be discussing about one of the most essential steps in hacking: Scanning, and it’s representative, Nmap. Now, hacking […]

READ MORE

Information Gathering / Reconnaissance / Vulnerability Analysis / Web-app hacking

Whatweb web app vulnerability Scanner 0.4.9

84 Comments on Whatweb web app vulnerability Scanner 0.4.9

welcome to hacking a rise in this post i will show u how to use whatweb a simple vulnerability scanner pre installed on kali linux What is Whatsweb WhatWeb is a next […]

READ MORE

Information Gathering / Reconnaissance

Sherlock social meadia username search

Leave a Comment on Sherlock social meadia username search

Welcome to hacking a rise in this one we are going to show you how to install and use Sherlock python tool for searching social media as alway i am the laughing […]

READ MORE

Reconnaissance / Information Gathering

snoopy online username search

Leave a Comment on snoopy online username search

Welcome to hacking a rise today we going to show to you snoopy the online username search tool and as always im the laughingman lets start like we always do with the […]

READ MORE

Reconnaissance / FEATURED / Information Gathering / Tutorials

How to use Ghost_eye

Leave a Comment on How to use Ghost_eye

welcome to hacking a rise in this post we are going to show you how to use this magnificent tool ghost eye by Jolanda de Koff BullsEye0 so lets get bet in […]

READ MORE

FEATURED / Information Gathering / Reconnaissance

Shodan hackers search engine

Leave a Comment on Shodan hackers search engine

Welcome to hacking a rise im the laughingman this post a little different in this one we talk a little about shodan ( the hackers search engine ) What is Shodan Shodan […]

READ MORE

Reconnaissance / FEATURED / Information Gathering / Pentesting

IntRec – Pack Intelligence and Reconnaissance Package/Bundle installer

Leave a Comment on IntRec – Pack Intelligence and Reconnaissance Package/Bundle installer

Welcome to Hacking a rise in this i am going to show you how to install and use IntRec on any Debian system i am using Kali Linux for this tutorial Whats […]

READ MORE

Pentesting / Information Gathering / Reconnaissance / Vulnerability Analysis

How to use raccoon-scanner

Leave a Comment on How to use raccoon-scanner

Introduction Hello and welcome to another post and in this one we will be going over raccoon-scanner. This is a high performance offensive security tool that is made for recon and vuln […]

READ MORE

Android / Reconnaissance / Termux

How to use Tshark – the brother of Wireshark

Leave a Comment on How to use Tshark – the brother of Wireshark

Hello everyone~~ This is IRISnoir from Hackingarise. Bringing to you a tutorial. Let’s get started. Now, this tutorial’s gonna show you about the usage of Tshark Now, a little description: Tshark is […]

READ MORE

Reconnaissance / Information Gathering

The harvester

Leave a Comment on The harvester

Welcome to hacking a rise hacking a rise I am the Laughingman here with another post this time on getting emails of a domain using harvester this comes in handy for recon […]

READ MORE

Pentesting / Reconnaissance / sniffing and spoofing

How to dos with Hping3

Leave a Comment on How to dos with Hping3

welcome to hacking a rise I am the one and only Laughingman in this post Im going to show u the basics of Hping3 What is Hping3 Hping3 is a network tool […]

READ MORE

Android / Information Gathering / Linux / Mac / Reconnaissance / Tutorials / Windows

Get a location with an IP adress

Leave a Comment on Get a location with an IP adress

Get a Location using an IP adress   Hey guys ! Lasr here 🙂 Today I’m gonna show you how to get the approximate location of an IP with iplocation.net. For this […]

READ MORE

Pentesting / Forensics / Information Gathering / Reconnaissance

Exif Image Recon

Leave a Comment on Exif Image Recon

Welcome to hacking a rise in this post we talk about exif (Exchangeable image file) this is a the info stored on images (metadata) so here we will show you the command […]

READ MORE

FEATURED / Information Gathering / Linux / Pentesting / Reconnaissance / Reporting Tools / sniffing and spoofing

Nmap Basic’s part one Simple scan

Leave a Comment on Nmap Basic’s part one Simple scan

Welcome back to hacking arise lads Laughing Man here with a very basic understanding of some the commands in Nmap Free Security Scanner What is Nmap network scanner Nmap is a free […]

READ MORE

Information Gathering / FEATURED / Reconnaissance / Tutorials

Seeker tracking GPS

Leave a Comment on Seeker tracking GPS

Welcome lads and gals in this were going to talk a bout seeker a python3 tool designed to make a fake site for your target What is seeker gps tracker Seeker Hosts […]

READ MORE

FEATURED / Free courses

Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

A Manual Bug Bounty Hunting Course Created by Vikash Chaudhary Last updated 8/2018 English What you’ll learn Hall of Fame | Rewards | Bug Bounty | Appreciation | Bug Bounty Hunting | […]

READ MORE

FEATURED

Offensive Security OSCP v2020 pdf

Offensive Security OSCP v2020 pdf We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational […]

READ MORE

FEATURED

Turn your android in to web server

Leave a Comment on Turn your android in to web server

Welcome to hacking a rise i am the laughing man and today im going to show you how to turn your android in to webserver with out root using termux and golag […]

READ MORE

FEATURED / Free courses / pentesting courses

Website Hacking / Penetration Testing & Bug Bounty Hunting

Leave a Comment on Website Hacking / Penetration Testing & Bug Bounty Hunting

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts. What you’ll learn with Website Hacking / Penetration Testing & Bug Bounty Hunting […]

READ MORE