Android / FEATURED / Operating Systems / Pentesting / Tutorials

How to install android 8.0 on virtual box for a test lab

Leave a Comment on How to install android 8.0 on virtual box for a test lab

Wassap people laughing man here with another one to start are Monday off with how to install android ROM on a virtual box for testing payloads and apps so on . See […]

READ MORE

FEATURED / Pentesting / Tutorials / WEP hacking / wifi hacking / WPA hacking / WPA2 hacking

SniffAir framework for wireless attacks

Leave a Comment on SniffAir framework for wireless attacks

Wasap people laughing man here with another post this ones on sniff air made for sophisticated wireless attacks and data capture it is mead with python 2.7 bit out dated on the […]

READ MORE

FEATURED / Exploits / Metasploit / SQL injection / Sqlmap / Tutorials / Website Security

Sql injection to Metasploit session

Leave a Comment on Sql injection to Metasploit session

Wassap people i am him the one and only laughing man back with ye another post this one on sql injection to metasploit session I know most you thinking laughing man you […]

READ MORE

FEATURED / Tutorials

pentest.training free testing lads

Leave a Comment on pentest.training free testing lads

Story lads and gals laughing man here with another post this one more to save you money ad wasting time on hack the box i bring to you a site that not […]

READ MORE

Tutorials / Hash cracking

How to brute a email with Medusa V2.2

Leave a Comment on How to brute a email with Medusa V2.2

Sup Guys been a long time i know i have been busy with a new kid on the way so im busy anyways i am the laughing man and this post is […]

READ MORE

Tutorials / Hash cracking

Brute forcing emails with Hyrda v8.9.1

Leave a Comment on Brute forcing emails with Hyrda v8.9.1

welcome to hacking a rise in this post we are going to show you how to brute a email account with not password list using hydra pre-installed tool on kali linux as […]

READ MORE

FEATURED / Exploits / Tutorials

XHydra to brute ssh

Leave a Comment on XHydra to brute ssh

Welcome to hacking a rise in this we are going to show you how to brute a ssh with xhydra pre installed on kali linux this the gui of hydra (aka Thc-Hydra) […]

READ MORE

FEATURED / Pentesting / Tutorials

Lunar a python Pen testing Framework

Leave a Comment on Lunar a python Pen testing Framework

Welcome back to hacking a rise i am the one and only laughing man coming from the middle of no were hahaha in this post we going to look at lunar a […]

READ MORE

Tutorials / FEATURED

Netset Operational Security utility and automator

Leave a Comment on Netset Operational Security utility and automator

Welcome to hacking a rise in this post we are going to show you how to install netset on kali linux as allways i am the laughingman and this is hacking a […]

READ MORE

post exploitation / FEATURED / Tutorials

How to set up and use empire part one

Leave a Comment on How to set up and use empire part one

welcome to hacking a rise on this fine Sunday i am the one and only laughingman and in this post im going to show you how to set up empire on kali […]

READ MORE

Reconnaissance / FEATURED / Information Gathering / Tutorials

How to use Ghost_eye

Leave a Comment on How to use Ghost_eye

welcome to hacking a rise in this post we are going to show you how to use this magnificent tool ghost eye by Jolanda de Koff BullsEye0 so lets get bet in […]

READ MORE

Termux / Tutorials

OpenSSL instruction: How to encypher and decypher files

Leave a Comment on OpenSSL instruction: How to encypher and decypher files

Hello everyone~~~ This is IRISnoir from Hackingarise. Coming back with a Termux based tutorial. This time about OpenSSL, the encryption tool. Now, a brief description of it’s usage: In this world, everyone […]

READ MORE

FEATURED / Social Engineering / Tutorials

Link shortener’s a hackers friend

Leave a Comment on Link shortener’s a hackers friend

Welcome to Hacking a rise today we are going to talk to you about link shorter’s these are site were u post you long link and it gaves you a shorter link […]

READ MORE

Tutorials / FEATURED / Linux / sniffing and spoofing

MITM with Xerosploit

Leave a Comment on MITM with Xerosploit

Welcome to hacking a rise i this post we are going to show you how to perform a man in the middle attack with a tool called Xerosploit this tool was designed […]

READ MORE

Tutorials / FEATURED

Cewl custom password list

Leave a Comment on Cewl custom password list

Welcome to hacking a rise i am the laughing man and today im going to show you the basics of Cewl for building custom word lists .. What is Cewl CeWL is […]

READ MORE

Programing / Python / Tutorials

Make a program that flips a coin in Python 3

Leave a Comment on Make a program that flips a coin in Python 3

Welcome back to another tutorial, today we will be making a script that flips a coin and randomly selects heads or tails. To start, make a new python file and name it […]

READ MORE

Android / Information Gathering / Linux / Mac / Reconnaissance / Tutorials / Windows

Get a location with an IP adress

Leave a Comment on Get a location with an IP adress

Get a Location using an IP adress   Hey guys ! Lasr here 🙂 Today I’m gonna show you how to get the approximate location of an IP with iplocation.net. For this […]

READ MORE

Free courses / Linux / Programing / programing courses / Python / Tutorials

Python Programming Series Part 1 – Dev Setup

Greetings everyone, I’m red_riot, Hacking A Rise’s very own Forward Defence Minister, and today I am here to teach you all python programming with a specific focus on sockets.  After we learn […]

READ MORE

FEATURED / Tutorials

How to stay anonymous online

Leave a Comment on How to stay anonymous online

so i was on Facebook on hacking groups and see a lot u think by using proxy chains u are fully anonymous don’t make me laugh this not the case as even […]

READ MORE

FEATURED / Ebooks

SQL Injection Strategies July 15, 2020 E-book

Hey guys how are all of you welcome to hacking a rise i am the Laughing man and this is the SQL Injection Strategies July 15, 2020 E-book downloaded for free so […]

READ MORE

FEATURED / Information Gathering / Pentesting / Reconnaissance

how to find the owner of a number with phoneinfoga

Leave a Comment on how to find the owner of a number with phoneinfoga

welcome to Hacking a rise in this post we are going to search for a phone number as sometimes we only have a number two go on the tool we are going […]

READ MORE