FEATURED / Tutorials

pentest.training free testing lads

Leave a Comment on pentest.training free testing lads

Story lads and gals laughing man here with another post this one more to save you money ad wasting time on hack the box i bring to you a site that not […]

READ MORE

Tutorials / Hash cracking

How to brute a email with Medusa V2.2

Leave a Comment on How to brute a email with Medusa V2.2

Sup Guys been a long time i know i have been busy with a new kid on the way so im busy anyways i am the laughing man and this post is […]

READ MORE

Tutorials / Hash cracking

Brute forcing emails with Hyrda v8.9.1

Leave a Comment on Brute forcing emails with Hyrda v8.9.1

welcome to hacking a rise in this post we are going to show you how to brute a email account with not password list using hydra pre-installed tool on kali linux as […]

READ MORE

FEATURED / Exploits / Tutorials

XHydra to brute ssh

Leave a Comment on XHydra to brute ssh

Welcome to hacking a rise in this we are going to show you how to brute a ssh with xhydra pre installed on kali linux this the gui of hydra (aka Thc-Hydra) […]

READ MORE

FEATURED / Pentesting / Tutorials

Lunar a python Pen testing Framework

Leave a Comment on Lunar a python Pen testing Framework

Welcome back to hacking a rise i am the one and only laughing man coming from the middle of no were hahaha in this post we going to look at lunar a […]

READ MORE

Tutorials / FEATURED

Netset Operational Security utility and automator

Leave a Comment on Netset Operational Security utility and automator

Welcome to hacking a rise in this post we are going to show you how to install netset on kali linux as allways i am the laughingman and this is hacking a […]

READ MORE

post exploitation / FEATURED / Tutorials

How to set up and use empire part one

Leave a Comment on How to set up and use empire part one

welcome to hacking a rise on this fine Sunday i am the one and only laughingman and in this post im going to show you how to set up empire on kali […]

READ MORE

Reconnaissance / FEATURED / Information Gathering / Tutorials

How to use Ghost_eye

Leave a Comment on How to use Ghost_eye

welcome to hacking a rise in this post we are going to show you how to use this magnificent tool ghost eye by Jolanda de Koff BullsEye0 so lets get bet in […]

READ MORE

Termux / Tutorials

OpenSSL instruction: How to encypher and decypher files

Leave a Comment on OpenSSL instruction: How to encypher and decypher files

Hello everyone~~~ This is IRISnoir from Hackingarise. Coming back with a Termux based tutorial. This time about OpenSSL, the encryption tool. Now, a brief description of it’s usage: In this world, everyone […]

READ MORE

FEATURED / Social Engineering / Tutorials

Link shortener’s a hackers friend

Leave a Comment on Link shortener’s a hackers friend

Welcome to Hacking a rise today we are going to talk to you about link shorter’s these are site were u post you long link and it gaves you a shorter link […]

READ MORE

Tutorials / FEATURED / Linux / sniffing and spoofing

MITM with Xerosploit

Leave a Comment on MITM with Xerosploit

Welcome to hacking a rise i this post we are going to show you how to perform a man in the middle attack with a tool called Xerosploit this tool was designed […]

READ MORE

Tutorials / FEATURED

Cewl custom password list

Leave a Comment on Cewl custom password list

Welcome to hacking a rise i am the laughing man and today im going to show you the basics of Cewl for building custom word lists .. What is Cewl CeWL is […]

READ MORE

Programing / Python / Tutorials

Make a program that flips a coin in Python 3

Leave a Comment on Make a program that flips a coin in Python 3

Welcome back to another tutorial, today we will be making a script that flips a coin and randomly selects heads or tails. To start, make a new python file and name it […]

READ MORE

Android / Information Gathering / Linux / Mac / Reconnaissance / Tutorials / Windows

Get a location with an IP adress

Leave a Comment on Get a location with an IP adress

Get a Location using an IP adress   Hey guys ! Lasr here 🙂 Today I’m gonna show you how to get the approximate location of an IP with iplocation.net. For this […]

READ MORE

Hash cracking / Pentesting / Tutorials

how to use Crunch

Leave a Comment on how to use Crunch

welcome to hacking a rise im the laughingman in this post im going to show you how to make word lists using crunch pre installed on Kali Linux (Note) this is a […]

READ MORE

Programing / Python / Tutorials

Make an IP finder using python 3

Leave a Comment on Make an IP finder using python 3

Welcome Everyone, in today’s tutorial I will be teaching you how to make an IP finder using socket in Python. To start, fire up Pycharm and create a new file for this […]

READ MORE

Pentesting / Forensics / Tutorials

Steganography

Leave a Comment on Steganography

Welcome to hacking a rise yes its me laughing man with another yes another post lol in this were and going to talk about Steganography this were you hide a message in […]

READ MORE

FEATURED / Free courses

Udemy-Bug Bounty Hunting – Offensive Approach to Hunt Bugs

A Manual Bug Bounty Hunting Course Created by Vikash Chaudhary Last updated 8/2018 English What you’ll learn Hall of Fame | Rewards | Bug Bounty | Appreciation | Bug Bounty Hunting | […]

READ MORE

FEATURED

Offensive Security OSCP v2020 pdf

Offensive Security OSCP v2020 pdf We’ll get to the point: Penetration Testing with Kali Linux (PWK) has been overhauled for 2020. It’s bigger and better than ever before. PWK is the foundational […]

READ MORE

FEATURED

Turn your android in to web server

Leave a Comment on Turn your android in to web server

Welcome to hacking a rise i am the laughing man and today im going to show you how to turn your android in to webserver with out root using termux and golag […]

READ MORE

FEATURED / Free courses / pentesting courses

Website Hacking / Penetration Testing & Bug Bounty Hunting

Leave a Comment on Website Hacking / Penetration Testing & Bug Bounty Hunting

Become a bug bounty hunter! Hack websites & web applications like black hat hackers and secure them like experts. What you’ll learn with Website Hacking / Penetration Testing & Bug Bounty Hunting […]

READ MORE