Proxychains-ng is an IP hiding tool. Located at the root-repo in termux. I am crafting this tutorial to help you get a grip on this tool’s usage. Step 1: Install required packages for the procedure. ‘Tor’ to create a circuit for Proxychains4 to relay on. $ pkg install tor proxychains-ng You also need to install …
Category Archives: FEATURED
FTPBruter
Welcome to hacking a rise what in the agenda today is a tool called FTPBruter is a brute forcing tool for FTP server. FTPBruter can work on any OS if they have and support Python 3. Feature of FTPBruter Brute force a FTP server with a username or a list of usernames (That’s all). Install …
Hacking a rise app
WELCOME to hacking a rise today is a good day see the thing about today is we tell you about hacking a rises new app for android phone coz mac is just gay hahahhaa but its been in the works last few weeks an its finely in the beta testing stages this mean u are …
How to use brut0s DFW – Doxing Tool
Welcome to the tutorial Hello and welcome to this tutorial, in this I will show you how to use brut0s DFW. Now brut0s DFW is a simple doxing framework that makes profiles on people, in this tutorial I will show you how easy it is for someone to use a tool like this to make …
Email Spoofing with sendmail and smtp2go
Welcome to hacking a rise in this post we are going to show you how to spoof a email with sendemail on kali linux using smtp2go for are server and send it to your target so lets talk of a few ways this can be used in 1: Phishing : Yes this method is used …
Acunetix: The Best in Class Vulnerability Scanner for Linux
Linux is the server operating system of choice for top businesses including Facebook, Twitter, and Google. Linux is also the desktop OS of choice for many information security analysts and penetration testers due to its security, reliability, and configurability. Many network security assessment tools run on Linux. That includes open source vulnerability scanning and penetration testing …
Continue reading “Acunetix: The Best in Class Vulnerability Scanner for Linux”
Basics of Termux
Termux can be a useful tool if you know how to utilize it. Don’t look down on it, really don’t. There’s useful tool in there too. And it’s take only a few KB to install, that’s almost free, good for fones with low storage. Well, until you start installing things in it. But that’s the …
how to set up a soul qbot ddos botnet on centos6.9 64bit
right this ones for the script kiddies out there who wanna hit their mates off on xbox or some shit, ddosing can be useful occasionally but most of the time its kinda pointless. your gonna need a CentOS 6 latest VPS with at least 1GB of ram (2gb + is better but it can be …
Continue reading “how to set up a soul qbot ddos botnet on centos6.9 64bit”
METASPLOIT_PENETRATION_TESTING_COOKBOOK_THIRD_EDITION.pdf
Metasploit is currently the world’s leading penetration-testing tool, and one of the biggest open-source projects in information security and penetration testing. It has totally revolutionized the way we can perform security tests on our systems. The reason Metasploit is so popular is the wide range of tasks that it can perform to ease the work …
Continue reading “METASPLOIT_PENETRATION_TESTING_COOKBOOK_THIRD_EDITION.pdf”
Beef over wan with serveo.net no port forwarding
Welcome back lads yes its another one on beef over wan this one for thos who dont got ngrok we can also use serveo to forward posts using ssh. What is beef Beef Xss Framework is a browser exploitation tool. It mainly focuses on client-side attacks and web-based browsers. It helps a penetration tester to …
Continue reading “Beef over wan with serveo.net no port forwarding”