Bash Part Two Adding Functionality with Variables and User Input

Welcome back to part two of are bash on hacking a rise im the laughingman this is about adding Functionality with variables and user input this were you script starts to come to life and starts to do stuff so lets start with this section what is variables Are you for real like the title …

Bash part one Hello Hacking a rise

welcome to hacking a rise in this post we going to show you some basic Bash (aka shell) scripting with a script called hello world we going to explain with bash is and with the functions are as we progress on this part the blog now instead reading this and get stuck in to this …

How to use apktool on kali linux

Welcome to hacking a rise in this we are going to show you the 2 basic commands for apktool on Kali this used in reverse engineering OK android apps this will decompile and recompile the apps to expose the source code in this we will be using the modbro app. the advantages of this is …

Python Tutorial 5 – Outputting mouse location to GUI

Welcome back to another Python tutorial, in this tutorial you will learn how to output the mouse position to an alert. First, let's start with the previous code we made. import time import pyautogui time.sleep(5) print(pyautogui.position()) From here lets replace 'print(pyautogui.position()' with 'pyautogui.alert(pyautogui.position())'. your code should look something like this: import time import pyautogui time.sleep(5) …

Package tutorial: proxychains-ng

Proxychains-ng is an IP hiding tool. Located at the root-repo in termux. I am crafting this tutorial to help you get a grip on this tool's usage. Step 1: Install required packages for the procedure. 'Tor' to create a circuit for Proxychains4 to relay on. $ pkg install tor proxychains-ng You also need to install …

How to use brut0s DFW – Doxing Tool

Welcome to the tutorial Hello and welcome to this tutorial, in this I will show you how to use brut0s DFW. Now brut0s DFW is a simple doxing framework that makes profiles on people, in this tutorial I will show you how easy it is for someone to use a tool like this to make …

Email Spoofing with sendmail and smtp2go

Welcome to hacking a rise in this post we are going to show you how to spoof a email with sendemail on kali linux using smtp2go for are server and send it to your target so lets talk of a few ways this can be used in 1: Phishing : Yes this method is used …

Design a site like this with WordPress.com
Get started