Search


Linux Basics for Hackers: Building a Router with nftables
Welcome back, aspiring cyberwarriors! As you know, traditional hardware routers can be expensive, inflexible, and often come with...
5 min read
57 views


Mobile Hacking: How the Mexican Drug Cartels Built their Own Cellular Infrastructure to Avoid Surveillance
Welcome back, my aspiring cyberwarriors! Mobile hacking can take many forms. Most novices focus on the handset, but in reality, there are...
6 min read
9,752 views


Kubernetes Hacking: Attacking Kubernetes Clusters Using The Kubelet API
Welcome back, aspiring cyberwarriors! In this article, we will explore how to search for and exploit vulnerabilities in the Kubernetes...
3 min read
97 views


Ukraine/Russia CyberWar! Targeting Russian Websites with SQL Injection
Welcome back, aspiring cyberwarriors! Overwatch here again from an undisclosed place in Ukraine. Today we’re diving into SQLMap, one of...
4 min read
251 views


VPN Hacking: VPN Vulnerabilities You Should Know About in 2025
Welcome back, aspiring cyberwarriors! VPNs are meant to be a tool for protection — but the reality paints a very different picture. ...
4 min read
1,046 views


Hackers-Arise Offers the Best Cybersecurity Training on the Planet! Listen to What our Students are Saying!
Hackers-Arise Offers the Best Cybersecurity Training on the Planet! We attract the best students from around the world and make them the...
1 min read
2,498 views


Linux Basics for Hackers: gcc, Mastering the Compiler That Powers Linux Development
Welcome back, aspiring cyberwarriors! In our world of Linux, we often need to transform our human-readable source code into...
5 min read
105 views


SDR (Signals Intelligence) for Hackers: Building a Low- Cost, Private 4G LTE Network
Welcome back, my aspiring cyberwarriors! New technological developments in recent years has made it possible to build a private cellular...
7 min read
908 views


Linux Basics for Hackers, the Make Command: Compiling and Installing Software from Source in Linux
Welcome back, aspiring Linux enthusiasts! In our journey through the Linux ecosystem, we often encounter situations where the software we...
4 min read
185 views


Python Basics for Hackers, Part 6: Decoding an Encrypted Message with Frequency Analysis (Cryptanalysis)
Welcome back, my aspiring cyberwarriors! Cryptography is a fundamental skill of cybersecurity. It enables so many of the protocols and...
5 min read
348 views


Why YOU Should Study Software Defined Radio (Signals Intelligence) for Hackers!
Hacking radio signals (RF) IS the leading edge of cybersecurity ! So many applications in our modern life use radio frequency elements...
2 min read
15,897 views


Command & Control Series Part I (Installing your own C2 Server on Kali Linux)
This series of posts is designed to guide you through setting up your own Command and Control (C2) server, specifically using the Havoc...
4 min read
17,951 views


The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
5 min read
4,455 views


CyberWar: The Breach at Avtodor – Inside a Russian Government Infrastructure Network, Part 1
Welcome back, my aspiring cyberwarriors! The conflict between Russia and Ukraine should be a warning bell to all of you of the importance...
5 min read
274 views


NymVPN Setup & Testing: A Hands-On Walkthrough
Welcome back, aspiring cyberwarriors! In recent years, VPN's have been marketed as a sure-fire way to keep your safe from...
3 min read
228 views


Database Hacking: SQLite Essentials and Attack Strategies
Welcome back, aspiring cyberwarriors! SQLite is one of the most commonly used database engines, embedded in countless applications,...
5 min read
179 views


Socat: The Advanced Hacker's Network Tool
Welcome back, my aspiring cyberwarriors! In the world of cybersecurity, certain tools become legendary not because they're flashy, but...
3 min read
337 views


SCADA/ICS Hacking and Security: Chinese APT, Volt Typhoon, Has Compromised Numerous Industrial Systems in the US!
Welcome back, aspiring cyberwarriors! In a cyberwar, SCADA and ICS industrial systems can be both a target and a weapon! Although the...
7 min read
306 views


NymVPN. Is This the World's Most Secure VPN?
Welcome back, my aspiring cyberwarriors! The landscape of digital privacy continues to evolve as surveillance capabilities expand...
4 min read
1,008 views


Open-Source Intelligence or OSINT: You Can’t Hide on Telegram!
Welcome back, aspiring cyberwarriors! A lot of people believe that the widely-used social media site, Telegram, offers them anonymity to...
10 min read
5,109 views