Search


Linux Basics for Hackers: Building a Router with nftables
Welcome back, aspiring cyberwarriors! As you know, traditional hardware routers can be expensive, inflexible, and often come with...
5 min read
55 views


VPN Hacking: VPN Vulnerabilities You Should Know About in 2025
Welcome back, aspiring cyberwarriors! VPNs are meant to be a tool for protection — but the reality paints a very different picture. ...
4 min read
1,046 views


Hackers-Arise Offers the Best Cybersecurity Training on the Planet! Listen to What our Students are Saying!
Hackers-Arise Offers the Best Cybersecurity Training on the Planet! We attract the best students from around the world and make them the...
1 min read
2,498 views


Python Basics for Hackers, Part 6: Decoding an Encrypted Message with Frequency Analysis (Cryptanalysis)
Welcome back, my aspiring cyberwarriors! Cryptography is a fundamental skill of cybersecurity. It enables so many of the protocols and...
5 min read
348 views


Why YOU Should Study Software Defined Radio (Signals Intelligence) for Hackers!
Hacking radio signals (RF) IS the leading edge of cybersecurity ! So many applications in our modern life use radio frequency elements...
2 min read
15,897 views


Command & Control Series Part I (Installing your own C2 Server on Kali Linux)
This series of posts is designed to guide you through setting up your own Command and Control (C2) server, specifically using the Havoc...
4 min read
17,950 views


The CyberWarrior Handbook, Part 1
Welcome back, my cyberwarriors! In this series, we will detail how an individual or small group of cyberwarriors can impact global...
5 min read
4,455 views


Hackers-Arise Now Offers Key Cybersecurity Services!
All of you know about the excellent cybersecurity training Hackers-Arise offers but now we are expanding to offer your business the...
1 min read
92 views


Database Hacking: SQLite Essentials and Attack Strategies
Welcome back, aspiring cyberwarriors! SQLite is one of the most commonly used database engines, embedded in countless applications,...
5 min read
179 views


Socat: The Advanced Hacker's Network Tool
Welcome back, my aspiring cyberwarriors! In the world of cybersecurity, certain tools become legendary not because they're flashy, but...
3 min read
336 views


NymVPN. Is This the World's Most Secure VPN?
Welcome back, my aspiring cyberwarriors! The landscape of digital privacy continues to evolve as surveillance capabilities expand...
4 min read
1,008 views


Open-Source Intelligence or OSINT: You Can’t Hide on Telegram!
Welcome back, aspiring cyberwarriors! A lot of people believe that the widely-used social media site, Telegram, offers them anonymity to...
10 min read
5,109 views


SDR (Signals Intelligence) for Hackers: Soon, all Cellphones will be Connected by Satellites
Welcome back, my aspiring cyberwarriors! In earlier posts here, we have described hacking satellite communication systems. While many...
6 min read
589 views


Cyber Threat Intelligence (CTI) and Network Defenses: Getting Started with CrowdSec
Welcome back, aspiring cyberwarriors! In the ever-evolving landscape of cybersecurity, new tools and approaches are constantly emerging...
5 min read
520 views


The Medusa Ransomware Threat: Anatomy of a Cybercrime Operation
Welcome back, aspiring cyberwarriors! In Greek mythology, Medusa was once a beautiful woman until Athena’s curse transformed her into a...
8 min read
1,028 views


Open-Source Intelligence(OSINT): Sherlock - The Ultimate Username Enumeration Tool
Welcome back, aspiring OSINT investigators! Social media platforms hold a wealth of personal and professional information, making them...
2 min read
4,125 views


Vulnerability Scanning: Automatic Search For Known CVEs With CVEScannerV2
Welcome back, aspiring cyberwarriors! During reconnaissance, our goal is to identify vulnerable services within our target’s network. To...
3 min read
1,342 views


Vagrant: Building Secure Testing Environments
Welcome back, aspiring cyberwarriors! Creating and managing virtual machines has traditionally been a tedious and time-consuming process....
5 min read
539 views


Open Source Intelligence (OSINT): Mosint, The Versatile Email Address Search Tool
Welcome back, aspiring cyberwarriors and OSINT investigators! In our digital age, email addresses have become the keys to our online...
3 min read
2,240 views


VPN Hacking: How VPN's Work and How They Break Our Security
Welcome back, my aspiring cyberwarriors! In recent posts, I have emphasized the risks inherent in VPN's. Virtual Private Networks or...
34 min read
1,747 views