Latest articles
Command & Control Series Part II (Operating your own C2 Server)
Introduction. We already know what a C2, or Command and Control server is and, if…
Software Defined Radio (SDR) for Hackers: Radio Frequency Attack Methods
Welcome back, my aspiring radio hackers! With the advent of inexpensive radio devices such as…
Hackers-Arise Announces a New Training Program: Digital Forensics and Incident Response (DFIR)!
Many of our aspiring cyberwarriors have been asking for a separate digital forensics and incident…
SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in…
Ukraine/Russia War: Mobile Phones and Networks Weaponized to Target on Both Sides
Welcome back, my cyberwarriors! In our digital age, we are blessed with many digital wonders.…
What is a White Hat Hacker?
Welcome back, my cyberwarriors! Hackers-Arise is a white-hat hacker training site. This means that we…