top of page
5 min read
Networking Basics for Hackers, Part 1
With our dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of network and...
15,062 views
5 min read
Networking Basics for Hackers, Part 2
In the first part of this series, I introduced you to the basics of networking including IP addresses, ports, NAT, and DHCP. In this...
5,554 views
5 min read
Introduction to Regular Expressions (regex)
Welcome back, my aspiring cyber warriors! This next subject might seem a bit obscure to the uninitiated--but I promise-- this lesson will...
3,616 views
4 min read
Basics of Hexadecimal
It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The...
3,061 views
4 min read
The Hacker Methodology
Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight...
7,156 views
4 min read
Netcat, the All- Powerful
Netcat, the All- Powerful Netcat is one of those few tools--like nmap, Metasploit, Wireshark and few others-- that every hacker should...
15,279 views
4 min read
Basics of XORing
In a recent tutorial, I showed you how to use shikata_ga_nai to change the signature of a payload to evade detection by security devices...
4,114 views
4 min read
Windows Remote CMD Commands for Hacking
Many new hackers come from a Windows background, but seldom--if ever--use its built-in command-line tools. As a hacker, you will often be...
10,393 views
bottom of page