Linux Basics for Hackers: The Linux Logging System
Hackers-Arise operates 2 parallel websites
Hackers-Arise.com & Hackers-Arise.net
Linux Firewalls: The Modern NFTable Firewall
Command & Control Series Part I (Installing your own C2 Server on Kali Linux)
Getting Started with Docker, Part 1: Installing Kali Linux in a docker Container
Introduction to the IoT/Embedded Linux: The OpenWRT Project
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Linux Basics for Hackers, Part 14: Using the curl command to Download Web Site Source Code
Linux Firewalls: Creating an Application Layer IDS/IPS with fwsnort
Linux Basics for Hackers, Part 13: Running Kali Linux in Windows (WSL)
Linux Basics for Hackers, Part 12: The Linux Philosophy
Linux Firewalls: Uncomplicated Firewall (ufw)
Linux Basics for the Aspiring Hacker, Part 3 (Creating, Removing and Renaming Files and Directories)
Linux Firewalls Training, November 2-4
Linux Basics for Hackers, Part 11: Linux Firewalls (iptables)
Netcat- the All-Powerful Linux Utility
Linux Basics for Hackers, Part 10: Loadable Kernel Modules (LKM)
Getting Started with Kali Linux 2020
Metasploit Basics for Hackers, Part 25: Web Delivery with Linux/UNIX/OsX
Linux Basics for Aspiring Hackers, Part 1
Why Every Hacker Must Know and Use Linux