top of page
8 min read
Metasploit Basics for Hackers, Part 1: Getting Started with Metasploit
Welcome back, my aspiring cyber warriors! In this series, I will introduce you to the world's most popular hacking/pentesting platform,...
68,744 views
3 min read
Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
Welcome back, my aspiring cyberwarriors! Oftentimes, as cyberwarriors, we need to check to see whether our systems or others' are...
14,374 views
6 min read
Digital Forensics, Part 8: Live Analysis with sysinternals
Welcome back, my aspiring forensic investigators! In this tutorial, we will use another tool that can be used in for live system...
16,970 views
6 min read
The Brief History of Russian Cyberattacks Against Ukraine and the Risks they Pose to the West
Welcome back, my cyber warriors! As the war in Ukraine rages on, it's important to keep in mind that this war didn't begin in February of...
4,580 views
1 min read
Master OTW on Youtube
Here you will find all the videos with Master OTW which accumulate millions of views, hours of content and knowledge that you can access...
28,687 views
1 min read
Google Hacking: The Ultimate List of Google Dorks to find Unsecured Web Cams
Welcome back, my aspiring hackers! As you know, we at Hackers-Arise have been deeply involved in the cyberwar to save Ukraine from the...
48,728 views
5 min read
Networking Basics for Hackers, Part 2
In the first part of this series, I introduced you to the basics of networking including IP addresses, ports, NAT, and DHCP. In this...
5,639 views
5 min read
Introduction to Regular Expressions (regex)
Welcome back, my aspiring cyber warriors! This next subject might seem a bit obscure to the uninitiated--but I promise-- this lesson will...
3,647 views
4 min read
Basics of Hexadecimal
It has become clear from some of your questions that quite a few of you are unfamiliar with the hexadecimal system, or simply, hex. The...
3,080 views
4 min read
The Hacker Methodology
Many newbie hackers seem to be confused regarding the process or methodology to employ a successful hack. Most want to simply go straight...
7,189 views
bottom of page