Ransomware: Build Your Own Ransomware, Part 1
Use Code jjt8vpmput1d for 35% off during our Cyberweek !
SCADA Hacking: Snake, a New Variant of Ransomware Targets SCADA/ICS
Satellite Hacking, Part 1: Getting Started
DDoS Attacks: Flooding Russian Sites with Fragmented UDP Packets
Database Hacking: Common SQL Injection Commands
Radio Basics for Hackers, Part 3: Sampling
SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Remaining Anonymous: Getting Started with Tails
Python Basics for Hackers, Part 5: Creating a Web Site Scraper to Find Potential Passwords
Password Cracking: Creating Custom Password List with cupp
Why YOU Should Study Software Defined Radio (SDR) for Hackers!
What is a CyberWarrior? The Hackers-Arise Cyberwarrior Philosophy
Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
We Have Successfully Accessed Many IP Cameras in Ukrainian Territory to Spy on Russian Activities
Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Radio Basics for Hackers, Part 1: Electromagnetic Radiation, Frequency and Wavelength
Software Defined Radio for Hackers, Part 5: How to Track Aircraft with SDR
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
OSINT: Finding Email Passwords in Dumps with h8mail
Wi-Fi Hacking: Creating a Wi-Fi Scanner with Python and Scapy