Search

Python Basics: Programming Concepts
Welcome back, my aspiring cyberwarriors! To ascend to the status of cyberwarrior, you must have some basic programming capabilities. In...
6 min read
1,728 views

Satellite Hacking, Part 1: Getting Started
Welcome back, my aspiring radio satellite hackers! In this series of tutorials, we will be exploring hacking satellites from a multitude...
2 min read
5,401 views

DDoS Attacks: Flooding Russian Sites with Fragmented UDP Packets
Welcome back, my aspiring cyberwarriors! At the beginning of the cyberwar between Russia and Ukraine, Hackers-Arise, the IT Army of...
4 min read
15,601 views

Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
2 min read
4,001 views

50% off Subscriber and Subscriber Pro for those in non-industrialized Nations!
We recognize that incomes vary dramatically from one nation to the next and we don't want to exclude anyone from the best cybersecurity...
1 min read
2,619 views


Radio Basics for Hackers, Part 3: Sampling
Welcome back my aspiring cyber warriors! Sampling is the process of converting a continuous signal into a discrete signal. In the context...
2 min read
1,736 views

SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in numerous ways. For a review...
3 min read
4,128 views

Remaining Anonymous: Getting Started with Tails
This article is from our Ukraine intern _aircorridor. He lays out how to install one of the most secure Linux OSés, Tails. Getting...
2 min read
3,623 views


Hackers-Arise Featured in Norway Public Television Documentary on the Cyberwar in Ukraine
The war in Ukraine began February 24, 2022 when Putin marched his troops from Belorussia to invade Ukraine and attempt to capture the...
2 min read
2,570 views

Password Cracking: Creating Custom Password List with cupp
Welcome back, my aspiring cyberwarriors! If the hacker can obtain or crack the target's password, in many cases, this can lead to...
3 min read
7,001 views

We Have Successfully Accessed Many IP Cameras in Ukrainian Territory to Spy on Russian Activities
Welcome back, my cyberwarriors! At the request of the IT Army of Ukraine, we were asked to help the war efforts by hacking a large...
1 min read
39,917 views

Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
3 min read
40,086 views


Radio Basics for Hackers, Part 1: Electromagnetic Radiation, Frequency and Wavelength
Welcome back, my aspiring cyberwarriors! As you already know, radio hacking is the leading edge of cybersecurity! So many things in our...
6 min read
10,637 views


Open Source Intelligence (OSINT): This Person Doesn't Exist (Deep Fakes and AI)
Welcome back, my aspiring OSINT investigators! In OSINT investigations, we often run across a face that does not appear anywhere else on...
3 min read
11,612 views

Bug Bounty Hunting, Part 2: Stealthy Parameter Detection with ParamSpider
Welcome back, my aspiring cyberwarriors! When attempting to hack/pentest a website, it can be extremely useful to get the parameters of...
3 min read
4,763 views


Confessions of a Professional Hacker: Can the CIA or other Intelligence Agencies Track My Every Move
Welcome back my aspiring cyberwarrior and others interested in cybersecurity! When people find out I am a professional hacker, one of the...
3 min read
11,783 views

Wi-Fi Hacking: Creating a Wi-Fi Scanner with Python and Scapy
Welcome back, my aspiring cyber warriors! Although there are numerous tools to hack Wi-Fi (802.11), to create your own tools you will...
4 min read
50,965 views


Software Defined Radio for Hacker: How to Spoof your Global Position (GPS) to Hide Your Location
Welcome back, my aspiring cyberwarrior! As you already know, it is possible to spoof both your IP address and MAC address, but can you...
3 min read
24,215 views

Networking Basics for Hackers, Part 1
With our dramatic growth over the last year, we have added many new aspiring hackers who are still lacking in the basics of network and...
5 min read
16,500 views


Open Source Intelligence (OSINT): OSINT Tools for Bitcoin Investigations
Welcome back, my aspiring OSINT investigators! One of the most lucrative areas for OSINT investigators is the Bitcoin and cryptocurrency...
3 min read
13,152 views