Hacking the Cloud: Privilege Escalation in AWS
Satellite Hacking, Part 1: Getting Started
Radio Basics for Hackers, Part 3: Sampling
SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Hackers-Arise Featured in Norway Public Television Documentary on the Cyberwar in Ukraine
Password Cracking: Creating Custom Password List with cupp
Why YOU Should Study Software Defined Radio (SDR) for Hackers!
Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
We Have Successfully Accessed Many IP Cameras in Ukrainian Territory to Spy on Russian Activities
Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Radio Basics for Hackers, Part 1: Electromagnetic Radiation, Frequency and Wavelength
Software Defined Radio for Hackers, Part 5: How to Track Aircraft with SDR
Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Bug Bounty Hunting, Part 2: Stealthy Parameter Detection with ParamSpider
Wi-Fi Hacking: Creating a Wi-Fi Scanner with Python and Scapy
Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Software Defined Radio for Hacker: How to Spoof your Global Position (GPS) to Hide Your Location
Networking Basics for Hackers, Part 1
Open Source Intelligence (OSINT): Finding Vulnerable Systems Across the Internet with Netlas.io
Digital Forensics, Part 8: Live Analysis with sysinternals