Search

Getting Started with PGP for email
Welcome back, my aspiring cyberwarriors! Pretty Good Privacy or PGP has been around for over 30 years and has proven that it is pretty...
4 min read
4,552 views

Database Hacking: Common SQL Injection Commands
Welcome back, my aspiring cyberwarriors! According to the Open Web Application Security Project (OWASP), command injection is perennially...
2 min read
4,003 views

50% off Subscriber and Subscriber Pro for those in non-industrialized Nations!
We recognize that incomes vary dramatically from one nation to the next and we don't want to exclude anyone from the best cybersecurity...
1 min read
2,619 views


Radio Basics for Hackers, Part 3: Sampling
Welcome back my aspiring cyber warriors! Sampling is the process of converting a continuous signal into a discrete signal. In the context...
2 min read
1,737 views

SCADA Hacking: Sending Random Inputs into the Russian Industrial Systems
Welcome back, my aspiring cyberwarriors! SCADA hacking and security is different from traditional hacking in numerous ways. For a review...
3 min read
4,141 views


SCADA Hacking: The Most Important SCADA/ICS Attacks in History
Welcome back, my aspiring SCADA/ICS cyberwarriors! SCADA and ICS are the most important cybersecurity issues in this decade. Although...
5 min read
15,019 views


Python Basics for Hackers, Part 5: Creating a Web Site Scraper to Find Potential Passwords
Welcome back, my aspiring cyberwarriors! Creating password lists is a key element of a successful password cracking strategy. In nearly...
4 min read
6,979 views

Password Cracking: Creating Custom Password List with cupp
Welcome back, my aspiring cyberwarriors! If the hacker can obtain or crack the target's password, in many cases, this can lead to...
3 min read
7,003 views


What is a CyberWarrior? The Hackers-Arise Cyberwarrior Philosophy
If you are reading this, you are very likely interested in the field of cybersecurity. You may also be considering studying...
2 min read
5,370 views


Radio Basics for Hackers, Part 2: Amplitude, Modulation, decibels and gain
Welcome back, my aspiring radio hackers! As you know, radio hacking is the leading-edge of cybersecurity! Nearly everything digital...
6 min read
2,085 views

We Have Successfully Accessed Many IP Cameras in Ukrainian Territory to Spy on Russian Activities
Welcome back, my cyberwarriors! At the request of the IT Army of Ukraine, we were asked to help the war efforts by hacking a large...
1 min read
39,928 views

Software Defined Radio (SDR) for Hackers: Choosing the Best Hardware for SDR
Welcome back, my aspiring RF hackers! Before embarking upon the study of SDR for Hackers it is good idea to take a close look at the...
3 min read
40,142 views


Radio Basics for Hackers, Part 1: Electromagnetic Radiation, Frequency and Wavelength
Welcome back, my aspiring cyberwarriors! As you already know, radio hacking is the leading edge of cybersecurity! So many things in our...
6 min read
10,650 views

Software Defined Radio for Hackers, Part 5: How to Track Aircraft with SDR
Welcome back, my aspiring radio hackers! Nearly every vehicle in the world gives off/sends out a radio signal of one type or another....
3 min read
10,578 views

Privilege Escalation: The Dirty Pipe Exploit to Escalate Privileges on Linux Systems
Welcome back, my aspiring cyberwarriors! Often, after successfully compromising a system, we are limited to the privilege's of the...
3 min read
5,690 views

Bug Bounty Hunting, Part 2: Stealthy Parameter Detection with ParamSpider
Welcome back, my aspiring cyberwarriors! When attempting to hack/pentest a website, it can be extremely useful to get the parameters of...
3 min read
4,763 views

OSINT: Finding Email Passwords in Dumps with h8mail
Welcome back, my aspiring OSINT Investigators! Often as OSINT investigators, pentesters and hackers, we need to determine if a email...
3 min read
55,995 views

Wi-Fi Hacking: Creating a Wi-Fi Scanner with Python and Scapy
Welcome back, my aspiring cyber warriors! Although there are numerous tools to hack Wi-Fi (802.11), to create your own tools you will...
4 min read
50,971 views


Bluetooth Hacking, Part 1: Getting Started with Bluetooth
Welcome back, my aspiring cyberwarriors! Today, Bluetooth is built into nearly all our devices and gadgets. These include our ...
4 min read
76,576 views


Software Defined Radio for Hacker: How to Spoof your Global Position (GPS) to Hide Your Location
Welcome back, my aspiring cyberwarrior! As you already know, it is possible to spoof both your IP address and MAC address, but can you...
3 min read
24,228 views