Welcome to Hackers Arise!

Uncategorized

Welcome back, my tenderfoot hackers!

Hackers Arise! is my new home and I hope you will make it yours as well. Hackers Arise will be a training camp for all things infosec, including the latest hacking techniques, the best hacking tools, digital forensics, Linux tutorials, scripting and so much more! Of course, we will be continuing our work from Null Byte, including Awards for Excellence, tutorial contests, hacking contests and now, the White Hat Hacker certifications.

I hope you will be patient as I get old and new tutorials posted here and work out the quirks of this new system. One thing you will find different here is that not everyone can post articles. Here, to maintain quality, limit script kiddies and keep out the spammers, you must be included in a special group of contributors before you can post. Of course, anyone can comment, but not everyone will be able to post. Initially, the Null Byte Fellows (DeFalt, Ciuffy, ghost_ and Phoenix750) will all retain the same positions here and will be included automatically into the contributors group. I know many others of you deserve to be included in this group, so please email me at occupytheweb@protonmail.com, if you want to be included in the contributors.

The ultimate goal of Hackers Arise is to prepare you for jobs in the hacking/pentesting/cybersecurity industry. This is among the fastest growing industries in the world right now and I believe that these are the most valuable skill sets of the 21st century. I have begun a “Hackers for Hire” service as a clearinghouse for people seeking the services of members of our community.

I will try to keep things better organized so that you can find the tutorial you are looking for easily. The menu bar at the top of the page contains all the categories and when you hover over it, it will list all the sub-pages or tutorials in that section making it easy to find what you are looking for.

I still have quite a few series that I need to complete and I’ll be working on them here. Eventually, all my older tutorials will be posted here as well. I will also be adding an anti-forensics, reverse engineering malware, android hacking (after all, 82% of mobile devices run Google’s Android) as well as a information security concepts section. I hope to also add teaching videos as well.

I will be expanding beyond some of the free and open source tools and include tutorials on Metasploit Pro, Core Impact, IDA Pro, Splunk, Burp Suite Pro, Cobalt Strike and many others commercial information security products to prepare you for a career in this exciting industry.

Please note that you can now find any tutorial by using the search bar at the top of each page.