Active Posts

How To: Embed a Metasploit Payload in an Original .Apk File

UPDATE: This post is outdated, the latest version with the correct links and updated instructions can be found UPDATE: This post is outdated, the latest version with the correct links and updated instructions can be found at my blog, here - at my blog, here -

How To: Cover Your Tracks After Hacking a Wifi

Greetings null-bytians. Say you have been able to penetrate your neighbour's AP, and of course you had spoofed your MAC address. Now you go on and test to see with excitement if the password really works and the MAC is still spoofed. You login successfully and you browse the web forgetting to check what your current MAC is. Well, if you may do an ifconfig command, you will see that your permanent MAC is being used. Oh!! and guess what, ... your real MAC has been logged. Even though there is t...

How To: Noob's Introductory Guide to Hacking: Where to Get Started?

There is a vast amount of knowledge out there on computers! In fact, it is so vast that no single person could ever possibly ever learn everything there is to learn about hacking or computers in general. People usually specialize in a certain field: cryptography, computer security, networking, software development, testing, and so on...It's probably a bit premature to decide what you want your speciality to be, but keeping the question in the back of your mind will help give you direction in ...

How To: Make a non-toxic clay pipe for smoking marijuana

We are taught how to make a non-toxic pipe using baking clay and an eyelet and socket. First you form a bowl out of the clay with your hands. When thats done you poke a hole on the top to form the bowl, then a hole on the side towards the bottom to create the shaft for the pipe. Freeze it. While that's being froze the shaft of the pipe can be made. Rolling the clay the longer piece is formed. The inside is hallowed out. Blow through it to make sure its usable. Attach the long piece to the bow...

How to Use PowerShell Empire: Getting Started with Post-Exploitation of Windows Hosts

PowerShell Empire is a post-exploitation framework for computers and servers running Microsoft Windows, Windows Server operating systems, or both. In these tutorials, we will be exploring everything from how to install Powershell Empire to how to snoop around a victim's computer without the antivirus software knowing about it. If we are lucky, we might even be able to obtain domain administrator credentials and own the whole network.

How To: 21 Miraculous Uses for Coconut Oil

What can't coconut oil do? This edible oil, extracted from the copra or meat of a coconut, has done what most other food, beauty, and health trends have not: demonstrated real lasting power. Indeed, the "superfood" continues to make headlines, with its many uses the subject of debate, study, and fervent support. From the obvious (cooking) to the less so (home improvement), there are likely many coconut oil uses you're not yet aware of.

TWRP 101: How to Install the Best Custom Recovery for Android

When it comes to modding Android, root gets all the glory, but a good custom recovery is really the only thing you need. Not only does it allow you to back up your entire phone, install flashable ZIPs, and load custom ROMs like LineageOS, but a custom recovery will even let you root your device. For years now, the only custom recovery worth mentioning has been Team Win's TWRP.

How To: Scrape Target Email Addresses with TheHarvester

Open-source data scraping is an essential reconnaissance tool for government agencies and hackers alike, with big data turning our digital fingerprints into giant neon signs. The problem is no longer whether the right data exists, it's filtering it down to the exact answer you want. TheHarvester is a Python email scraper which does just that by searching open-source data for target email addresses.

Cydia 101: How to Respring Your iPhone Without Losing Jailbreak Each Time

When you have minor software issues like an app crashing, restarting your iPhone would usually fix it. But Apple doesn't provide an official "Restart" or "Reboot" option (unless you count this bold text hack), so we typically have to power our devices off and on in these scenarios. Thankfully, there's a great Cydia tweak that lets you "respring" your device, which is even faster than restarting.

How To: Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) toolkit. Unlike standard administration RATs, these tools are designed to be delivered stealthily and operate undetected.

Mac for Hackers: How to Get Your Mac Ready for Hacking

When it comes to hacking guides, most are written from the perspective of a Linux user. There are a few outliers, but it's mainly Linux, which leads to the idea that Linux is the only OS that's viable for hacking. This couldn't be further from the truth. A properly set up Apple machine can do quite a bit of heavy lifting.

How To: Play "Use Somebody" by Kings of Leon on the guitar

Want to play "Use Somebody" by Kings of Leon? See how it's done with this free video guitar lesson, which presents a complete breakdown of the song and it chords. While this tutorial is geared toward those who already have some knowledge of the guitar, players of all skill level should be able to follow along given adequate time and effort. For more information, and to get started playing "Use Somebody" on your own acoustic guitar, take a look!

How To: Use Kuler color themes in Adobe Photoshop CS4

Adobe Photoshop CS4 is the industry-standard software for perfecting digital images and is ideal for professional photographers, serious amateur photographers, and graphic designers. In this Photoshop tutorial, you'll learn how to use Kuler themes in your Adobe Photoshop CS4 projects. Use Kuler color themes in Adobe Photoshop CS4.

Apple AR: ARKit & Machine Learning Come Together Making Smarter Augmented Reality

The world is a massive place, especially when you consider the field of view of your smartglasses or mobile device. To fulfill the potential promise of augmented reality, we must find a way to fill that view with useful and contextual information. Of course, the job of creating contextual, valuable information, to fill the massive space that is the planet earth, is a daunting task to take on. Machine learning seems to be one solution many are moving toward.

How to Hack Wi-Fi: Build a Software-Based Wi-Fi Jammer with Airgeddon

Airgeddon is a multi-Bash network auditor capable of Wi-Fi jamming. This capability allows you to target and disconnect devices from a wireless network, all without needing to join it. Airgeddon runs on Kali Linux, and I will show you how to install, configure, and use the jamming functionalities on a small and inexpensive Raspberry Pi. When done correctly, it will deny service to a wireless network for up to several blocks.

Prev Page