Git Search Results

How To: Install Gitrob on Kali Linux to Mine GitHub for Credentials

GitHub is an extremely popular site that allows developers to store source code and interact with other users about their projects. Anyone can download public, open-source files on GitHub manually or with Git, and anyone can fork off someone's project to expand or improve it into its own project. It's a really great site for programmers, developers, and even inspiring hackers.

How To: Play galloping harmonics on the guitar with Jude Gold

A cool technique on the guitar is Galloping Harmonics, combining the galloping rhythmic figure with harmonics and making it a little funky with some slap guitar, originally made famous by Regi Wooten! In this video, Jude Gold, head of GIT (Guitar Institute of Technology) at Musician's Institute completely breaks down the entire process of learning how to get the sound, the feel, and the technique down.

How To: Learn to speak with a Glasgow Scottish accent

In this three-part accent tutorial, learn how to speak with a Glasgowein, or Glasgow, Scottish accent. Gone over are "typical" everyday phrases such as "awrite mate!" and "watty bounce up n git a booze" in part one, while swear words are taught in part three. As the videomaker states: if you feel strongly against vulgar language, this video may not be for you.

How To: Use Pupy, a Linux Remote Access Tool

In one of my previous articles, I discussed ShinoBot, a remote administration tool that makes itself obvious. The goal is to see if the user could detect a remote administration tool or RAT on their system. In this article, I'll be demonstrating the use of Pupy, an actual RAT, on a target Ubuntu 16.04 server.

IRC Guide: Making a Bot

Hello fellow Nullbytiens, I'm Washu, a long time commenter but first time poster. Today we'll be making an IRC bot, if you haven't seen OTW's post about the new IRC channel I would encourage you to go check it out. He does a good job at explaining what IRC is and how to get set up.

How To: Train your ear to play the electric guitar

Check out this instructional electric guitar video that shows you how to train your ear to play the electric guitar. This is Season 3, Episode 38 of Dave Weiner's Riff of the Week series titled "An Intro To Ear Training." Dave Weiner is a Favored Nations recording artist, a G.I.T. graduate, and has been playing in Steve Vai's band since 1999. You want to tune your ear so that you can better communicate in music better. A tuned ear will give you better chord choices, better voicings, better no...

How To: Learn more slap & pop techniques on electric guitar

Check out this instructional electric guitar video that teaches you about the slap and pop technique and puts it into some chordal work. The slap and pop techniques are commonly used with pull-offs and hammer-ons with the fretting (left) hand, to further increase the rate at which notes may be played. This is Season 3, Episode 35 of Dave Weiner's Riff of the Week series called "Slap & Pop Evolved with Chords." Dave Weiner is a Favored Nations recording artist, a G.I.T. graduate, and has been ...

How To: Learn the slap & pop technique on electric guitar

Check out this instructional electric guitar video that teaches you about the slap and pop technique. The slap and pop techniques are commonly used with pull-offs and hammer-ons with the fretting (left) hand, to further increase the rate at which notes may be played. This is Season 3, Episode 34 of Dave Weiner's Riff of the Week series called "Slap & Pop Evolved For Guitar." Dave Weiner is a Favored Nations recording artist, a G.I.T. graduate, and has been playing in Steve Vai's band since 19...

How To: Simplify complex riffs on electric guitar

Check out this instructional electric guitar video that shows you how to simplify complex riffs on the electric guitar. This is Season 3, Episode 26 of Dave Weiner's Riff of the Week series titled "Complex Riffs Made Easy." Dave Weiner is a Favored Nations recording artist, a G.I.T. graduate, and has been playing in Steve Vai's band since 1999. With this lesson and a bit of practice, improve your guitar playing skills by learning to simplify complex riffs and to improvise a little on the elec...

Hack Like a Pro: Snort IDS for the Aspiring Hacker, Part 3 (Sending Intrusion Alerts to MySQL)

Welcome back, my hacker novitiates! If you have been following this new Snort series, you know that Snort is the world's most widely used intrusion detection/protection system. Now a part of the world's largest network equipment company, Cisco, it is likely to be found everywhere in one form or another. This makes a compelling argument for learning how to use it, as it will likely be a necessity in any security-related position.

Raspberry Pi: Metasploit

Before we dive into the world of frustration, I first would like to thank whoever of the admins and mods made the folder for Raspberry Pi in the How-To's, thank you. Now with that outta the way, this article is about Metasploit on Raspberry Pi (hence the title). I should say that I ran into a error, but I think I figured what the problem is. First of all this is not on Kali Linux, but on a regular Linux OS. With that said let's open up a terminal and begin.

How To: Use Kismet to Watch Wi-Fi User Activity Through Walls

Your home has walls for privacy, but Wi-Fi signals passing through them and can be detected up to a mile away with a directional Wi-Fi antenna and a direct line of sight. An amazing amount of information can be learned from this data, including when residents come and go, the manufacturer of all nearby wireless devices, and what on the network is in use at any given time.

Hacking Pranks: How to Flip Photos, Change Images & Inject Messages into Friends' Browsers on Your Wi-Fi Network

Networking is built largely on trust. Most devices do not verify that another device is what it identifies itself to be, so long as it functions as expected. In the case of a man-in-the-middle attack, we can abuse this trust by impersonating a wireless access point, allowing us to intercept and modify network data. This can be dangerous for private data, but also be fun for pranking your friends.

How To: Android CyanogenMod Kernel Building: Monitor Mode on Any Android Device with a Wireless Adapter

Hi, everyone! Recently, I've been working on a pretty interesting and foolish project I had in mind, and here I'm bringing to all of you my findings. This guide's main aim is to document the process of building an Android kernel, specifically a CyanogenMod kernel and ROM, and modifying the kernel configuration to add special features, in this case, wireless adapter Alfa AWUS036H support, one of the most famous among Null Byters.

How To: Load & Use Keystroke Injection Payloads on the USB Rubber Ducky

Keystroke injection attacks are popular because they exploit the trust computers have in human interface devices (HIDs). One of the most popular and easily accessible keystroke injection tools is the USB Rubber Ducky from Hack5, which has a huge range of uses beyond simple HID attacks. The USB Rubber Ducky can be used to attack any unlocked computer in seconds or to automate processes and save time.

How To: Slip a Backdoor into PHP Websites with Weevely

Backdoors are convenient to leave behind once you've already found a way into a server, and they can come in handy for a variety of reasons. They're good for developers who want a quick way into machines they're working on, or for systems administrators who want similar access. Of course, backdoors are also a hacker's best friend, and can be added in a variety of ways. One good tool for doing this is Weevely, which uses a snippet of PHP code.

How to Hack Wi-Fi: Build a Software-Based Wi-Fi Jammer with Airgeddon

Airgeddon is a multi-Bash network auditor capable of Wi-Fi jamming. This capability allows you to target and disconnect devices from a wireless network, all without needing to join it. Airgeddon runs on Kali Linux, and I will show you how to install, configure, and use the jamming functionalities on a small and inexpensive Raspberry Pi. When done correctly, it will deny service to a wireless network for up to several blocks.

Prev Page