How To : Make a swap tool for a Playstation 2
This will show you how to make a swap card for your Playstation 2 (PS2) so that you can play custom, backup, or burned game discs. All you need is an old credit hard or a hard piece of plastic.
This will show you how to make a swap card for your Playstation 2 (PS2) so that you can play custom, backup, or burned game discs. All you need is an old credit hard or a hard piece of plastic.
Learn how to swap discs on a tape and tissue modded PS2 so that you can play Guitar Hero 2 custom - or any other custom, burned, or backup game disc.
This video is about how to play AVI files on a Playstation 2 You need a third party tool such as mod chip or swap magic in order to create the exploited memory card. If you don't want to spend money on a mod chip or swap magic, you can send your memory card to places on line ...more
This is a tutorial showing you how to mod a ps2 slim. This will allow you to play backups as well as Guitar Hero 2 customs. If you want to learn how to make your own copy I might put up a video for that. This tutorial also shows the swap trick in action. -I am not responsible ...more
This is how you use the slide card on a fat PS2 to play Guitar Hero Custom Songs. If you want the template for a slide tool, email me at hockey3punk3@live.com and I will send you the pdf file.
This video is for those wondering how to get SNES Station on a slim Playstation 2 without Using Swap Magic.
This video will discuss how to implement color changes in Photoshop editing. This step by step approach will tutor the novice Photoshop user how to utilize the various tools and applications to achieve, colorization in photos, swap select and hue, colors and backgrounds of pho ...more
Want to switch between various open applications via keyboard shortcut? With Mac OS X and the app switcher tool, it's a breeze. It's so easy, in fact, that this home-computing how-to can presenta complete overview of the process in just over two minutes. For more information, ...more
By now, many of you may have heard about iPhone tracking and recording your location data, but is there anything else being extracted from cell phones without our knowledge? If you're a Michigan state resident, the answer is an alarming "maybe". Michigan's police department h ...more
In this how to video, you will learn how to swap faces using Photoshop. First, find two images that you want to swap. Select the lasso tool and trace around the face in the first image. Copy and paste it into the second image. From here, line up the eyes to the face. Next, you ...more
After enabling disk encryption, creating encrypted disk images, installing KeePassX and iTerm2, and using Git with local repositories, the next step to getting your Mac computer ready for hacking is setting up a package manager that can install and update open-source hacking t ...more
One gem that Apple added with iOS 12 is the perfect companion for the dictionary that's already available with the "Look Up" tool. I say gem because it's taken a backseat to all of the other new iOS 12 features, but it shouldn't, because a thesaurus is like the phloem to a dic ...more
One of the most annoying things about the PlayStation 3 is its lack of backward compatibility on some models. There are several hacks out there to do this, but most of them involve extra hardware, like the Cobra-USB Dongle, or downgrading, which can cause all sorts of problems ...more
After finding and monitoring nearby wireless access points and devices connected to them, hackers can use this information to bypass some types of security, like the kind used for Wi-Fi hotspots in coffee shops, hotels, and in flights high above the ground. By swapping their M ...more
A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attac ...more
Social media apps like Instagram, Snapchat, and TikTok have plenty of editing tools that go beyond the basics, but there are still a lot of things they can't do. So if you want to apply interesting, unique effects to your photos and videos for social media, you'll need to add ...more
We're almost there to completing the setup of your Mac for hacking! Now that we have Git and Homebrew under our belts, it's time to take on something fairly easy, but very important for our hacking needs. Ruby is an object-oriented scripting language used to write powerful pr ...more
Google has a few hidden tools you might not have discovered yet, and they work in Google Search, in the Google app, and with Google Assistant — on both iPhone and Android phones. We all know smartphones do much more than make phone calls. They serve as cameras, GPS navigators ...more
SCRABBLE. To some it's just a game, but to me it's life or death. Well, not really, but it feels that way anyway. On a normal weekend, a game becomes much like Jon Thomas' "friendly game of death Scrabble." Video: . When I'm playing a game of SCRABBLE, my friends are not frien ...more
Play a spooky prank that preys on the most basic fear that one day haunted computers will rise up and destroy us all. Step 1: Learn about AutoCorrect Familiarize yourself with Word’s AutoCorrect feature. The program automatically fixes frequently misspelled words. You can eas ...more
How to install SwapMagic 3.6 on fat PS2 (Playstation 2) for backups, swapping or whatever you need.
Learn how to enter code breaker codes on the PCSX2 Playstation 2 emulator for the PC. Entering these codes will allow you to cheat on emulated PS2 games. YOu will need to use a variety of other programs like Daemon tools to do this.
Since the day of the Xbox 360 release, storage space for the device has been overpriced beyond belief. OEM 250GB HDD models still cost $110 USD! A 250GB hard drive should not destroy my wallet, Microsoft. Storage space, especially on HDDs, is cheap. You can buy a removable 2TB ...more
If you have an extra Xbox 360 just sitting around along with an extra hard drive, this video may be of interest to you. It's an easy task when it comes to swapping out different sized hard drives. If you have the right tools and right supplies, it can be a snap. So if you have ...more
If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubu ...more
Finally, summer is just around the corner! And while there are delicious fruits and vegetables available nearly every season, summer yields some of the very best picks. Equip yourself with one or more of the tools below before your next trip to the farmers market. 1. Seasons ...more
Homemade circuits are amazing. You can build any kind of circuit on a simple perfboard, as we have seen in previous projects. However, some projects require very tiny circuit boards. We could special order some boards from a printed circuit board (PCB) factory, but that will m ...more
The days of having to pay for video games are over. Generally, retail games are better because they're made with more effort and care than their free counterparts. But free browser-based game sites are insanely popular, specifically Kongregate, Armor Games, and the grandaddy o ...more
Guitar pedals add character to your playing. However, musicians still say that certain pedals by themselves don’t live up to its promise of a perfect sound. Therefore, instead of replacing your guitar pedals with new and expensive ones, you can modify your pedals using differe ...more
A convincing domain name is critical to the success of any phishing attack. With a single Python script, it's possible to find hundreds of available phishing domains and even identify phishing websites deployed by other hackers for purposes such as stealing user credentials. ...more
With a tiny computer, hackers can see every website you visit, exploit services on the network, and break into your Wi-Fi router's gateway to manipulate sensitive settings. These attacks can be performed from anywhere once the attacker's computer has been connected to the rout ...more
Do you have a file (or many files) that, in the wrong hands, may cause you trouble? Don't worry about it, because I'll show you how to wipe it (or them) from your computer in order to leave no trace behind. When you delete a file with the remove command (rm <file>), you're no ...more
After building a tech empire on revenues from search advertising, Google is not about to sit back and let Snapchat, Facebook, 8th Wall, and others draw all the AR marketing attention to their platforms. This week, at the Cannes Lions International Festival of Creativity (basi ...more
There's a common saying that separates cooks from bakers: baking is a science, while cooking is an art. When baking, one little misstep can alter the texture, taste, and consistency of any recipe. Yet it doesn't have to be a scary science—forget your not-so-happy high school ...more
Welcome everyone to the second part of the How To Become Anonymous online series. Today I will (briefly) introduce you to what has been defined "The most secure OS" : Tails a Debian based OS. (Official website: https://tails.boum.org/) Now I know that there is already a foru ...more
The Raspberry Pi is a credit card-sized computer that can crack Wi-Fi, clone key cards, break into laptops, and even clone an existing Wi-Fi network to trick users into connecting to the Pi instead. It can jam Wi-Fi for blocks, track cell phones, listen in on police scanners, ...more
All those Apple commercials encouraging people to use their iPhones to make their smartphone movies look amazing, but how can you achieve some of the same looks? That's the question many often ask after plunking down over $1,000 for a brand new iPhone, shooting some video, and ...more
The Raspberry Pi loads an operating system from whatever SD card you insert, allowing you to keep different operating systems on separate SD cards depending on which OS you wish to run. A tool called BerryBoot cuts down on the number of SD cards needed by providing the ability ...more
Hello, Null Byte! Mkilic here. I doubt anyone knows I even exist on Null Byte, so hopefully this post will allow me to become more involved in the community and also help me learn even more. This project is somewhat similar to OTW's article here, and pry0cc's here, in which b ...more
It's important to know who you're dealing with after hacking your target's MacBook. Getting remote access is simple, but covertly gathering information about the user and their system can be a challenge. Continuing with our situational awareness attacks, we'll be further orie ...more
Continuing our series on building a dynamic user interface for the HoloLens, this guide will show how to rotate the objects that we already created and moved and scaled in previous lessons. So far, we've built a system that incorporates the user's gaze and what the user is lo ...more
Cross-compilation allows you to develop for one platform (like Kali) and compile to run on a different platform (such as Windows). For developers, it means that they can work on their platform of choice and compile their code for their target platform. For hackers, it means we ...more
In my days as a hardware tech, I often came across motivated do-it-yourselfers who watched a video or two on how to repair a phone and thought that they'd give it a go. More often than not, they failed miserably and damaged their phones (and wallets) even more in the process. ...more
One of the hottest trends in the food world right now is "spiralized" vegetables. I will confess that I am a bit suspicious of any diet or food fad that eliminates an entire food group for anything other than physician-ordered health reasons, but something really good has foll ...more
Bash scripting is a convenient way to automate things on any Linux system, and we're going to use it here to automate certain tasks we use all the time. Bash is a simple language for stringing together several different Linux utilities. Its simplicity makes it easy for beginn ...more
Compromised uTorrent clients can be abused to download a malicious torrent file. The malicious file is designed to embed a persistent backdoor and execute when Windows 10 reboots, granting the attacker remote access to the operating system at will. Torrent clients like uTorre ...more
Arduino is a language that's easy to learn and supported on many incredibly low-cost devices, two of which are the $2 Digispark and a $3 ESP8266-based board. We can program these devices in Arduino to hijack the Wi-Fi data connection of any unlocked macOS computer in seconds, ...more
For anyone interested in using cheap, Wi-Fi-connected microcontrollers like the ESP8266, the Arduino programming language can be a barrier to entry. Based on C++, Arduino requires knowledge of more computer science than languages like Python. Fortunately for beginners, setting ...more
Starting Sept. 13, you can preorder the iPhone 11, 11 Pro, or 11 Pro Max from Apple, wireless carriers, and various e-commerce websites. However, unlike with Android smartphones, there is only one set of iOS phones that come out each year, so they're pretty hot items. That mea ...more
During the Google I/O 2019 keynote, the latest Android Q Beta was released to the public for Pixel smartphones along with 15 other non-Pixel devices. It's the third Developer Preview for Android 10, but it's the first official public beta outside of Google's Pixel smartphones. ...more
While the security behind WEP networks was broken in 2005, modern tools have made cracking them incredibly simple. In densely populated areas, WEP networks can be found in surprising and important places to this day, and they can be cracked in a matter of minutes. We'll show y ...more
While installing the new Android 9.0 Developer Preview is fairly easy if you're using a Windows machine, it's a little trickier if you want to use macOS instead. To help you get the latest Android OS on your Google Pixel phone, we'll break down the whole process so using your ...more
Gboard is one of the best third-party keyboards available for iPhones, but you probably don't know everything you need to know about it to become a real Gboard pro and stop using Apple's stock keyboard for good. I've tried many third-party keyboards on my iPhone since they we ...more
While the USB Rubber Ducky is well known by hackers as a tool for quick in-person keystroke injection attacks, one of the original uses for it was automation. In this guide, I'll be going the latter, explaining how we can use it to automate Wi-Fi handshake harvesting on the Ra ...more
In a world increasingly regulated by computers, bugs are like real-life cheat codes. They give you the power to break the rules and do good or bad without ever leaving your seat. And government agencies around the world are discovering and stockpiling unreported bugs as cyberw ...more
With some of the groundwork out of the way in getting a Mac set up for hacking, it's time to start looking at toolboxes. Our first toolbox is Git, which will be used throughout future tutorials. Git is currently the most widely used version control system (VCS) in the world, ...more
Augmented reality has a variety of applications, but lately the face has been a major point of concentration for many companies. We're all pretty familiar with face swapping by now, but ModiFace employs similar technologies for more practical purposes. Don't Miss: Augmented R ...more
Hello everyone on null byte this is my first tutorial This Tutorial Is on Useful Lesser Known Commands on Linux STAT COMMAND: The stat command displays the status of a file.The information is much more when compared to ls -l. It also includes the absolute path,Number of blo ...more
We all know to should swap out our toothbrushes one every three to four months, but did you know your used Toothbrush still has a number of handy uses once its time in your bathroom is done? You can use an old toothbrush indefinitely to remove silk from corn, exfoliate your li ...more
So now that we know what the iPhone 13 and iPhone 13 Pro and their respective mini and Max versions are all about, you've probably made your decision on whether or not to upgrade (or swap over from Android) during this cycle. If you've been hesitating on pulling the trigger o ...more