Dispatch your enemies with a single sword strike. This cheater's guide will show you how to smite even the toughest of opponents with a single hit (and a few keystrokes in Cheat Engine 5.5). Hack Ninja Saga. The flash-based game Ninja Saga is role-playing game involving… you ...more
This is a guide showing you how to get Java games onto your Samsung Tocco F480 phone via USB—for free! You don't need Samsung PC Studio, but you do need a few things... Download Required Applications and Drivers... Download and install these applications. I have included li ...more
Lifehacker posts an article on the art of cracking weak passwords, courtesy of Internet standards expert, CEO of web company iFusion Labs, and blogger John Pozadzides. Pozadzides certainly knows a thing or two about password logic. (Note: this information is not intended to ha ...more
When you first become interested in learning how to program, it can be difficult to find a place to start. A lot of questions come up, especially if you're new to the idea of programming entirely. After you pick which language you want to learn, you have to worry about how you ...more
WonderHowTo is made up of niche communities called Worlds. If you've yet to join one (or create your own), get a taste below of what's going on in the community. Check in every Wednesday for a roundup of new activities and projects. First off, thanks to all of our moderators ...more
Watch this video to learn how to use a hack to make your iPad capable of making and receiving phone calls. With a jailbroken iPad you can have the biggest iPhone on the planet. Check out this guide to some really cool Cydia apps.
In this clip, you'll learn how to use an Apple iPad as a wireless monitor for a still camera. In order to replicate this hack yourself, you'll need an iPad, Eye-Fi Pro X2 SD card, My Wi and Shutter Snitch. For detailed, step-by-step instructions, and to get started sending pic ...more
Want to find every instance of a person's name on a particular website? This Googler's guide from the folks at Mahalo will teach you how to do just that. For all of the relevant details, and to get started using this handy Google hack yourself, watch this video tutorial.
In this Googler's guide from the folks at Mahalo, we learn how to limit search results to a particular national domain like .co.uk or .ru. For all of the relevant details, and to get started using this handy Google hack yourself, watch this video tutorial.
In this clip, you'll learn a simple registry hack to speed up the Microsoft Windows Start Menu. With a little bit of know-how, it's easy. So easy, in fact, that this video guide can offer a complete overview of the process in a matter of a few minutes. For more information, in ...more
Grab your thinking caps and get your hack on. Null Byte is officially seeking contributors on a weekly basis who are willing to take the time to educate the Null Byte community on anything, from hardware hacks to life hacks. Contributors that write tutorials will be featured o ...more
Life-giving internal organs! Usually, they're a convenience. Not so when making a convincing see-through Portal costume, however. Happily, Ben Heck has a devised an LCD-based hack that will permit you to tunnel through your belly without discomfort. Interested in vanishing you ...more
Dancing salsa is like making love on a wood floor. Interested? If so,then check out this easy to follow dance video which will guide you step by step through how to dance salsa. From sashaying your hips sexily to the correct basic forward and backward step, this video covers ...more
This video is of a minor showing how to drive a stick-shift with his wrecked '97 Nissan Maxima. He provides a step-by-step guide of how to hold the clutch to start the car, followed by a description of the different "speeds" (amount of gears), and how to shift up and down amon ...more
This video will give you a very descriptive step-by-step guide to styling an over-handed French braid. The braid will appear neatly over the top of the rest of the hair. Beginners will definitely benefit from this video because it gives a very well paced introduction to the F ...more
Are you a ... Windows Developer? Interested in ... testing the vulnerabilities inherent in your own operating system? If so, you're in luck. This video tutorial demonstrates a simple hack that will allow you to remove the Windows Genuine Advantage Validation software. For step ...more
Do I need a sound card for the Vestax VCI-100? What sound card is the best for beginners? There are a lot of unanswered questions about sound cards. So here is a short instructional guide that answers most of your beginning questions about DJing with sound cards, a laptop and/ ...more
No doubt you've seen some of the hack logs being released. One part that stands out over and over again is the heavy database usage. It used to be early on that virus and hackers would destroy data, usually just for lulz. However, with the explosive commercial growth of the In ...more
Learn how to use Cheat Engine to hack Cube Field for a million points! It's easy. So easy, in fact, that this clip can present a complete overview of the process in just over a minute. For more information, including step-by-step instructions, and to get started using this hac ...more
Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more
After you've updated Windows 7. Internet Explorer 9 is automatically installed. This is just a two step process of knowing it's been upgraded, and is ready to run and get you on the web. Step 1: Open IE (Internet Explorer) Once you launch IE you will be prompted with a dial ...more
So Christmas is coming up, and you want to make a couple of presents for your friends and family, who you don't really feel like splurging on- but want to make something from the heart. You've tried other stuff, and you totally failed at the Cross-stitch from last year, have y ...more
OR rather How to make the Backdoor Persistent: Hello, my Cold and Merciless Hackers, Welcome to my 5th Post, In this tutorial I am going to show you how to make the backdoor we created in my guide here a persistent one. I finally found out a way to do this, as I was/am very ...more
We are in a pretty major technology boom at the moment. One that will likely make the industrial revolution look tiny. And one of these technologies that are building up to lead the way is something called augmented reality. There is a chance you've heard the phrase thrown ar ...more
While its competitors are concentrating on building out AR cloud platforms to give advanced AR capabilities to mobile apps, Ubiquity6 is taking a step in a different direction. On Monday, the company opened its Display.land tool to the general public, following its "early acc ...more
Staples may be an office staple when it comes to joining sheets of paper together, but they're a pain in the ass if you ask me. They're annoying to take out, you can't shred 'em, and they eventually loosen up. Plus, staplers tend to stop working right when you need them the mo ...more
Welcome back, my greenhorn hackers! Although we have focused primarily on technical hacks here, social engineering can sometimes be especially effective. This one requires a bit of technical skill, but not too much. In addition, it's limited by how specific a target you can c ...more
The screenshot tool on your iPhone can come in handy in various ways, but it may be even more helpful than you realize. So if you thought you knew everything there was to know about your iPhone's screenshot tool, it's time to put your knowledge to the test. Many of these hidd ...more
With a 13 megapixel camera that can record in full 4K, there's a lot to love about the Samsung Galaxy Note 3 from a photographer's perspective. The image quality in my photos and videos are top-notch and nothing to complain about, but as with all things tech, things could alwa ...more
The book that started it all (published in 1967). When Virginia Harvey wrote this book, she remarked that macramé was almost a lost art... Video: . Today, thanks to Mrs. Harvey, there are few people who have never heard of macramé. Although many books on macramé have been publ ...more
Welcome back, my rookie hackers! So many readers come to Null Byte to learn how to hack Wi-Fi networks (this is the most popular hacking area on Null Byte) that I thought I should write a "how-to" on selecting a good Wi-Fi hacking strategy. Many beginners come here looking t ...more
There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture hands ...more
Since I first announced the new Null Byte recognition for excellence a few weeks ago, several of you have written me asking, "How can I study for this certification exam, and what material will be covered on the exam?" Now I have an answer for you. The White Hat Hacker Associa ...more
Watched a great guide on hacking things through time by the most powerful hacker on the planet, Hackerman. I thought you guys would like to see this. It's pretty cool; I'd like to try it out but I don't have enough RAM yet so I'll have to do some digging around to get my hand ...more
Are you thinking of a ponytail or a simple bun? If you can make a ponytail, you can make a bun, and in this guide, we'll show you how to make a bow bun—for beginners. It's a very easy, but very cute and chic, way of tying up that short hair. Video: . It seems tough to do when ...more
Maps is great for getting turn-by-turn directions in unfamiliar territory, but how many times does your favorite song have to be rudely interrupted by that navigation voice telling you to turn left or right? Yes, you need those spoken directions to get to where you're going, b ...more
Ever a hacker can have their own business that goes beyond cashing in on profitable bug bounties. With the right skill set and certifications, an ethical hacker could build a cybersecurity firm, become a penetration testing for hire, or even just consult on preventive measures ...more
Hello Elite Hackers! Welcome to my 3rd Post, which explains how to hack any account like G-mail, Facebook, etc. You can also use this technique to hack/spoof messengers like Facebook or WhatsApp etc. Step 1: Fire-Up Kali: I hope you know how to hack android and gain access t ...more
Hello readers, and welcome to Null Byte. Before we start, for those of you who may not know me, my name is ghost_; I'm a relatively active member of our community and have been around for a while. During my time here, I've seen our community cultivate into the brilliant one ...more
If you have a smartphone with a good camera, chances are you don't think it's good enough. There's always something that can better with your mobile pics, and for me, that something is closeup shots. I love macrophotography. The finer things in life excite me, finer meaning t ...more
In light of our recent post, Art Borne From the Barrel of a Gun, here's a thorough guide to building your own bullet capture system via robotics site Glacial Wanderer. Says Hack a Day: "A pair of IR sensors spaced two inches apart can capture and calculate the speed of a pro ...more
This guide is written for anyone who is practicing his penetration skills using the Metasploitable 2. The problem that we are facing here is that we have to penetrate to Metasploitable 2 and when this happens we understand that we are not logged in as root but as a user with l ...more
Many people deal with motion sickness on a daily basis, and if you're reading this, chances are you're one of them. Kinetosis can make your stomach roll, your entire body sweat, and make you feel fatigued and dizzy at even the slightest movement, whether it's related to carsic ...more
Pokémon GO, the global augmented reality game that's brought fans out of their homes to catch Pokémon across the planet, has brought about plenty of real-world positives. Unfortunately, when players get power hungry and start taking game hacks too far, we all get a little scre ...more
Hello partners, first of all I would like to thank all those who have sent me positive feedback about my posts, to say that I'm always willing to learn and teach. I'm also open to answer the appropriate questions. Second i want to say sorry for the series i left in stand by m ...more
The Windows 10 desktop and microphone can be livestreamed without using Remote Desktop Protocol (RDP) software and without opening any ports on the target computer. A hacker with low user privileges can monitor and exfiltrate a target's every move and private conversation in r ...more
You can add Bluetooth capability to an old stereo, a retro mouse, or even your car's cassette deck. If you can think of a device, someone has probably found a way to control it with Bluetooth. This hack is a little different, though. Kai Aras put together a simple guide to ad ...more
Greetings my fellow aspiring hackers, Its been a long time and I have to confess I would not be around for long as I am not free yet. I just have some few hours to spare and decided to help out. I learnt OccupyTheWeb won't be around to help out anymore which is like a slap in ...more
This past year was a big one for WonderHowTo. Our biggest yet. In 2014 our writers, curators, and community members helped over 100 million people learn over 270 million new things. That's 40% more people than the total number of students enrolled in every single school from e ...more
If you need to hack an Android device, try a remote administration tool. Known more familiarly as a RAT, there are open-source RATs that are barebones and exorbitantly priced RATs that are more polished. There are also low-cost and polished RATs that aren't intended to be RATs ...more
Greetings. This how-to on hacking Windows 7/8/10 etc. admin account passwords using Windows Magnifier is focused on adding, changing, or deleting an admin level account on a Windows 7/8/10 etc. Maybe you forgot or lost the password to your Windows Admin account, this guide wi ...more
Unless you have unlimited cellular data, you probably connect your iPhone to every Wi-Fi network you come across. It could be a local coffee shop, public library, or just a friend's place. Wherever it is, you'll need to ask for the access point's password if it's a secured net ...more
A macOS computer can reveal a lot of information about the owner, including which Wi-Fi network they have permission to access. With an Arduino-based attack, we'll use a five-dollar setup to inject a rogue Wi-Fi network and steal the list of trusted Wi-Fi networks, allowing us ...more
Confused by TikTok? Trying to grow your Instagram fanbase? Aiming to create the perfect Facebook ad? Growing an audience might be challenging, but with the right strategies, it is possible — and fun. The 12 courses included in The 2020 Complete Digital Marketing for Beginners ...more
Americans consume over 1.2 billion pounds of potato chips each year, making it one of the most popular snack foods in the United States. If the entire population were addicted, it'd be about 4 pounds per person each year. Not everyone does, though, so it'd be more realistic t ...more
Garlic is magical. It fends off vampires (or so I hear), helps lower blood pressure, reduces the production of cholesterol in the body... oh, and it's also freaking delicious, of course. Garlic is a culinary staple in countries all over the world. That lovable stink and sharp ...more
In my last guide, I showed how you could crack the combination of any Master Lock combination padlock in 8 tries or less using my online calculator. Now, as promised, I'll be showing you how I devised the attack, which is based off the well-known technique that reduces the 64, ...more
To hack a Wi-Fi network using Kali Linux, you need your wireless card to support monitor mode and packet injection. Not all wireless cards can do this, so I've rounded up this list of 2019's best wireless network adapters for hacking on Kali Linux to get you started hacking bo ...more
I have Verizon, America's largest 4G LTE network, as my cell service provider, but there are times when I find myself with a pretty shitty signal, rendering my upload and download speeds substantially slower than usual. One of those times are when I'm in my bedroom, and altho ...more
First off, Rooting Your Device voids the warranty on the device. If you want to root your device but are afraid of "bricking" said device, rooting it may not be good for you. Okay, now that we've got that out of the way, its time for... Why should I Root my device? Reason 1: ...more