Create and De

Whisking : We're All Doing It Wrong

Whisking liquids seems somehow quaint, especially since there are good, cheap devices out there like immersion blenders and hand mixers that can whip cream, turn egg whites into meringue, and mix batters for you. However, I still love my whisk and use it often, and here's why ...more

How To : Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more

How To : The Top 80+ Websites Available in the Tor Network

There are nearly 100,000 unique onion service addresses online with over two million people using Tor every single day. Join me as I explore a small fraction of what the Tor network has to offer. It's puzzling to imagine about 100,000 .onion websites in existence. Readers who ...more

How To : Hack Flash Games

This is a tutorial showing you how to easily hack flash (.swf) games! You only need two things: A flash game (in .swf format) and Flasm (an amazing flash disassembler). Getting Flasm Download Flasm Flasm can be downloaded from the no|wrap.de website. Save & Extract Save ...more

How To : The Best Video Recording Apps for Your iPhone

If you have a modern iPhone, you have an excellent video recorder at your disposal. Every iPhone since the 6S has the ability to shoot in 4K resolution, and each new iteration has brought new capabilities to the table. But even the best mobile shooter can use a little extra he ...more

How To : 9 Oreo Hacks That Make Life Worth Living

We've already shown you how to dunk a regular-sized Oreo cookie while keeping your fingers pristine, how to upgrade Oreos into different desserts, and even make them into lazy ice cream sandwiches. Now we're going to introduce you to a few other essential Oreo hacks that will ...more

How To : Score Big with Simple 2-Letter Words in Scrabble

No matter what word game you're playing, whether it's Scrabble or one of its near-homogeneous counterparts like Lexulous, Wordfeud or Words with Friends, one of the easiest ways to stay on top of your opponent is knowing all of the legal two-letter words you can play. You're n ...more

Ranked : The 5 Best Home Screen Launchers for Android

One of the best things about Android is the ability to customize your phone to your liking. From changing the layout of icons to finding the perfect wallpaper to reflect your current mood, there's a wide range of tools to make your phone yours. One of the easiest ways is to t ...more

How To : Dominate the New York Times Crossword Puzzle

First off, don't be frustrated. YOU CAN DO IT! Contrary to the message in the image above, it's NOT over. It's just beginning. And when it comes to solving the New York Times crossword puzzle, the old cliche does apply: practice makes perfect. I've read quite a few books and ...more

How To : Say the names of kitchen items in French

Watch to learn how to say the names of things you use in the kitchen, like plates, colanders, and the stove, in French. un espirateur de table - small vaccuum une assiette creuse - a plate with a dip in the middle une assiette plate - a flat plate une balance - balance un batt ...more

How To : Fall Asleep in Less Than 1 Minute

It can be pretty tough to fall asleep when your brain is thinking nonstop or anxiety has gotten the best of you, and it seems to only get harder when you're lying in bed listening to yourself breathe. Yet paying attention to that breathing may be exactly what you need in order ...more

How To : Get rid of moles in the yard

Moles can be a problem. You can identify Moles as a problem if when you stick your finger down a hole you can feel a tunnel. There is a safe way to rid your lawn of Moles without harming other pests, insects, pets or family. Castor Oil produces an odor that Moles don't like. G ...more

How to Hack Windows 7 : Sending Vulnerable Shortcut Files

Welcome back, my greenhorn hackers! After the disaster that was Windows Vista and the limited and reluctant adoption of Windows 8 and 8.1, Windows 7 has become the de facto standard operating system on the desktop/client. Although the most valuable information to the hacker ...more

How to Hack Wi-Fi : DoSing a Wireless AP Continuously

Welcome back, my nascent hackers! In previous tutorials for my Wi-Fi Hacking series, I have shown you how to crack WEP and WPA2 passwords, break a WPS PIN, and create Evil Twin and Rogue access points. In this continuation of the series, let's look at slightly different appro ...more

News : Why Is Steampunk Plagued by Plague Doctors?

I'm sure that there are plenty of people out there who have no idea what a plague doctor is/was, so I'll start with an explanation. Despite what we now consider to be their relatively fearsome appearance, they were originally just doctors, and they have existed for as long as ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

How To : Capture packets with the Wireshark packet sniffer

Wireshark is the world's foremost network protocol analyzer, and is the de facto (and often de jure) standard across many industries and educational institutions. This video tutorial demonstrates how to get the Wireshark packet sniffer up and running to do a capture as well as ...more

How To : Find Hidden Web Directories with Dirsearch

One of the first steps when pentesting a website should be scanning for hidden directories. It is essential for finding valuable information or potential attack vectors that might otherwise be unseen on the public-facing site. There are many tools out there that will perform t ...more

Uncrackable : Secure Your Secrets with 4096-Bit Encryption

As you progress in the world of information security, you'll find yourself in situations where data protection is paramount. No doubt you will have files to hide and secrets to share, so I'm going to show you how to use the GNU Privacy Guard (GnuPG or GPG for short) to encrypt ...more

Become an Elite Hacker, Part 1 : Getting Started

Who am I? First let me introduce myself. I am Th3skYf0x, an -well lets call it experienced- hacker and i recently found this site and right after that i found this Null Byte "world" soo i thought... Why not teaching instead of doing nothing with my knowledge. Let me get one ...more

Real Brain Food : What Geniuses Actually Eat, Part 1

It's common knowledge that certain foods foster brain development, health, and memory. Fish almost always makes the list, as do any foods that are loaded with antioxidants like blueberries, nuts, whole grains, green tea, and dark chocolate. Spices like turmeric are being studi ...more

Quickles : DIY Pickles That Take Only 10 Minutes to Make

Pickles are one of those rare foods that most people love, but never even think of making. Most home cooks shy away from making pickles because they take time and patience, and because the grocery store option is both cheap and delicious. I'm very much one of those people who ...more

How To : Cooking Fish with Foil Is Fantastically Foolproof

Sometimes the idea of cooking fish, especially for a group of guests, can be intimidating. There's the fear of the fish not cooking right, or sticking to the pan or grill. And even if you cook it right and the fish doesn't stick, you're left with the inevitable fishy-smelling ...more

How To : 5 Must-Know Kitchen Hacks for Cooking Spray

Cooking spray is something of a gross necessity. The slimy, oddly-scented grease is perfect for keeping casserole dishes crust-free, but the oil splatter does a number on clean kitchen counters, and the lecithin ingredient can ruin nonstick cookware if not careful. Despite th ...more

How To : Make the quick-draw sleeve gun from "Taxi Driver"

This video tutorial from IndyMogul shows you how to make the quick-draw sleeve gun from "Taxi Driver". Robert De Niro built it in Scorsese's "Taxi Driver," but Erik Beck from INdy Mogul builds it for cheap! In this episode, Erik builds the infamous Quick-Draw Sleeve Gun that ...more

Word Nerds Unite : Planning a SCRABBLE-Themed Wedding

Wedding themes are no rarity, but a SCRABBLE wedding? I never would have guessed, until I came across "10 Ways to Incorporate Scrabble Into Your Wedding" at CasaSugar. Now, I'm one of the biggest SCRABBLE nerds out there, but I could never see myself getting hitched amongst SC ...more

How To : Bind Dendroid Apk with Another Apk

I recently posted a Tutorial about setting up Dendroid: http://null-byte.wonderhowto.com/how-to/setup-dendroid-android-rat-0167299/. I have worked the last 5 days on getting the Dendroid Binder, given with the Dendroid Source, working. This solution only works on Windows syste ...more

News : Winning with 2-Letter Words

When your opponent throws down "AA", you tell them no abbreviations, but alas... it's not. They build "ZA" on the board for 64 points, and you say it's slang, but it's in the dictionary. Next is "EF", and you let them know that spelling out letters is not allowed and ridiculou ...more

  • Hot
  • Latest