Create and Us

How To : Turn Any Android Device into a Hidden Spy Camera

If Detective Alonzo Harris from Training Day taught me anything, it's that "It's not what you know, it's what you can prove." So when items mysteriously go missing from my room or my section of the fridge, it's up to me to figure out and prove which roommate took them. I don' ...more

How To : Hack Wi-Fi Networks with Bettercap

There are many tools out there for Wi-Fi hacking, but few are as integrated and well-rounded as Bettercap. Thanks to an impressively simple interface that works even over SSH, it's easy to access many of the most powerful Wi-Fi attacks available from anywhere. To capture hands ...more

How To : 8 Great New Messages Features in iOS 11 for iPhone

Apple gave the Messages app a massive makeover with iOS 10, with a slew of options that made iMessages on the iPhone a lot more fun. While not quite as comprehensive, iOS 11 builds upon that success and makes the app more user-friendly and all-inclusive. iOS 11 brings plenty ...more

How To : Download All 15 Wallpapers from iOS 8 Right Now

Patience is a virtue that many of us do not possess, which is exactly why we've previously shown you how to acquire the initial wallpapers for Mac OS X Yosemite and iOS 8 beta. Now, thanks to Jason Zigrino and Benjamin Tourin, we'll be giving you access to the rest of the iOS ...more

How to Hack Wi-Fi : Automating Wi-Fi Hacking with Besside-ng

Besside-ng is the hidden gem of the Aircrack-ng suite of Wi-Fi hacking tools. When run with a wireless network adapter capable of packet injection, Besside-ng can harvest WPA handshakes from any network with an active user — and crack WEP passwords outright. Unlike many tools, ...more

How To : Test for Dead Pixels on Your Smartphone

Every smartphone manufacturer is susceptible to defects, but after dropping a good chunk of change on a shiny new device, we as consumers have little tolerance for such issues. We want our gadgets to be perfect in every regard, so even the tiniest flaw is irksome. One of the ...more

Minecraft : My Uncle, the Serial Killer

Do you ever really know someone? I mean really really? Super really? Sometimes we can talk and be with people normally for years and then bam: five people dead, house on fire, dog missing. All the while people shake their heads and regret that if they had just put the little ...more

How To : Take Ultra-Slow Motion Video with Your Galaxy S5

The Galaxy S5's camera is amongst the most capable smartphone shooters on the market. With a 16-megapixel sensor that is capable of recording 1080p video at 120 frames per second, the stat sheet was officially stuffed when Samsung brought this device to market. But it's not a ...more

How To : Create a Minecart Train Station in Minecraft

Welcome to Minecraft World! Check out our advanced tutorials and come play on our free server. So you have a deep mine, an epic home, a bountiful farm, and mob traps galore, but have you ever considered linking them together into one cohesive unit? With the use of a minecart ...more

Ranked : The 5 Best Gaming Phones in 2019

Mobile gaming has exploded in recent years, with experts predicting 2.4 billion global mobile players by the end of 2019. It already accounts for 47% of the worldwide gaming market, besting console and PC. No wonder we've seen the rise of gaming smartphones, a class of phones ...more

News : 20 Things to Do with Kali Linux After Installation

Okay, so first off, I absolutely did not, any any way shape or from, take part in the writing of this article, but I really think that this will be helpful to all of us Kali users. Here is the article made by blackMORE Ops: 20 things to do after installing Kali linux

How To : Cast Amazon Instant Video to Your HDTV

Amazon just signed a deal with HBO to host the cable channel's original content on its Instant Video service. For those of us with Amazon Prime accounts, this is great news—but there aren't any readily apparent options for playing it on Chromecast. The iOS app lacks Chromecas ...more

How To : Make a Full System Image Backup on Windows 10

Just recently, I was experimenting with a dual-boot Windows setup, and somehow managed to wipe my primary Windows installation in the process. "Why," I asked myself, "Why didn't I make a backup before I started this?" Still to this day, I'm going through the painstaking proces ...more

How To : Change the Login Screen Background on Windows 10

Windows 10 makes it a cinch to change the lock screen background: simply go to Setting -> Personalization -> Lock screen, then change the background to whatever you'd like. But, trying to change the login screen background—the screen where you enter your password—was a long, c ...more

Mac for Hackers : How to Install the Metasploit Framework

Metasploit is an extremely popular pentesting tool capable of enumeration, exploitation, and injecting shell code, and is a part of almost every hacking toolkit. So there's no way I could leave this out of our series on getting your Mac set up for hacking. Luckily for those o ...more

HowTo : Build a Dancing Robot in Ten Minutes

Though named "Walker," this robot doesn't really ambulate so much as shimmy. Which, to tell the truth, is fine by us. Lots of gross things walk. Only cute things dance. Bot builder Randy Sarafan explains his motivation: My goal with Walker Bot was to make a 4-legged walking ...more

News : Jackass 3D Prank Contest

Welcome to the Official Jackass 3D Prank Contest Submission Page Think you've got the wit and imagination to be a Jackass? Well, here's your chance. Johnny Knoxville and Jackass 3D crew are hosting the first ever Jackass 3D Prank Contest to celebrate the upcoming release of t ...more

Android Basics : How to Install BusyBox Commands

If you're a rooted user, you've probably heard the term "BusyBox" by now. Many mods require these powerful root commands, but the process of installing BusyBox can be a bit confusing for the uninitiated. To clarify things a bit, BusyBox is both an app and a set of specialized ...more

How To : Exploit Routers on an Unrooted Android Phone

RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially covered RouterSploit on Kali Linux and macOS (OS X), but this tuto ...more

  • Hot
  • Latest