Do-reverse

How To : Track Who Views Your Facebook Profile

Why can't I see who is stalking my Facebook profile? There are other social networks that do let you see who's viewed your profile, mainly LinkedIn and its "Who's Viewed Your Profile" feature. Regular users can see a recent list of who has been spying on you, along with some ...more

How To : 16 Tips for Staying Awake When You're Tired

While there's an art to surviving the all-nighter, there's also an art to staying awake throughout the day when you're operating on little to no sleep. In 1964, the record for sleep deprivation was set by 17-year-old Randy Gardner, who stayed awake for an incredible 264 hours ...more

How To : Hack Android Using Kali (Remotely)

Hello Hackers! Welcome to my 2nd Post: This is a tutorial explaining how to hack android phones with Kali. I can't see any tutorials explaining this Hack/Exploit, so, I made one. (Still ,you may already know about this) Step 1: Fire-Up Kali: Open a terminal, and make a Troja ...more

How To : Colonel Sanders' KFC Recipe Revealed!

The Holy Grail of chicken has just been found by an unsuspecting reporter of the Chicago Tribune. Yes, that's right: The secret 11 herbs and spices in Colonel Sanders' Original Recipe chicken has finally been revealed, and it looks legit as hell. While a copy of the Original ...more

How To : The Essential Skills to Becoming a Master Hacker

Many of my aspiring hackers have written to me asking the same thing. "What skills do I need to be a good hacker?" As the hacker is among the most skilled information technology disciplines, it requires a wide knowledge of IT technologies and techniques. To truly be a great h ...more

How To : Hack Smart Cards for satellite TVs

Notorious hacker Chris Tarnovsky opens his underground laboratory to WIRED, providing a peek into the world of satellite television smart-card hacking. This complicated process involves nail polish, a pin head and various acids -- so don't try this at home (unless you're Chris ...more

How To : Reverse Check a Phone Number

Prank Calls, Masked NumbersWho is calling your phone or your child's? Pranksters use a lot of tricks to make sure they can get on your nerves. Being able to trace prank calls is important because you're not going to learn much from your Caller ID, since most prank callers use ...more

How To : Make Your Own Bad USB

Hello, everyone! Many of you don‘t even know about my existence here on Null Byte, so I thought of contributing something rather interesting. Recently, someone asked how to make your own "Bad USB," and I promised to make a how-to on this topic. In addition, it would be nice t ...more

News : The Ultimate SCRABBLE Word List Resource

To some, SCRABBLE is just a board game to play during family game night or during a casual get-together. Others think of SCRABBLE as a mere hobby. But with any activity, there will always be fanatics—the ones who would rather sell their soul than stop—the ones with a constant ...more

How To : Unlock the New 'Dark Mode' in iOS 11 for iPhone

Apple gave us the ability to invert colors on the screen a very long time ago. Then they gave us grayscale mode in iOS 8, Night Shift in iOS 9, and the red screen filter in iOS 10. The new iOS 11 was supposed to integrate the long-awaited Dark Mode that we've all been wanting. ...more

How To : Make a DIY Battery-Powered USB Charger

With portable devices being a necessity in modern everyday life, they may be subject to overuse, improper charging, or normal wear and tear. For those people who carry around their smartphone or iPod with them all of the time, how many times have you been out and about just to ...more

How To : Fix blowouts from ear stretching with gauges

Stretching your ears out to fit in a gauge looks totally counter culture and cool, but if you get too excited to load one in and stretch your earlobes too quickly there could be huge (and nasty) consequences. Check out this video to learn how to reverse a blowout. A blowout i ...more

How To : Make Water 'Bottles' You Can Eat

Bottled water is a rip-off. Not only is it pretty much the same stuff that comes out of your tap for free, but plastic bottles are rarely recycled and thus account for a huge amount of the waste that's overflowing our landfills. Next Up: Water Bottles You Can Eat Fortunately, ...more

How To : Perform an Attack Over WAN (Internet)

So, you want to perform an exploit on a victim, but you're not on the same network as their machine. In this tutorial, I'll be showing you how to set up a meterpreter reverse_tcp attack to work over the internet. Understanding the Process Here is the connection we wish to es ...more

How To : Knit with a serenity loom

This video demonstrates how to knit with a serenity loom. A serenity loom can produce a blanket up to 10 feet. To start, thread a double loop of thread through a straw. Then use the loop of thread to pull through a piece of yarn. The straw will help you place the yarn around t ...more

How To : Convert Python Script to Exe

There are a lot of great tutorials on Null Byte using Python to create backdoors, reverse shells etc, so I thought it might be worthwhile making a tutorial on how to convert these python scripts to exe files for Windows victim machines. This has a number of benefits: 1) The v ...more

How To : Generate Electricity From Kinetic Energy

Piezoelectric Energy In this article, I'll show you how to make a small, wallet-sized device that generates electricity from kinetic energy. The concept is simple: Piezoelectricity is the charge that is produced when certain solid materials (commonly ceramic and crystal) in r ...more

How To : Write a Basic Encryption Program Using Java!

Today, we are going to combine what we learned from the Introduction to Cryptography article with our Java programming skills. If you are new to Java, check out Matthew's Learn Java: Part One for a quick beginner's lesson, or check out some of the Java tutorials directly on Or ...more

How To : Create an Undetectable Trojan Using a Domain Name

In this tutorial I am going to show you how to create an undetectable Meterpreter Trojan using a Domain name. I have taken a few guides/tutorials and built it into one. The first part is creating the DNS Payload. The second part is creating the Executable file. Part 3 is using ...more

How To : Do Push-Ups and Crunches to Get Ripped at Home

This how-to video is for anybody looking to gain lean muscle right in the convenience of your own home with little to no equipment. The intensity and variety of these exercises makes for an effective muscle-building workout. Standard Pushup With hands extended slightly outsid ...more

How To : Replace Headlight Bulb on Pontiac G6

Cars are quite different than they used to be. Sure, modern cars have some cool things, but repairing them are becoming difficult. Even simple things like changing a headlight bulb. The pontiac G6 is not as hard as some of them, but it can take some time. The headlight is tuc ...more

How To : Replace rear brake pads on a Ford Explorer

When replacing your brake pads on your Ford Explorer, you first need to jack up the vehicle and remove the tire. This will give you access to the brakes. Locate the caliper, remove the two bolts and slide the caliper off. Inside the calipers are the brake pads. Pry out the out ...more

How To : Scrape Target Email Addresses with TheHarvester

Open-source data scraping is an essential reconnaissance tool for government agencies and hackers alike, with big data turning our digital fingerprints into giant neon signs. The problem is no longer whether the right data exists, it's filtering it down to the exact answer you ...more

How To : Do front wheel drive car tricks

A Ford Puma is used to instruct some cool moves. Learn the handbrake turn, 90 degree turn, reverse flip, Scandinavian flick with liftoff oversteer (similar to power slides). It's like drifting.

How To : The 5 Best Dry Ice Party Tricks & Pranks

There's no reason to wait for Halloween to play with dry ice. It definitely creates a creepy fog-like effect when you add a little water to it, but there are some other really cool things you can do wit dry ice. Here are just 5 non-Halloween ways to use dry ice for tricks or p ...more

How To : Tattoo step-by-step

This video is about how to tattoo. Once you make your choice of design, the tattoo artist traces the image. Next, he places the image on carbon paper and traces the image again to create a reverse image. He cleans the persons skin then firmly presses on the blueprint. Now its ...more

Prev Page
  • Hot
  • Latest