Gui Hacking Tools

How To : A Hacker's Guide to Programming Microcontrollers

While hackers know and love the Raspberry Pi, many don't know of its cheaper cousin, the microcontroller. Unlike a Pi, which can be used more or less like a regular computer, microcontrollers like the Wi-Fi connected ESP8266 require some necessary programming skill to master. ...more

How To : Stop Facebook's Annoying Marketplace Notifications

While many of Facebook's tools are well received as they enhance the experience, one which is often complained about is the Marketplace. The Craigslist-like feature which offers a way to facilitate transactions between users can be a little overbearing with its alerts. However ...more

News : Everything You Need to Know About the iPhone XR

The iPhone XR has touched down alongside the XS and XS Max, and it utilizes tried and tested materials found on the iPhone 8, while being molded in the same vein as the iPhone X. The budget-friendlier flagship comes with its own set of design elements to set it apart from its ...more

How To : Check if Your Apps Are Targeting Oreo

Starting November 1, 2018, Google will require that all new apps and updates to existing apps target Android 8.0 Oreo or higher. This move means the developers behind many of your favorite apps are now scrambling to get their software modernized, while others are considering a ...more

Instagram 101 : How to Follow Hashtags & Curate Your Feed

Hashtags are the backbone of Instagram. They connect photos from users all around the world and give visibility to users who don't have many followers. Now, Instagram has added more functionality to this indispensable tool, and this new feature lets you follow hashtags in your ...more

How To : Force Restart the iPhone X When It's Acting Up

Every now and then, an iPhone will freeze up and become unresponsive due to a software glitch. It can be a buggy app that somehow interferes with iOS or a software update that somehow didn't install properly. Whatever the cause, it's safe to say that no iPhone is immune to thi ...more

News : New Leak Claims This Is the Final iPhone 8 Design

Update: Twitter user Benjamin Geskin (@VenyaGeskin1), known for his iPhone renders, tweeted on Monday alleging that the leaks are fake: This is glass made by Shenzhen manufacturers of protective glass. Fake. Not real iPhone parts. (But look is close to reality) — @VenyaGesk ...more

How To : You Deserve Taco Shells Made of Cheese

We're all for heaping piles of shredded cheese on our tacos, but what if all that cheese could actually be the taco shell instead? Since this was perhaps one of the more profound food questions we've had in a while, we wasted no time getting to the kitchen and tackling this ch ...more

How To : Shake Your Way to 1-Minute Whipped Cream

You're better than a can of Reddi-wip, which is why you should always make fresh whipped cream at home. It's extremely easy to make, won't have all those nasty preservatives, is thicker and creamier in consistency (like cream should be), and tastes much richer. Don't Miss: 4 ...more

How To : Setup Practice Ctf's from Vulnhub on Kali Linux

Since Ive started to learn about nmap and metasploit and other tools I was learning well but I had one problem, I had nothing to practice it on. As a result I asked someone about my problem and they told me about Vulnhub. It's a great way to practice. Its good beginners and pe ...more

How To : The Five Phases of Hacking

Five Phases of Hacking:- The five phases of Hacking are as follow: Reconnaissance Scanning Gaining Access Maintaining Access Covering Tracks The Five Phases of Hacking Reconnaissance:- This is the primary phase where the Hacker tries to collect as much information as possib ...more

Raspberry Pi : Metasploit

Before we dive into the world of frustration, I first would like to thank whoever of the admins and mods made the folder for Raspberry Pi in the How-To's, thank you. Now with that outta the way, this article is about Metasploit on Raspberry Pi (hence the title). I should say t ...more

How To : Hack into a Mac Without the Password

Hello, my fellow hackers. My name is cl0ck. I am a senior majoring in Computer Engineering with an emphasis is Security. I have been lurking the site for a while now reading and learning from the great minds that reside here. I, too, have some knowledge that I would like to s ...more

How To : Navigate Hands-Free Using Voice Commands

Google Maps, in conjunction with the Android operating system, is a powerful tool for navigation that is often underutilized. While it's no secret that it can get you to wherever you're going and back, some of you might not know that you can use Google Maps without even having ...more

  • Hot
  • Latest