Watch to learn how to hack a brute in MyBrute (05/13/09). Hack mybrute with this mybrute cheat. MyBrute hacks, cheats, tricks. Visit mybrute.com to play the game. In the words of mybrute: Mybrute is a flash based arena fighting game. Players create "brutes" and fight other p ...more
Watch to learn how to become a god in MyBrute (05/15/09). Hack mybrute with this mybrute cheat. MyBrute hacks, cheats, tricks. Visit mybrute.com to play the game. In the words of mybrute: Mybrute is a flash based arena fighting game. Players create "brutes" and fight other p ...more
Wish things were free? Well, with this hack, you can make sure all the gold is zero and everything costs nothing. How? With Cheat Engine! Play Arcuz online with this video tutorial. See how to hack gold with Cheat Engine for Arcuz online (12/19/09). Download Cheat Engine 5.5. ...more
Get more money and experience in Fish World with this simple Facebook Fish World cheat using Cheat Engine 5.5. Easy to perform. In this Fish World video tutorial, see the steps on how to hack Fish World EXP and money (09/09/09). Download Cheat Engine 5.5 before you attempt th ...more
You not only want more money, but you want to level up fast, too. What do you do? Hack with Cheat Engine, that's what. This Facebook Fish World cheat will give you all the money and levels you want. In this Fish World video tutorial, see the steps on how to hack levels and mo ...more
Need a little more money for your aquarium? How about a little more experience to help your fish along their way? Easy… use Cheat Engine to hack Fish World for whatever you need. In this Facebook Fish World cheat video tutorial, see the steps on how to hack Fish World: Money ...more
Get a super high score on Icy Tower! You can reach 1,000,000 with this neat little hack using Cheat Engine. This wintery video tutorial teaches you how to use Cheat Engine to hack Icy Tower (11/09/09). Don't be the only one left out not cheating! Learn now. Icy Tower is a fl ...more
Use Cheat Engine to hack into the popular Bouncing Balls game. It's as easy as that. It's not too hard to use Cheat Engine if you've never before, then… flash game hacking everywhere! Watch this video tutorial to learn how to cheat Bouncing Balls (10/11/09). Download Cheat En ...more
How to hack Click Challenge! v3. Master your clicking skills. For this clicking flash game, all that you need is your computer mouse and your hand. Just don't overdo it though or you may experience arthritis at an early age! Watch this video tutorial to learn how to cheat Cli ...more
Basically, the whole point of this video is to be really clear about how to get a Bear as a pet or any of the others available. First of all, you need to pupil someone who already has a bear pet, or the one of your choice. The lower the lvl of your masters, the higher the per ...more
Welcome back, my budding hackers! With this article, I am initiating a new series that so many of you have been asking for: Hacking Web Applications. In previous tutorials, we have touched on some of the techniques and tools for web app hacking. We looked at web app vulnerab ...more
When our Nexus 7s upgraded to KitKat, one key piece of functionality was lost in the mix—Flash support. Of course, even before that we never had official support on the Nexus 7, but hacks seemed to do the job just fine. As it stands now, Google remains on the warpath against F ...more
Security researcher Ravi Borgaonkar from Berlin has discovered that hackers can hide an 11-digit code in a webpage that can wipe out all of the information on your smartphone—contacts, photographs, music, applications, and anything else of importance. The attack takes no more ...more
With the new Samsung Galaxy Note II, there's a new Multi Window mode that allows users to run two different apps simultaneously on the tablet's screen. This feature works with Samsung and Google apps like Gmail, YouTube, Chrome and Talk. Video: . With the list of the functioni ...more
Welcome back, my greenhorn hackers, and happy New Year! Now that your heads have recovered from your New Year's Eve regaling, I'd like to grab your attention for just a moment to preview 2015 here at Null Byte. I hope you will add your comments as to what you would like to se ...more
Welcome back, my novice hackers! Episode 6 of Mr. Robot has come and gone and, as usual, it did not disappoint. Once again, our hero, Elliot, has used his extraordinary intellect and hacking skills to awe and inspire us. In this episode, Elliot is being blackmailed by the ru ...more
Ringing and vibrating alerts on your smartphone can be a bit distracting when you're at work or school, but silent alerts can be a little too subtle if you want to know when you get a notification. Even the tiny LED alerts can be easily missed. So, is there's something in-betw ...more
Though they share the same name, the HTC One and OnePlus One have completely different sound quality. HTC had put a lot of time and effort into fine-tuning their BoomSound technology, while OnePlus is still fairly new to the game, with brand recognition being a much greater ob ...more
A lot of people think that TOR services are unhackable because they are on a "secure environment", but the truth is that those services are exactly the same that run on any normal server, and can be hacked with the same tools (metasploit,hydra,sqlmap...), the only thing you ha ...more
In my first few articles, we focused on operating system hacks. These hacks have been primarily on older operating systems such as Windows XP, Windows Vista, and Windows Server 2003. Although these operating systems were first released, in some cases, almost 10 years ago, the ...more
I had my wallet stolen a few months ago, and I knew I would never see it again. My biggest gripe was not the credit cards in there, since they're easily cancelled, but the gift cards. I had some pretty good gift cards in there, and there's no way to get those back. Your walle ...more
Reddit user Mr. Squishy recreated the entire Game Boy Pokémon Red Version game in Vanilla Minecraft, i.e., a Minecraft server without gameplay modifications. Instead of using mods, he used 357,000 commands blocks—blocks that execute commands in the popular sandbox game. How lo ...more
The newest update for iPad, iPhone, and iPod touch is near, and I've got a firsthand look of what's to come in the new iOS 7.1, the first major update since iOS 7 was released. Update: iOS 7.1 Released to the Public (3/10/14) The final version of iOS 7.1 was released to ever ...more
One of the most feature-packed camera suites out there resides on the Sony Xperia Z2. Along with the regular camera and video modes, it comes with Motiongraph, AR Effect, and Social Live. Up until now, most of these features were exclusive to the Xperia Z2, but XDA user Vipul ...more
Windows XP will always have a special place in my heart—it's the operating system I grew up on. It guided me through the glory days of AIM, Napster, and MySpace, but now it's dead. The OS that had been supported by Microsoft for twelve years officially lost its support on Apri ...more
Welcome back, my greenhorn hackers! Earlier in this series, I showed a you a couple of different ways of fingerprinting webservers. Probably the easiest way, is to use netcat and connect to port 80 and pull the webserver banner. The banner is simply the application advertisi ...more
Welcome back, my budding hackers! One of the keys to being successful as a hacker, pentester, or cyber warrior is the ability to find vulnerabilities or flaws in the target system, which are what we exploit when we hack. We have looked at several ways to do that including var ...more
Welcome back, my budding hackers! When we are looking for ways to hack a system, we need a specific exploit to take advantage of a certain vulnerability in the operating system, service, or application. Although I have shown you multiple ways to exploit systems here in Null B ...more
Thanks to HTML5 and dedicated video apps, watching your favorite shows, movies, or video clips on your Samsung Galaxy S4 couldn't be easier. However, there are still times when you'll run into a website that requires Flash to play a video or interact with its content. Although ...more
Mobile scanning applications are nothing new in the world of Apple, except that the majority of them usually come with pesky in-app purchases that stifle the entire experience and render some features useless until you pay for them. Thanks to Apple dev ABBYY, you can now down ...more
Hello my fellow hackers, it's been a while since my last post, I can't get the time now-a-days for the posts but can manage to tend to comments. Welcome to my 9th post, this tutorial will explain how to extract and decrypt WhatsApp database from the Victim's android system. ...more
When downloading any application on an Android device, you will always be prompted by the following... Whether it's Angry Birds, Shazaam, or Chrome, every application will ask for permissions. If you try and deny these permissions, it won't install, leaving you with no other o ...more
Welcome back, my greenhorn hackers! Several of you have you have emailed me asking whether it's possible to install a keylogger on a victim’s computer using Metasploit. The answer is a resounding "YES"! So, by popular request, in this guide I'll show you how to install a key ...more
In the previous article, we learned how to set up our VPS, configure our PHP server, and developed an in-depth understanding of how the payload works. With all that taken care of, we can get into disguising our payload to appear as an image and crafting the note in the greetin ...more
My OnePlus One easily gets over a day of battery life without a problem, but when I try to charge it, it seems to take just as long. For some reason, no matter what charger you plug your OPO into, it never gets more than USB-level power, meaning that charging times are more th ...more
Just days after news spread that Snapchat could be exploited by spammers, an anonymous group of hackers have released the private information of over 4 million users of the popular photo-sharing application. Containing both username and phone number pairings, SnapchatDB! has ...more
Surveillance is always a useful tool in a hacker's arsenal, whether deployed offensively or defensively. Watching targets yourself isn't always practical, and traditional surveillance camera systems can be costly, lacking in capabilities, or both. Today, we will use motionEyeO ...more
In the weeks before Apple officially released iOS 8, consumers were abuzz over rumors that a new feature would password-protect your photos and text messages from prying eyes. Unfortunately, this ended up being untrue, though we did cover some alternatives to protecting your i ...more
The use of smart phones is not limited only as a mode of communication now-a-days. There are many things that can be done with the help of a smart phone. Developing various useful applications and games is the buzz these days. Let's just checkout steps that are to be followed ...more
If you thought humans were reading your résumé, think again. Robots do, and their one solitary objective is to systematically crush the hopes and dreams of those who don't make the cut. Instead of paying a few humans to read thousands of résumés over a couple weeks, many compa ...more
Hi, gang! Time for another hack using Metasploit. We have exploited Windows XP (a very insecure operating system) and we have exploited Ubuntu and installed Meterpreter on a Linux system exploiting the Samba service. Several of you have asked for a hack on more modern Windows ...more
Greetings My Fellow Aspiring Hackers, Its been long since I last posted a tutorial. Its vacation and since I won't be coming home, I've decided to use my day for sharing. I was browsing through old posts and found OTW's article - Hack Like A Pro: How to Find the Exact Locatio ...more
If you've ever owned an HTC device or anything in the Nexus line, odds are, you have typed the word "fastboot" into your command line at one time or another. That said, odds are, you have only just barely scratched the surface of what this handy little Android tool can do. Let ...more
If you're tired of paying $60 for new XBox 360 games or waiting years for them to get cheaper, you should probably mod you system. This will allow you to play burned copies of games for free (no time to get into the moral implications here). The first step in that process is f ...more
In this clip, you'll learn how to set up PV3D for hacking the Number3D class. Whether you're new to Adobe's popular Eclipse-based integrated development environment (formerly known as Flex Builder) or are a seasoned developer merely looking to improve you're chops, you're sure ...more
Hello friends! This tutorial will teach you how to build a local pentesting lab on your Linux machine which will enable you to easily install common web applications so you can practice locating and exploiting their known vulnerabilities (or discover new ones!). In particular, ...more
The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized ...more
Kali Linux is probably the most well-known hacking distribution among penetration testers. However, there are alternative distros which offer versatility and advanced package management systems that are absolutely worth considering. One such distribution is Pentoo, a Gentoo-b ...more
Developed by Open Whisper Systems, Signal is a free, open-source encrypted communications app for both mobile and desktop devices that allows users to make voice calls, send instant messages, and even make video calls securely. However, a vulnerability was recently discovered ...more
While it hasn't gotten as much attention as iOS 10, Apple's big 10.12 update to their Mac operating system is finally out for all to enjoy—and you can download it for free from the Mac App Store right now. Don't Miss: 60+ Cool New Features in iOS 10 Siri is definitely the m ...more
After a hacker has configured Metasploit on a remote private server, created a resource script for automation, and created a simple payload, he or she can begin the process of remotely controlling someone's Windows 10 computer with just a few moments of physical access — even ...more
With beta testing coming to a close, it's quite likely we will see the stable Android Oreo OTA roll out for the Galaxy S8 in late January. Yesterday, a Reddit user posted a link to an official Oreo OTA build for the Galaxy S8. We've already detailed everything that's new in th ...more
On September 1st, 2015, Google made headlines by introducing their new logo. It may not seem like huge news to some, but as I write this, there have been 2,167,914,729 searches on Google so far today. So there's a large amount of people who see their logo when browsing the Web ...more
If you want to follow Null Byte tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit for beginners learning e ...more
It's not uncommon for hackers to attempt to move laterally between devices in proximity of a compromised device to maintain a prolonged presence in the network. Malware utilizing USB flash sticks to self-replicate and compromise air-gapped machines isn't a new concept. In bot ...more
If you own a Samsung phone and enjoy rooting or modding your device, flashing official firmware can be very useful. Odin is Samsung's own internal program for loading such updates for testing purposes, and it's quite easy to use for your own custom modification needs. Though ...more
Apple revealed the new iPhone 6S and 6S Plus at their September 9th event, and there are two particularly awesome features built in just for selfie photogs. The first is 3D Touch, which gives you a quick shortcut to taking selfies just by pressing the screen in a certain way. ...more
The $35 Raspberry Pi is an amazingly useful single-board computer (SBC) with a good balance of price, performance, and connectivity options. But for some projects, it just isn't enough. Whether you need more computing power, a smaller size, or better machine-learning capabilit ...more
While Huawei smartphones haven't always been the best choice when it comes to custom ROMs, one thing that has always been accessible is the ability to unlock the bootloader. An unlocked bootloader is the first step into the magical world of rooting, but after May 24, Huawei wi ...more
A scary piece of malware just got a lot more terrifying this week. Security firm Comodo reports that "Tordow," a banking Trojan first uncovered in September 2016, received a massive update this December. The new "Tordow 2.0" hack stands out among other types of malware becaus ...more