KeePassX, 1Password, and LastPass are effective against keyloggers, phishing, and database breaches, but passwords managers rely on the operating system's clipboard to securely move credentials from the password vault to the web browser. It's within these few seconds that an a ...more
What to do when your motivation is running low and you absolutely don't want to do something that needs to get done? If nothing is working for you, hack your brain with the following techniques to motivate yourself. Soak in your super-enthusiastic, go-getter friend's energeti ...more
If you've started using the Mac App store did you know there's a trick to getting your hands on 5 free games!? It's true, and this video can show you exactly what you need to do to get your hot little hands on some free games!
Want to be the biggest and the baddest on the courts? Of course you do! This tutorial shows you how to get the free Flash game hacking program, Cheat Engine. Once you have this program, you can use it to change nearly any value within the game to give yourself high stats, a hi ...more
Do you like Samsung's TouchWiz and the iPhone's user interface, but wish you could bring the best of both worlds together onto your device? You can! MIUI (pronounced me-you-eye) is a heavily modded custom ROM that brings a different UI experience never before seen on stock And ...more
A ziplock freezer bag full of raw egg yolk and chopped up vegetables in a pot of boiling water may not sound like the most appetizing way to make an omelet, but this technique definitely works when you're camping and don't have a stove. There are tons of things you can do wit ...more
The $35 Raspberry Pi is an amazingly useful single-board computer (SBC) with a good balance of price, performance, and connectivity options. But for some projects, it just isn't enough. Whether you need more computing power, a smaller size, or better machine-learning capabilit ...more
Country Story hacks, cheats, glitches. How to hack Country Story. Watch this video tutorial to learn how to plot hack Country Story on Facebook (08/22/09). Check out the full detailed instructions in the description of the original video. Description of the app on Facebook: ...more
With just one line of Ruby code embedded into a fake PDF, a hacker can remotely control any Mac computer from anywhere in the world. Creating the command is the easy part, but getting the target to open the code is where a hacker will need to get creative. Ruby is just one wa ...more
Give yourself more health, more sunshine or make the zombies move slower! This quicky and easy video tutorial shows you how to use the free game hacking program Cheat Engine to alter your game stats when playing Plants vs Zombies.
Are you dreading a big, tedious task on your to-do list? Commit to only doing 10 minutes of it or only the very first minimal step. By lowering the hurdle for getting the task started, it is very likely that once you start doing it, you won't feel so bad about getting the rest ...more
How to hack Pet Society! Pet Society cheats, tricks, hacks. Watch this video tutorial to learn how to cheat Pet Society: coin hack (09/10/09). 458DE85D8970488B 5D8BC85D89584F8B Rainbow Maker Hack Pet Society is a game that can be played on Facebook. Check Pet society's Fac ...more
Welcome back, my greenhorn hackers! In many cases when a computer, phone, or mobile device is seized for evidence, the system will have graphic images that might be used as evidence. Obviously, in some cases these graphic images may be the evidence such as in child pornograph ...more
Farkle hacks, cheats, glitches. How to hack Farkle. Watch this video tutorial to learn how to hack Farkle scores on Facebook (09/26/09). Download Cheat Engine and Mozilla Firefox. Description of the app on Facebook: Farkle is a fun dice game that is easy to learn and very a ...more
Counter-Strike is one of the most popular first-person shooters of all time, and deservedly so. What originally started out as a third-party Half-Life mod garnered such a cult following that Valve had to hire the developers and purchase the intellectual property to make it an ...more
Welcome back, my aspiring hackers! Although this article may have been better placed first in this series, I doubt that anyone would have read it when just starting out studying Linux. Now, that you are well into your Linux studies and have some familiarity with how it operat ...more
The USB Rubber Ducky and the Digispark board both suffer from the same issue when attacking macOS computers: a keyboard profiler pop-up which tries to identify any non-Apple USB keyboards. While it's an annoying setback, the solution is a simple modification that allows Mac co ...more
Hello friends. This is actually my first how to. In this tutorial I'll be teaching how to simply copy someone's WhatsApp pictures gallery into your computer, in an automated way. It is just an example of how easy is to steal data from someone's smartphone. I am covering Whats ...more
Hello, fellow hackers. I'm sure we've all seen it somewhere: the undying question of "How do I hack the game so-and-so?" And the answer usually is, "Come back when you actually know how to hack!" But how does one even go about "hacking" a game? What could that even mean? Wha ...more
The ability to stay organized and be resourceful with data gathered from recon is one of the things that separates the true hackers from the script kiddies. Metasploit contains a built-in database that allows for efficient storage of information and the ability to utilize that ...more
This video tutorial shows how to hack FarmVille (12/23/10). Are you tired of using Cheat Engine to hack FarmVille? Well now there's another way. This video will teach you how to use a Firefox entension called Greasemonkey and this script to cheat in FarmVille. Try it out! Ste ...more
A video tutorial showing how to create an autorun series of hacks that can run from a USB drive using Windows batch files. Create an auto hack USB drive using batch files. Click through to watch this video on irongeek.com
At first, it seemed like a clever art installation housed on the web, but now we're not so sure... the Newstweek hack may indeed be legit. Earlier this year, Newstweek claimed to have developed a way to hack into webpages on a local Wi-Fi network using a homemade device that ...more
Bad news first: It's not out yet, but it's coming really soon. The premise for the game is this: A powerful hacker configured a script that triggered if he didn't log into his computer for 14 days. If that happened, it'd send a set of instructions to someone (you!) to contin ...more
Using infrared (IR) light pens and the Wii Remote, it is possible to create very low-cost multi-point interactive whiteboards and multi-point tablet displays. Johnny Chung Lee, Carnegie Mellon University. The software can be downloaded at http://johnnylee.net
This past weekend, one of the most notorious hacker organizations in the world, Hacking Team, was hacked by some unknown organization. The Hacking Team is an Italian company that sells it software and services to companies and governments (yes, my rookie hackers, there are leg ...more
Most of us love Ikea because it is cheap, contemporary design-conscious, and the megastore's cafeteria serves 15 delicious Swedish meatballs for the low price of $4.99. Now there's an even better reason to love Ikea: why not treat their goods as raw materials, a good starting ...more
You can learn how to hack a DVD player and then you will be able to watch a DVD from any region in the world. After changing the region code, you can purchase less expensive DVD's.
Today I am going to teach the various ways that you can use social engineering to hack a system. For those of you that have followed my past tutorials, you know that social engineering can unlock a world of possibilities. This is because no matter how many firewalls, no matter ...more
For as long as I can remember, I've always sucked at wrapping presents. No matter how careful I am, my gift-wrapping usually ends up looking like a toddler did it, so I'm always looking for easy ways to spruce up my packages. If you've got a lot of gifts to wrap, store-bought ...more
Hack mybrute with this mybrute cheat. MyBrute hacks, cheats, tricks. Watch this video game tutorial on how to hack MyBrute for black skin on your brutes (06/04/09). You won't get banned or anything, and it helps your character! Visit mybrute.com to play the game. In the words ...more
How to hack Pet Society! Pet Society cheats, tricks, hacks. Watch this video tutorial to learn how to hack Pet Society: funky game cheat (09/27/09). Turn the game into funky mode! Needed: Cheat Engine 5.5 HEX: 438B0000012C8D0F Pet Society is a game that can be played on Fac ...more
How to hack Pet Society! Pet Society cheats, tricks, hacks. Watch this video tutorial to learn how to hack poo and coins on Pet Society (09/10/09). See how to get unlimited poo: normal, gold, or rainbow! You can sell them for lots of money! What you need: -Flash Player 9 -Ch ...more
Last Friday's mission was to accomplish solving HackThisSite, Realistic 5, the fifth and last in my series of realistic hacking simulation missions. This time, telemarketers are invading people's privacy, and it was up to us to stop them! The job was to get root on the site an ...more
Social engineering is described as the clever manipulation of the natural tendency of human trust. All of the passwords, locks, and encryption in the entire world are useless against a good social engineer who can charm or trick you into giving it up. But what once started as ...more
Quartz Composer is a Mac program that helps you manipulated motion capture video, and you can hack your Xbox Kinect to send motion captured data to your Mac OSX. This tutorial shows you precisely how you can use the Kinect tools to pull this off!
Store bought Nerf guns don't always achieve the velocity necessary for an effective assault. Zach Scott's solution: mod the toy. Known for his fantastic cat videos, Zach claims this hack increases trajectory by at least 25%! Every bit counts when you're in an all out foam war ...more
NetBus—Swedish for NetPrank—is a Trojan horse application that will allow you to remotely control any Windows system that runs it (provided that system is not running anti-virus software). For more information, and to get started using the NetBus hacking tool for yourself, wat ...more
After backdooring a MacBook not protected by FileVault or using a fake PDF to gain remote access, an attacker may wish to upgrade their Netcat shell to something more fully featured. While a root shell allows attackers to remotely modify most files on the MacBook, Empire featu ...more
Welcome back, my amateur hackers! When you are using and administering Linux, it is important to be conversant in the use of the log files. As you know, log files are the repository for much information about our system, including errors and security alerts. If we are trying ...more
Enjoying the many benefits of Facebook Places? But what if you want to check in somewhere you're not? Your smartphone can automatically detect your geographical location, preventing you from just checking in just anywhere, but like all technology… it's a long way from perfect, ...more
Are you getting little jealous of all those Droid users out there? If so, check out this clip. In it, you will learn how to hack your jailbroken iPhone and install an Android style startup screen to take the place of your normal iPhone display. This will give your iPhone an up ...more
How to hack Yoville! Yoville cheats, tricks, hacks. Watch this video tutorial to learn how to hack costumes with Yoville pals (09/12/09). This is how to use filters and how to put costumes on with your own skin. Yoville is a game that can be played on Facebook or MySpace. In ...more
Garlic is a key ingredient in many delicious meals, and if you've been a fan of our site for even a short while, it's no secret that we love to share tricks and tips to make cooking with garlic even easier than you first assumed. Here are just 10 of the many ways to both prep ...more
Though the Google home page may appear simple, its search tool is anything but. This quick clip from the folks at CNET TV demonstrates a number of the search engine's most obscure and most useful features, all certain to help you to find your desired information more quickly. ...more
As hard as you try to protect your valuable information with strong passwords and anti-doxing measures, there's nothing you can really do when someone else gives up your goods. And that is the case with the recent Global Payments breach. Global Payments is just one of the mid ...more
We're always looking for great food hacks to help us become better cooks who can create delicious food with less waste, fuss, and hassle. You never know where the next good tip will come from, so we've all learned to keep our eyes and ears wide open. A few weeks ago I was hav ...more
Hi Elite Hackers! Welcome! to my 4th post. This tutorial will explain, how to extend a (hacked) AP's range with a wireless adapter. I made this guide because after hacking an AP it was difficult to connect to it (poor connection) and further exploit it. You can also use this: ...more
Hak5 isn't your ordinary tech show. It's hacking in the old-school sense, covering everything from network security, open source and forensics, to DIY modding and the homebrew scene. Damn the warranties, it's time to Trust your Technolust. In this episode, see how to install a ...more
Welcome back, my novice hackers! In a recent tutorial, I showed you how to use shikata_ga_nai to change the signature of a payload to evade detection by security devices (firewalls, IDS, etc.) and AV software. Shikata_ga_nai is an encoding module in Metasploit that XORs the ...more
Skyrim is a time consuming game. I know I'm not alone in saying I constantly find myself looking for more time in the day. There is never enough time to read the books I want to read, or learn what I want to learn, or play the games that I want to play. This means that earnin ...more
If you have made the switch from Windows to Linux, I want to congratulate you in advance. I'm sure you have noticed a huge performance increase when using Linux over other operating systems. This is only half the battle, though! Most users who are new to Linux end up using Ubu ...more
It's Christmastime, so what better of a game to play than the winterized Icy Tower? And what better game to hack with Cheat Engine? This wintery video tutorial teaches you how to hack Icy Tower with Cheat Engine (06/12/09). This is really about hacking the floors on Icy Tower ...more
In 2007, Nintendo introduced the world to motion control video games with the Wii. Microsoft and Sony built on Nintendo's phenomenal success and released their own motion control products for the XBox 360 and Playstation 3 late in 2010: the Kinect and the Move. The Move is bas ...more
Instead of suffering through long, dull meetings with your supervisors and coworkers, you can turn those office table sessions into your very own psychological experiment. Using the tricks below, you'll be able to hack your verbal responses and physical movements to convince ...more
There comes a time in relationships when two people decide to move in together, and when this happens, you learn two things: Your perfect, wonderful, adorable significant other is a disgusting, messy pig. Your significant other thinks the same about you. So how do you make s ...more
Start with a Sony Handi-Cam (or any other camera that allows you to film using night vision) and then add in a special infrared filter and a little extra hardware. Now you can film completely in infrared and film in X-ray vision!
Castaway is one of the growing family of popular online games available from Armor Games and Kongregate Games. This video will teach you how to use the infamous cheat engine to hack the game, increasing your strength and other statistics using an 8x process. Never languish wit ...more
Android phones may soon be able to send and receive iMessages thanks to a new open-source app called PieMessage. You can check out the work-in-progress app in action in the video below. It was created by iOS/Android app developer Eric Chee, who has the source code for PieMess ...more
We're living in uncertain times. The sudden outbreak of the novel coronavirus and subsequent self-isolation of roughly half the world's population has led to a massive reorganization of the economy, countless layoffs, compromised security networks, and a variety of other signi ...more