Make a Fake Time Machine

News : Jackass 3D Prank Contest Winner Prank

Pick a winner from the mass amounts of contestants. When their flight gets there, have a limo (a real shitty one) pick them up to charter them to a desired location. On the way the Limo driver gets pulled over (fake cop of course) and the Limo driver goes to jail for warrants. ...more

News : Ultimate prank montage!!!

What we do is have a full day of pranks (24 Hours Mother Fucka!!!) in the time span of a few minutes. We do an assload of pranks. Weeman as an umpa loompa with party boy doing a wake up call for the cast. We dump fake snakes on bam. We do a Hair razor attack on tremaine. Stick ...more

News : shower fun time

so victim gets in the shower. person locks/blocks them in the shower. victim does not know they are locked in. let victim get all wet and fill the shower up with a bit of water. (before victim gets in shower) hook up a stun gun, or some other low voltage torture machine to the ...more

News : fake bed prank!!

fake bed prank .the fake bed prank is prety much a funny idea of a box filled with pie or puddingng maybe even poop if you desire.and covered with a cmferter or any bed covering and pillows possableythe prank is having a sucker jump or lie down on the bed look-a-like and sloos ...more

News : 2 different pranks (one cheap and one expensive)

Hey there guys, my name is Nicklas and I am 19 years old. I live in the cold country of sweden. I've been following your hilarious stunts from the begining and I laugh every time I see you do something stupid. So to the contest then I have 2 different pranks for you, one that ...more

News : Screw over the Local Supermarket

There's two senile senior citizens disguised from Steve-O and Johnny Knoxville who claims they have "gotten sick of hospital food", and decided to rob a local supermarket. One guy is wearing his sports shorts, walking with a walking stick, and with parts of his genitals exposi ...more

News : Fake death on my family

Ok, I dont care what prank we pull on my family. If they think I'm dead for a day or two, I think that would be great! My original idea for this I think was going too far or actually would have taken too much time and probably would have cost too much money. Hopefully this wou ...more

News : Faked Death

The Way I Did The Prank I prank my family every October and the best prank I ever pulled on them was 6 years ago. At that time I worked on campus at UCCS and I had their Public Safety call my dad. They said, "Are you Mr. _____?" x "Is your daughter Laura _____?" x "Well sir, ...more

How To : The Ultimate Guide to Hacking macOS

Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more

Mac for Hackers : How to Install the Metasploit Framework

Metasploit is an extremely popular pentesting tool capable of enumeration, exploitation, and injecting shell code, and is a part of almost every hacking toolkit. So there's no way I could leave this out of our series on getting your Mac set up for hacking. Luckily for those o ...more

Waymo Was Right : Why Every Car Maker Should Skip Level 3

Most carmakers now agree with Waymo that piloting driverless cars is best left to the machine — with no meddling from the human. In Waymo's case, this assumption dates back years ago. More recently in 2014, Google's driverless arm (before it became Waymo) shocked Detroit when ...more

News : Google Pixel 4 Hands-on Review & Spec Analysis

It's always a big deal when the company that makes Android releases a new phone. Google's Pixel series has made a name for itself in three short years behind its camera prowess, but now it's time to start competing with the major players. That said, Google should like how thei ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

How To : 10 Clever Ways to Cook Out Without a Grill

Whether it's the start, middle, or end of summer, it's prime-time grilling season. If you find yourself without a grill, however, it may seem as if half your summer plans of swimming by the pool while stuffing hot dogs in your face could be ruined. But have no fear as all is ...more

News : 44 Cool New Features & Changes in Android 9.0 Pie

Even though most phones don't have Oreo yet, Google has released Android 9.0 Pie. It's available on Google's own Pixel devices, and updates should soon be available to partnered devices from Essential, Nokia, Oppo, Sony, Vivo, and Xiaomi. We're already digging into it to highl ...more

How To : Hide a Virus Inside of a Fake Picture

In my last tutorial, I talked about creating a virus inside of a Word Document in the scenario of a mass-mailer attack. In this post, however, I'm going to be covering creating a fake image or screenshot with a meterpreter backdoor hidden inside to be used in a similar scenari ...more

How To : Encrypt & Hide Files, Photos, & Videos on Android

If you have some photos, videos, and documents that you want to keep completely hidden and encrypted on your Android device, Andrognito is the app you need. We showcased this app in the past, but since then, CODEX has rebuilt it from the ground up with new and improved feature ...more

How To : Backdooring on the Fly with MITMf

Do you remember my last article on how to hook any web browser with MITMf and BeEF? Well, we are using the tool once again, but this time for auto-backdooring.... How It Works MITMf (if you don't already know) is a man in the middle attack framwork. MITMf literally stands fo ...more

How To : Get Started with Kali Linux in 2020

Kali Linux has come a long way since its BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation since its old days and includes an updated look, improved performance, and some ...more

News : Your Apple Watch Is a Secret Social Media Machine

When you think about your Apple Watch, what comes to mind? Fitness tracking? Replying to texts? There are a lot of things Apple Watch is good for, but social media doesn't appear to be one of them based on the App Store. If that's your perception, however, it's time for a real ...more

  • Hot
  • Latest