Nn32

How To : Create an Undetectable Trojan Using a Domain Name

In this tutorial I am going to show you how to create an undetectable Meterpreter Trojan using a Domain name. I have taken a few guides/tutorials and built it into one. The first part is creating the DNS Payload. The second part is creating the Executable file. Part 3 is using ...more

How To : Hijacking Cookie Sessions

Let's say that we want to see what someone is doing on their computer? In this tutorial, we'll be hijacking cookie sessions to do just that! Step 1: Preparing Kali In order to do this, we need three tools: Ettercap (duh) Hamster Ferret Ferret is a nice little tool that run ...more

How To : Build origami modules for 3D origami

This video demonstrates how to make 3D Origami. If you want to make some 3D origami animals, you need this video as first step. You will need a normal sheet of paper (size A4). One rectangle is a 1/32 of this. The fastest method is to cut them out with a knife. You will use th ...more

Cydia 101 : How to Add Repos to Find More Jailbreak Tweaks

Unlike the iOS App Store, which is a one-stop shop that lets you search for and instantly download apps on your iPhone, jailbreak apps found within Cydia are far more fragmented and not as easy to source. In fact, Cydia only comes stock with a fraction of the apps and tweaks t ...more

How To : 40 Damn Cool Things You Can Do with Eggs

All day I dream of eggs: scrambled, poached, over easy, hard-boiled, fried, baked, raw... Okay, the last one is a joke (unless you're Gaston, which means that you eat five dozen of them and you're roughly the size of a barge). But eggs are freaking good in just about any cooki ...more

How To : Convert Fahrenheit to Celsius with a formula

In order to convert Celsius to Fahrenheit, you will need to use this formula: F = 9/5C + 32. Therefore, you will need to solve for C or substitute values and solve in that manner. To find Fahrenheit temperature for -20 degrees Celsius, you can just plug it into the formula. T ...more

Hack Like a Pro : How to Evade AV Software with Shellter

Welcome back, my tenderfoot hackers! One key area on the minds of all hackers is how to evade security devices such as an intrusion detection system (IDS) or antivirus (AV) software. This is not an issue if you create your own zero-day exploit, or capture someone else's zero- ...more

How To : Score Big with Simple 2-Letter Words in Scrabble

No matter what word game you're playing, whether it's Scrabble or one of its near-homogeneous counterparts like Lexulous, Wordfeud or Words with Friends, one of the easiest ways to stay on top of your opponent is knowing all of the legal two-letter words you can play. You're n ...more

Compared : The 5 Best Reddit Apps for Android

Whether you've celebrated multiple cake days or you're just now getting your feet wet with Reddit, it's a rite of passage to choose your preferred smartphone client. Quick spoiler: Your best option most certainly is not the official Reddit app. Reddit's mobile site is pretty ...more

How To : Build your own ten foot long camera dolly track

Need some smooth pan shots for your indie film? How about a cool dolly zoom effect? Well, you don't need to be a professional filmmaker to use such a device, but you do need the money for the gear. But—if you can work your way around the workshop, you can probably build your o ...more

How To : Make a 3D origami swan from 484 paper triangles

In this Arts & Crafts video tutorial you will learn how to make a 3D origami swan from 484 paper triangles. For this you will have to cut up 16 sheets of paper in to small rectangles. One rectangle is 1/32 of an A4 sheet. Take a small rectangle, fold it in half lengthwise and ...more

How To : Use Common Features of Windows Command Prompt

Every Windows system includes command prompt; and while a lot of people on Null Byte and WonderHowTo in general know how to use it, some people don't know anything about it, even how to access it. Even if you aren't a Windows user, it's good to know how command prompt works b ...more

How To : Make A Fake Computer Error Message

This article will show how to make a simple, fake computer error message. These message boxes are 100% harmless, and make for funny pranks. They will display any text you want them to. Required: - Windows XP/Vista/7 - Notepad Typing in the Code First, open Notepad, and ty ...more

How To : DIY Stick Welder from Old Microwave Parts

Lurking inside your old junk microwave is an abundance of useful parts that can let you melt metal, spot weld, and make electrifying Jacob's ladders. You can even make a powerful AC arc welder, perfect for making hard-to-solve puzzles and even makeshift weapons for the zombie ...more

Writing a Windows 10 Rootkit : Part 1

So this is my methodology for this project of writing a rootkit. Please leave feedback on what is right/wrong. I tried to simplify concepts the best I could however... One needs an deep understanding of how different types of processors work and how memory protection is imple ...more

How To : All the Reasons You Should Root Your Phone

Rooting. As an Android user, I'm sure you've heard the word once or twice. According to Kaspersky, 7.6% of all Android users root — but for the 92.4% who don't, we wanted to talk to you. Rooting allows you to remove barriers and open Android to a level of unprecedented contro ...more

How To : Dance the Achy Breaky Heart line dance

OK, are you looking to jump in your time machine and dance the Achy Breaky Heart line dance. Well, this how to video will prep you for your trip to the past. Get you comfortable shoes, gather up your friends who are eager to dance this country classic, and start heart breaking ...more

How To : Encrypt And Decrypt Text In Python

In this article, I'll show you how to create a simplistic AES python based text encryptor. You'll need python 2.7 and PyCrypto (found here). The code is fairly simple, a user enters an encryption key (which basically tells the program how to scramble the text, using an algorit ...more

How To : Dual Boot Windows 10 & Mac OS X on Your Mac

While Windows 10 is still a few weeks away from a public release, that doesn't mean you can't enjoy its brand new features right now. Anyone with an Insider Preview account can install Windows 10 on their computer. And that doesn't just go for those that own a Windows PC—Mac u ...more

How To : Exploit Development-Everything You Need to Know

Step 1: What Exploit Development Is and Why Should I Be Interested on About This Topic An exploit is a piece of software, a chunk of data, or a sequence of commands that takes advantage of a bug or vulnerability in order to cause unintended or unanticipated behavior to occur ...more

How To : Insert an SD Card into a Samsung Galaxy Y

If you have an older Samsung Galaxy Y smartphone, one thing you should be doing is using an microSD or microSDHC memory card to help improve your Android's processing speed and make it easier to transfer large or small files easily. These cards are also compatible with certain ...more

  • Hot
  • Latest