How To : Fuzz Parameters, Directories & More with Ffuf

The art of fuzzing is a vital skill for any penetration tester or hacker to possess. The faster you fuzz, and the more efficiently you are at doing it, the closer you come to achieving your goal, whether that means finding a valid bug or discovering an initial attack vector. A ...more

How To : Hack Yahoo! Search with advanced search parameters

In this video tutorial, we learn how to use advanced search parameters like "define" and "site" to access hidden functions of the Yahoo! search engine. For more information, including a complete demonstration and detailed, step-by-step instructions, watch this how-to from the ...more

How To : Use Aim parameters in the Cinema 4D Constraint Tag

This clip introduces the Constraint Tag and specifically looks at the use of the Aim parameters. If you make use of the Target Tag in Cinema4D, then watch this tutorial to see how the Constraint Tag could open up a lot of extra possibilities. Whether you're new to MAXON's popu ...more

How To : Model a parametric chair in 3ds Max

In this 3D software tutorial you will learn how to model a chair parametrically in 3ds Max. This tutorial covers making a simple parametric chair with using editable poly modifier and wire parameters in 3D Studio Max. If you are not good at modeling with modifiers in 3ds Max, ...more

How To : Add angle parameters to curtain panels in Revit

This Revit software tutorial covers how to add angle parameters. In this case we put them in a curtain panel to break from such an orthogonal grid. Here they a tilted mullions but one could imagine using a curtain system just and a construction grid then using face based famil ...more

How To : Use parameter queries in Microsoft Access

The Microsoft Office Access 2007 relational database manager enables information workers to quickly track and report information with ease thanks to its interactive design capabilities that do not require deep database knowledge. In this Microsoft Access video tutorial, you'll ...more

How To : Parametrize a surface with two parameters

From Ramanujan to calculus co-creator Gottfried Leibniz, many of the world's best and brightest mathematical minds have belonged to autodidacts. And, thanks to the Internet, it's easier than ever to follow in their footsteps (or just study for that next big test). With this in ...more

How To : Create shared parameters in Revit Architecture

This intermediate level CAD software tutorial gets into the basics of creating shared parameters in Revit and how to create schedules to access them. In this Revit tutorial scheduling is meant to be used more as a spreadsheet interface for driving the model and not so much for ...more

How To : Animate parameters in Autodesk Maya 2010

In this clip, you'll learn how to go about automating basic parameters within Autodesk Maya 2010. Whether you're new to Autodesk's popular modeling software or a seasoned 3D artist just looking to better acquaint yourself with the Maya 3D 2010 workflow, you're sure to be well ...more

How To : Animate textures with offset parameters in Blender

Learn how to animate movie strip textures using offset parameters when working within Blender. Whether you're new to the Blender Foundation's popular open-source 3D computer graphics application or are a seasoned digital artist merely on the lookout for new tips and tricks, yo ...more

How To : Use default parameters in Python

Bucky from The New Boston serves up this Python video tutorial on how to use default parameters in Python. This is the program you use to write all of your Python code down. Fun with default parameters! Python is a dynamic, object-oriented, high-level, programming language th ...more

How To : Search in Twitter Using Parameters Without Log In

This video will show you how to search Twitter by parameters without sign up or log in. Here a person can use search parameters to find the desire twits. So there is no headache for signing up or logged in for searching. So please Watch the video and follow all the steps to do ...more

How To : Program parameters in Python

Bucky from The New Boston serves up this Python video tutorial on how to program parameters in Python. This is the program you use to write all of your Python code down. Different parameter types in the same function! Python is a dynamic, object-oriented, high-level, programm ...more

How To : Use tuples as parameters in Python

Bucky from The New Boston serves up this Python video tutorial on how to use tuples as parameters in Python. This is the program you use to write all of your Python code down. Fun with tuples! Python is a dynamic, object-oriented, high-level, programming language that can be ...more

How To : Search in Twitter Using Parameters Without Sign Up

This video will show you how to search on twitter using parameters without Signup. You don't need to be sign up for twitter search. Anyone could use this twitter search feature and utilize parameter. Watch the video and follow all the steps carefully. Video: .

How To : Reorder Profiles & Reset Matches in Tinder

The modern age of techno-dating has made an interesting landscape for social interactions when there is some modicum of romance (or lust). For those of us born before the internet evolved into the prolific monster it has become, we first met our love interests face to face. To ...more

How To : SQL Injection Finding Vulnerable Websites..

Welcome Back !! TheGeeks. SQL Injection (SQLI) Part-1 I hope you all enjoyed my previous article on Email spoofing, if not you'll can go to my profile and check it. My this article totally different from previous one. In this article i'll be teaching how to find vulnerable ...more

News : 44 Cool New Features & Changes in Android 9.0 Pie

Even though most phones don't have Oreo yet, Google has released Android 9.0 Pie. It's available on Google's own Pixel devices, and updates should soon be available to partnered devices from Essential, Nokia, Oppo, Sony, Vivo, and Xiaomi. We're already digging into it to highl ...more

How To : Fully Anonymize Kali with Tor, Whonix & PIA VPN

Hacking from a host machine without any form of proxying is reckless for a hacker, and in a penetration test, could lead to an important IP address becoming quickly blacklisted by the target. By routing all traffic over Tor and reducing the threat of malicious entrance and exi ...more

Hack Like a Pro : How to Hack the Shellshock Vulnerability

Welcome back, my hacker novitiates! Every so often, a MAJOR vulnerability appears that makes millions of systems vulnerable to attack. The most recent, named Shellshock, basically leaves every Mac OS X, Linux, and UNIX system on the planet vulnerable. As nearly two-thirds of ...more

How To : Use SQL Injection to Run OS Commands & Get a Shell

One of the ultimate goals in hacking is the ability to obtain shells in order to run system commands and own a target or network. SQL injection is typically only associated with databases and their data, but it can actually be used as a vector to gain a command shell. As a les ...more

How To : Exploit PHP File Inclusion in Web Apps

File inclusion can allow an attacker to view files on a remote host they shouldn't be able to see, and it can even allow the attacker to run code on a target. To demonstrate these vulnerabilities, we'll be practicing PHP file inclusion using the Damn Vulnerable Web App. We'll ...more

How To : Nab Free eBooks Using Google

eBooks are an amazing thing, especially with Amazon's Kindle. What's irrtating about eBooks as that you have an infinite selection of books at your fingertips, but they all cost so much! Well, as always, Null Byte has a trick up our sleeves for nabbing free ebooks from Google. ...more

How To : Exploit Remote File Inclusion to Get a Shell

A simple security flaw can allow an attacker to gain a strong foothold with little effort on their part. When a web application permits remotely hosted files to be loaded without any validation, a whole can of worms is opened up, with consequences ranging from simple website d ...more

How To : Break into Router Gateways with Patator

Router gateways are responsible for protecting every aspect of a network's configuration. With unfettered access to these privileged configurations, an attacker on a compromised Wi-Fi network can perform a wide variety of advanced attacks. Brute-Forcing Router Logins with Pat ...more

How To : Take Control of the Mouse & Keyboard in Python

While hackers adore the command line, working with the GUI (graphical user interface) of an operating system has some advantages. This is especially true when it comes to post-exploitation. When we can control the mouse and keyboard of a remote computer, we can truly say we ha ...more

News : Apple Releases iOS 14 Public Beta 8 for iPhone

Apple just released the eighth public beta for iOS 14 today, Wednesday, Sept. 9. At this time, beta 8 (18A5373a) seems to be a minor update to iOS 14, introducing bug fixes to improve the software's overall stability. So far, there haven't been many new user-facing features o ...more

Prev Page
  • Hot
  • Latest