Unsigned Code

News : Jailbreak your PS3!

This might be so '2 weeks ago' but I've been away, oh well. In a few short words: The PS3 has finally been hacked via a USB device! Sure it can be possibly used for piracy, but let's not go into that topic. Instead read this nice intro into what an open PS3 can do for you (v ...more

How To : Tell if your copy of GTA is patched or unpatched

Older, unpatched, versions of Grand Theft Auto: Liberty City stories for the PSP have a vulnerability in their firmware that allows you to run unsigned code and applications on your PSP. Here's how to tell if you copy of GTA is patched or unpatched.

How To : Create a Pandora battery with a fat PSP

In this video tutorial, viewers learn how to create a Pandora battery for the fat PSP. A Pandora battery allows the user the process of using exploits and hacks to execute unsigned code on the PSP. Before beginning, users are advised to completely drain the battery. Begin by t ...more

How To : Simulate a RAT on Your Network with ShinoBOT

A remote administration tool, or RAT, is a piece of software used for remotely controlling machines. They are commonly used by tech support to gain remote access for troubleshooting purposes, but RATs are also an important part of a hacker's advanced persistent threat (APT) to ...more

How To : Sell your music on iTunes

With the growing popularity of digital downloads, it's important for aspiring musicians to have some sort of download available of their music. If you're an unsigned musician, selling your music on iTunes might seem daunting, but it's actually very easy! Learn how to do it in ...more

Hacking macOS : How to Create an Undetectable Payload

Encrypting payloads and encoding stagers are more effective against macOS than one might think. Plus, it's very easy to evade VirusTotal and macOS antivirus software using a few simple tricks. The goal of this project was to locate a known and easily detectable macOS payload, ...more

How To : The Ultimate Guide to Hacking macOS

Apple's macOS operating system is just as vulnerable to attacks as any Windows 10 computer or Android smartphone. Hacker's can embed backdoors, evade antivirus with simple commands, and utilize USB flash drives to completely compromise a MacBook. In this always-updated guide, ...more

Next Page
Prev Page
  • Hot
  • Latest