Paulant Films has some great information on how to download and rip Xbox 360 games. In these four video tutorials, you'll learn how to hotswap, stealth patch, and burn Xbox 360 games. In the first video, watch to see how to hot swap or copy Xbox 360 games to ISO format using ...more
As we're all aware, recon is vital to a successful hack. We need to know everything we can about the target in order to perform the best possible attack. Port scanning is a basic recon concept that is introduced very early in learning proper reconnoissance. The issue with port ...more
If you have a hacked XBox 360, you've only accomplished part of the process required to allow you to played burned copies of games on your console. You also have to burn the games correctly, and part of doing that is stealth patching you ISO files to make sure that they are up ...more
MAKE and Kipkay brings the do-it-yourself mindset to all the technology in your life. Make Magazine celebrates your right to tweak, hack, and bend any technology to your own will. In this video tutorial episode of Weekend Projects with Kipkay, you'll learn how to build a pair ...more
Chinese Stealth Armor is a rare armor in Fallout New Vegas that will make you nearly invisible to enemies (although not fully, as in Fallout 3). If you steal or sneak a lot (who doesn't?) watch this video for a guide to acquiring two suits of Chinese Stealth Armor. From the C ...more
When it comes to planes, is there really anything cooler than a surreptitious stealth fighter? We think not. Faster than the speed of, well, just about everything, streamlined, and oh so sleek, stealth fighters elicit involuntary drooling from guys everywhere. While most of u ...more
You can hack you XBox 360 as perfectly as you please, but if you don't burn the games that you want to play on it properly than it will all be for naught. This video will teach you an important part of the process, using AGBX360 and S360X to stealth patch your .iso game files ...more
An easy step by step video instruction on how to fold a really cool looking and flyable model of the "Nighthawk" Stealth fighter.
This is a tutorial how to make a Stealth Fighter paper airplane. Check it out, guys :D Hope you like it Video: .
Need to back up all those XBox 360 games you've "purchased?" Hey, we're not gonna judge! Whatever your intentions, learn how to burn your precious games with Stealth Patch in this instructional video. Don't worry - your secret is safe with us. What You Will Need: +R Dual Layer ...more
Privacy features have become quite the hot commodity, emerging from the aftermath of the NSA scandals that rocked the United States this past year. While the NSA has the means to gather information on all of us (regardless of any security software we implement), it doesn't mea ...more
The team behind the Pwn Plug, a little white box that can plug into any network and access it remotely, is at it again. This time, Pwnie Express is working for DARPA to create a hacking machine that looks like a power strip, cleverly called the Power Pwn. The device has wirele ...more
In this video, you will learn how to make origami stealth fighter. This origami model simulates a stealth aircraft. This model is designed by Thay Yang What you need: Paper size 8.5''x11'' and a ruler. Video: .
Face it, playing Call of Duty: Modern Warfare 2 is no easy task, especially of you're starting off. This game relies on skill, luck, and a steady hand. So if you're looking to gain the upper hand on some poor noob, why not try to be stealthy? With the ability to customize clas ...more
Learn how to make paper origami stealth fighter Instructions. What do you need: square sheet of paper Duration: 8 minutes Difficulty: Easy Made by Ventsislav Vasilev Design by Robert J. Lang Video: .
In the world of Minecraft, style counts for a lot. Why get around by resource-expensive ladders when a water ladder will get you there just as easily? This gamer's guide presents a complete walkthrough of how to build both standard and stealth (i.e., invisible) water ladders. ...more
Apple often cites its tight integration of hardware and software for its success. Startup Illumix is looking to do the same thing for AR gaming by building an AR platform for its apps. Emerging from stealth mode on Tuesday, Illumix has closed a seed funding round of $8.6 mill ...more
The augmented reality space is no longer about if but when every company and creator will use some kind of immersive device and software to produce and distribute 3D content. Now, a surprise new contender has entered the AR arena and it's called Campire. • Don't Miss: Lookin ...more
Check out this instructional wind surfing video that demonstrates how to rig a stealth sail on a wind surfing board. This is a great video for beginners learning to wind surf and need to set up their own wind surfing board. Now rig up, get on the water, and enjoy wind surfing ...more
Before attacking any website, a hacker or penetration tester will first compile a list of target surfaces. After they've used some good recon and found the right places to point their scope at, they'll use a web server scanning tool such as Nikto for hunting down vulnerabiliti ...more
Here is the final part in Null Byte's series on mastering the skills in The Elder Scrolls V: Skyrim. We have already covered the slick and brutal methods to raise our Spellcasting and Combative skills. Skyrim's intelligent new leveling system has trumped the former methods of ...more
Hey, hackers! Now that you've hacked/owned your first "box" in my last article, let's look a little closer at another great feature of Metasploit, the Meterpreter, and then let’s move on to hacking a Linux system and using the Meterpreter to control and own it. Why Meterprete ...more
For over 20 years, a tiny but mighty tool has been used by hackers for a wide range of activities. Although well known in hacking circles, Netcat is virtually unknown outside. It's so simple, powerful, and useful that many people within the IT community refer to it as the "Swi ...more
Smartphone users often wish for a privacy, where no one is able to poke his/her nose in their personal stuff. Unfortunately, none of the smartphones have been able to guard their privacy in this fashion. Smartphones usually come up with none or almost negligible built-in secur ...more
It's easier than you might think to hack into Wi-Fi routers using just one unrooted Android phone. This method doesn't require brute-forcing the password, a Windows OS for converting PowerShell scripts into EXE format, a reliable VPS for intercepting hacked Wi-Fi passwords, or ...more
If you need to hack an Android device, try a remote administration tool. Known more familiarly as a RAT, there are open-source RATs that are barebones and exorbitantly priced RATs that are more polished. There are also low-cost and polished RATs that aren't intended to be RATs ...more
Look, tests are no fun, and doing poorly on them is rarely an option. Whether you're studious or a slacker, everyone needs a little boost now and again. While students have found ways to cheat as long as tests have existed, the invention of smartphones has greatly enhanced the ...more
Welcome back, my nascent Hackers! In my last blog, we looked at a passive way to gather information necessary for a hack. The advantage of using passive recon is that it's totally undetectable, meaning that the target never knows you're scouting them and you leave no tracks. ...more
Say you're on a train to work, but you forgot your headphones. You'd normally listen to music to pass the time, but given the circumstances, your choices are to sit silently like a considerate adult, or to blare songs out of your phone's main speaker like a jerk. Thankfully, t ...more
The Watch Dogs video game series came out in 2014, enamoring audiences with the idea of a seemingly magical smartphone that could change traffic signals, hack web cameras, and even remotely control forklifts. This may sound like science fiction, but The Sonic uses a customized ...more
No need to figure out the 20th puzzle, entitled "The Origin of the Species", in Assassin's Creed 2. Here's the answers! Puzzle wheel: Start by turning the fifth ring right ten times, then turn the fourth ring left twice. Then rotate the third (and first) rings right twice, the ...more
Sometimes, the volume buttons on a MacBook can be pretty annoying. It's too loud, so you turn it down one notch, and now you can't hear your movie at all. It's too low, so you turn it up one notch, and now you can't even hear yourself think. But, there's something a lot of Ma ...more
The USB Rubber Ducky is a famous attack tool that looks like a USB flash drive but acts like a keyboard when plugged into any unlocked device. The Ducky Script language used to control it is simple and powerful, and it works with Arduino and can run on boards like the ultra-ch ...more
With all of the bare-bones setup out of the way in our Mac for Hackers series, your Apple machine should be ready to run a significant amount of pentesting tools. We can pull tools from GitHub and compile them, we can pull dependencies or tools from Homebrew, we have both Pyth ...more
One of the best ways to improve your skills as a hacker is to learn to combine different avenues of attack to achieve success. What if it were possible to get a victim to connect to our machine and execute a chosen payload on our behalf? This is indeed possible with the almigh ...more
Spam calls are one of the most annoying things to happen in the world of smartphones for more than one reason. Not only are they bothersome, but they can also be dangerous to people who don't know any better. Google has come up with a crafty solution known as "Call Screen" to ...more
The 18th puzzle is called "Synapses". See how to solve it in Assassin's Creed 2. Code wheel puzzle: Your first clue is to line up 5 with a single tree-looking symbol. The key here is the weird-looking equation on the left, which offers a hint as to the progression of the symbo ...more
I recently posted a Tutorial about setting up Dendroid: http://null-byte.wonderhowto.com/how-to/setup-dendroid-android-rat-0167299/. I have worked the last 5 days on getting the Dendroid Binder, given with the Dendroid Source, working. This solution only works on Windows syste ...more
Gamers who have their Xbox 360's firmware flashed may have recently noticed an inability to play backups, or even make backups of newer games that have come out: Gears of War 3 and Dead Island, to name a few. This is because Microsoft has come out with a new disc format to fi ...more
First of all, before we start, the modules and some of the tutorials belongs to Und3rf10w, not mine! Original stuff from him is here: https://github.com/Und3rf10w/kali-anonsurf Hello everyone! Today I'm going to show you how to install ParrotSec Sealth and Anonsurf modules fo ...more
Bavarian Soundwerks teaches you how to install a BSW ib108 stealth subwoofer system for BMW 3 Series, M3 Convertible 93-99 (E36). Part 1 of 5 - How to Install a subwoofer into a BMW 3 series (E36). Part 2 of 5 - How to Install a subwoofer into a BMW 3 series (E36). Part 3 of ...more
Get all of the info on the 15th puzzle, entitled "Guardians", in Assassin's Creed 2. Puzzle wheel: Seemingly every other ring is linked here, so we’ll cut straight to the chase: Turn the third (and fourth) rings right twice, the fifth (and first) right four times, the fourth ( ...more
Some people are of extremely secretive nature. They do not like sharing their personal events in their lives with anyone. Thus people around that person wont be able to figure out details on their life's personal matters. It is not like they want to hide some mysterious secret ...more
Alcohol is a marvelous thing. It might even be responsible for saving civilization. And we're always fans of hacking our booze intake, whether it's learning how to drink all night long without getting drunk or how to discreetly get your drink on without anyone knowing. Now, i ...more
This video origami tutorial shows how to fold and craft a JKF-117A Nighthawk paper airplane. Never throw a boring paper airplane again. Learn to fold the JKF-117A Nighthawk paper airplane, a look alike of the F-117 Nighthawk Stealth fighter by watching this instructional video.
See how to make a simple laser communicator with KipKay and MAKE Magazine! Find out how to secretly shoot your voice across the room in stealth mode on the beam of a laser! Kipkay loves his lasers! A simple laser communication device is the perfect way to talk across the room.
Figure out the 10th puzzle, Apollo, in Assassin's Creed 2. Image 1: Highlight the lunar lander just down and to the left of the moon. Puzzle wheel: Another linked-ring rotation puzzle. Your job here is to align all the channels; do this by moving the fifth ring to the left six ...more
Canvas fingerprinting is the web's trickiest privacy threat, but it's not impossible to stop. With all the media attention it's gotten lately, it's time we lay out exactly how to detect and prevent this invasive tracking technique. What Is Canvas Fingerprinting & Who Uses It? ...more
See the key to the sixth puzzle "Brothers" in Assassin's Creed 2. This is where things start to get tricky; while the first batch of ring puzzles were simple, these link some of their rings together, so that you can’t move one without moving another. For more info, watch the w ...more
This is the 12th puzzle, entitled "Titans of Industry", in Assassin's Creed 2. Code wheel puzzle 1: The key here is in the “4=1” on the blueprint at the left of the screen. Line up the red 4 over the gray 1 and input the following code: 917240. Image 1: This one’s the opposite ...more
Figure out the 17th puzzle, entitled "The Bunker", in Assassin's Creed 2. Code wheel puzzle: Here’s a tricky one; your clues are “<” and “2,” and the only advice you’ll get from your handlers is that maybe there’s “something we can count” on the strange symbols. In this case t ...more
Gamers who have their Xbox 360's firmware flashed may have recently noticed an inability to play backups, or even make backups of newer games that have come out, such as Gears of War 3 and Dead Island, to name a few. This is because Microsoft has come out with a new disc form ...more
Introduction Halo: Reach is Bungie's latest and final addition to the franchise. Microsoft has claimed the title and from now on 343 Industries will be working on the Halo franchise. In my opinion, Bungie's last game is the best out of all of them. These are some tactics and ...more
Most employed in the game industry have two-word job titles that start with “game”—game designer, game producer, game critic, game tester, etc. Usually, they’re one or the other, even though some can be both a game designer and a game tester or game critic and game tester. And ...more
Secretly shoot your voice across the room in stealth mode on a laser beam in this fun and easy project! Make Magazine and Kipkay present this cool spy trick. Build a simple laser communicator that transmits your voice across a room. You need an amplifier, radio, laser pointer, ...more
Learn how to fold the JKF-117A Nighthawk from Fighter Plane Origami. It's a look alike of the F-117 Nighthawk Stealth Fighter plane. Materials:- An A4 size paper (best with paper type of 140gsm) amd a pair of scissors.
With the release of the Pixel 2 XL and the iPhone X, smartphones have hit a new high not just in price, but also raw processing power. These new flagships not only cost more than twice as much as an Xbox One or PlayStation 4, they have also become almost as powerful as far as ...more
Welcome back, my budding hackers! As I have mentioned many times throughout this series, knowing a bit of digital forensics might keep you out of a lot of trouble. In addition, digital forensics is a burgeoning and high paying career. Some knowledge and certifications in this ...more