What to Make Out of Cd

Mac for Hackers : How to Install the Metasploit Framework

Metasploit is an extremely popular pentesting tool capable of enumeration, exploitation, and injecting shell code, and is a part of almost every hacking toolkit. So there's no way I could leave this out of our series on getting your Mac set up for hacking. Luckily for those o ...more

How To : Hack Administrator BIOS Password on ASUS Notebooks

So i ran into a problem few days ago and it seemed to be very annoying one. I got hands on ASUS X55A with broken HDD. So i changed HDD and woo enter bios password. I hit enter and got into bios where uder security tab was shining ADMINISTRATOR PASSWORD INSTALLED. There was no ...more

How To : iDevice Jailbroken = Your New PenTesting Tool.

What if someone asks you to do a Nmap scan but you left your pc at home? What if a golden opportunity shows during a pentest but you were walking around the building, taking a break? But leaving your phone at home or in the office when you go out is absurd, I mean, everyone b ...more

How To : Exploit Routers on an Unrooted Android Phone

RouterSploit is a powerful exploit framework similar to Metasploit, working to quickly identify and exploit common vulnerabilities in routers. And guess what. It can be run on most Android devices. I initially covered RouterSploit on Kali Linux and macOS (OS X), but this tuto ...more

How To : Hook Web Browsers with MITMf and BeEF

Do you remember the last time we used BeEF? Well, now we get to use it again, but this time with MITMf! We are going to auto-inject the hooking script into every webpage the victim visits! Requirements If you don't already have it, install MITMf via apt-get install mitmf. Yo ...more

How To : Gain Control of WordPress by Exploiting XML-RPC

WordPress did not become what is arguably the most popular blogging and CMS platform on the planet because it was difficult to use. Rather, its user-friendly and rich feature set led to it finding a home on somewhere north of 70 million websites—and that's just counting blogs ...more

How To : Remove scratches on an LCD or CD with an egg

Make the magic remover cloth shown in this how-to video which will remove all the scratches on your favorite CDs, your LCD display or just remove some scratches on plastic. You'll need egg whites of and a microfiber cloth. Don't throw away anymore CDs, DVDs, or lose important ...more

How To : Install a game downloaded by torrent file

This is a video tutorial that is teaching its audience how to install a game that has been downloaded from a torrent file. The first thing that you do is open the file containing a folder. Right click on the file to do this. The next thing that you do is to make a new folder a ...more

How To : Hack Flash Games

This is a tutorial showing you how to easily hack flash (.swf) games! You only need two things: A flash game (in .swf format) and Flasm (an amazing flash disassembler). Getting Flasm Download Flasm Flasm can be downloaded from the no|wrap.de website. Save & Extract Save ...more

How To : The Free Way to Save iPhone Voicemails on Your Mac

Voicemails are like chores for me. I have to listen to them, but never really feel like doing it. When I finally do, most of them get deleted right away, but every so often they'll be one I save and listen to over and over again, whether it's a cute birthday wish from grandma ...more

How To : Build a CNC machine using two old CD drives

Take a look at this instructional vidkeo and learn how to make your own computer numerical control (CNC) machine out of two old CD drives. CNC machines serve as controllers for a number of devices such as machine tools by reading G Code instructions. With a own CNC machine, yo ...more

How To : Install ISO game files with the use of Daemon Tools

In this video, the poster is teaching YouTube users how to use Daemon Tools mount games image files. That’s very useful to many people that cannot burn ISOS or any other image files into a blank media (CD, DVD). With the tips provided by this video, anyone can use Daemon Tools ...more

How To : Make a metal detector from a calculator and radio

Like looking for lost treasure? There's no need to break the bank for a high-end metal detector — just dig through your junk drawer! In this video tutorial, KipKay shows you how to make a metal detector from a calculator, an AM or FM radio, a standard CD case, and some velcro. ...more

How To : Use Cygwin to Run Linux Apps on Windows

You'll see a lot of Linux action going down here at Null Byte. We use Linux for hacking-related stuff because it provides a more relaxed programming environment, making it easy to write exploits and tools. Linux has many features Windows is lacking, such as full control over t ...more

How To : Recover WinRAR and Zip Passwords

Archiving and compression is a great way to store and prepare files for sending. You can reduce the size of a file, turn a group of files into a single file, and even encrypt and password the contents! Just take a look at this image to see how much it compressed a 28GB text fi ...more

How To : Reformat your computer step by step

This video tutorial belongs to the Computers & Programming category which is going to show you how to reformat your computer step by step. Go to BIOS by restarting your computer. Go to BOOT menu, select CD/DVD ROM and press f10 to save and exit. Now insert your operating syste ...more

How To : Understand the Process of Inflammation

In each day of our life, we see inflammation. We see it during sore throats and abscess formations in our bodies, and even slight tooth pain is a form of inflammation. Sometimes it's good when it fights to protect us from invading organisms, but sometimes it becomes bad when i ...more

Hack Like a Pro : How to Evade AV Software with Shellter

Welcome back, my tenderfoot hackers! One key area on the minds of all hackers is how to evade security devices such as an intrusion detection system (IDS) or antivirus (AV) software. This is not an issue if you create your own zero-day exploit, or capture someone else's zero- ...more

How To : Slip a Backdoor into PHP Websites with Weevely

Backdoors are convenient to leave behind once you've already found a way into a server, and they can come in handy for a variety of reasons. They're good for developers who want a quick way into machines they're working on, or for systems administrators who want similar access ...more

How To : Remove All Bloatware on Your Galaxy Note 9

Although the Galaxy Note 9 is an amazing phone, many members of the Android community won't even look at it. This isn't just because of the Samsung Experience skin, but the large amount of bloatware that comes with this device. However, with a little work, you can remove all o ...more

How To : Use UFONet

With the release of the Mirai source code, botnets are back in a big way. In the early days of botnets, zombies (infected hosts) would report to IRC (Internet Relay Chat) channels for CNC (command and control) instructions. Modern botnets have evolved, but they continue to use ...more

  • Hot
  • Latest