Header Banner
wonderhowto.mark.png
Gadget Hacks Next Reality Food Hacks Null Byte The Secret Yumiverse Invisiverse Macgyverisms Mind Hacks Mad Science Lock Picking Driverless
Xposed Modules
Android mascot with ARMv7 processor type graphic.
HOW TO
05/09/2024 5:12 pm

Android Basics: How to See What Kind of Processor You Have (ARM, ARM64, or x86)

Starting with the release of Android Lollipop, the process of installing the Xposed Framework got a bit more complicated. Not only are there separate installers for each Android version, but now, you also need to know exactly what type of processor is in your device to make sure you're downloading t ...more

Raspberry Pi network scanning tool output displayed in terminal.
HOW TO
09/11/2023 5:33 pm

Discover & Attack Raspberry Pis Using Default Credentials with Rpi-hunter

When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default password, leaving the device vulnerable to remote access. Using a tool called rpi-hunter, hackers can ...more

Weather app showing precipitation data for June 8, 2022. Total rainfall: 0.05 inches.
HOW TO
11/05/2022 2:21 am

Your iPhone's Weather App Just Got 14 Major New Features

Your iPhone's Weather app received its biggest update yet. Apple finally incorporated its Dark Sky purchase into Apple Weather, so you'll see more information for each location's forecast. Plus, there are a few surprises to be excited about, such as the ability to add more trackable cities. This sig ...more

iOS 16.0 is up to date screen
HOW TO
09/15/2022 10:48 pm

All 350+ New iOS 16 Features for Your iPhone

Apple's new iOS 16 software update is finally here, and there are over 350 new features and changes for you to enjoy on your iPhone. There are major lock screen and home screen improvements, a pleasant surprise for the Contacts app, and tons of new upgrades to Safari, Mail, Messages, and more. There ...more

Xerodeploit logo in stylized text.
HOW TO
06/08/2021 4:44 pm

Perform Advanced Man-in-the-Middle Attacks with Xerosploit

A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain things. Bettercap is one tool that can be used for these types of MitM attacks, but Xerosploit can ...more

Smartphone displaying colorful circular graphics against a wooden background.
HOW TO
05/24/2021 8:30 pm

How to Remove the Calendar & Weather Widget from Your Pixel's Home Screen

Google's "At A Glance" widget gives you the current weather conditions and upcoming events from your Google Calendar in a handy spot right at the top of your home screen. But on Pixel phones, this widget is permanently embedded into the launcher, so you can't just long-press it to remove it. In fact ...more

635588247446706542.jpg
HOW TO
04/14/2021 7:32 pm

How to Get Spotify Premium Features on Android Without Paying a Dime

When you think of an online music service nowadays, Spotify is probably near the first that come to mind, and for good reason. Being able to create, share, and take all of your playlists anywhere, across all of your devices, is something that I couldn't live without. Unfortunately, nothing this good ...more

Game interface showing a Pokémon catching prompt on a mobile device with a scenic background.
HOW TO
02/11/2021 4:42 pm

How to Cheat at Pokémon GO Without Getting Banned

Gotta catch 'em all, right? That's easier said than done, considering that Pokémon GO has region-specific characters that you may never get a chance to see. Sure, you can spoof your GPS location to make the augmented reality game think you're at a different spot on the map, but Niantic Labs seems to ...more

Smartphone screen displaying app interface with options for "Magisk" and "Manager."
HOW TO
01/21/2021 9:09 pm

The First 10 Things to Do After Rooting Your Phone

Okay, so you rooted your Android phone .... now what? There are a few ducks you need to get into a row, like backing up your stock boot image, getting SafetyNet sorted, and improving security with biometrics. But there are also awesome root mods waiting for you — just don't get ahead of yourself. No ...more

Smartphone screen displaying app icons.
HOW TO
01/12/2021 11:37 pm

How to Ditch Google's WebView & Switch Android's System Browser to Bromite

Apps don't need to come bundled with an entire browser just to be able to display web pages — instead, they can call on the system WebView browser to render content for them. Android's default WebView renderer is Google software, which isn't quite as privacy-forward as some other options. For instan ...more

Planetary bodies and moons labeled on a black surface.
HOW TO
01/08/2021 11:49 pm

How to Get the Classic Nexus Ringtones & System Sounds on Any Rooted Phone

Google's legendary phone series fittingly ended with the Nexus 6 (P), and all the replicants that have come in its wake failed to unite the geek crowd quite as well. It might seem silly to think back on a smartphone with a sense of nostalgia, but if any Android phone deserves it, it's the Nexus. A M ...more

Command line interface displaying installation instructions with a 'START' prompt.
HOW TO
01/08/2021 8:02 pm

How to Send ADB & Fastboot Commands from One Android Phone to Another

ADB and Fastboot are powerful tools that have always required a computer. But with the right setup, you can now send commands to a phone using another phone. The ADB and Fastboot Magisk module, by osm0sis and Surge1223, will turn your phone into an ADB terminal using root access. You can then connec ...more

EdXposed Installer interface showing successful installation status.
HOW TO
12/30/2020 9:36 pm

How to Install Systemless Xposed on Almost Any Android Phone

Well before Magisk was in our lives, the Xposed framework was where all the mods and magic happened. Magisk was built on a similar concept with the ability to customize your system via modules. We can thank Xposed for where we are today in terms of root-related mods, but it's not done just yet — it' ...more

Smartphone screen showing app icons and Google search bar.
HOW TO
12/18/2020 10:30 pm

How to Hide the Gesture Pill in Android's Navigation Bar

Google switched to gestural navigation in Android 9, and in removing the back/home/recents buttons, they were able to greatly reduce the size of the navigation bar at the bottom of the screen. However, there's still a white line, aka "The Pill," taking up space to show you where to start your gestur ...more

Mobile phone notification screen showing system icons and a message alert.
HOW TO
12/18/2020 9:16 pm

How to Get One UI's Rounded Corners on Non-Samsung Devices

The two primary design paradigms in Samsung's One UI Android skin are vertical padding and rounded UI elements. The extra empty space at the top of most menus moves touchable elements closer to your thumb, and the rounded UI elements match the curved corners of modern smartphone screens. While you c ...more

Mobile device displaying text about San Francisco.
HOW TO
12/09/2020 10:23 pm

How to Get the iPhone's System Font on Android

For the first time in twenty years, Apple created its own custom font in late 2014. Dubbed "San Francisco," it combined elements from Helvetica and FF DIN to create a crisp, elegant, and highly legible font that is now used in iOS, macOS, and tvOS. With an open source Magisk module from developer No ...more

Gadget Hacks website displayed on a smartphone screen.
HOW TO
11/25/2020 6:05 pm

How to Shrink the Pixel 5's Giant Status Bar Down to a Normal Size

The Pixel 5 is the first mainstream phone with perfectly symmetrical slim bezels. Most other "bezel-less" phones have had a disproportionately large bottom bezel, and while the iPhone's side and bottom bezels are symmetrical, there's a huge notch across most of its top bezel. The downside to the Pix ...more

Code output displaying Bitcoin addresses and balances.
HOW TO
11/24/2020 12:45 am

Extract Bitcoin Wallet Addresses & Balances from Websites with SpiderFoot CLI

While there are completely legitimate reasons to use Bitcoin, it's also used by terrorists, drug dealers, and other shady people that need to be investigated. That's where SpiderFoot comes in, which has a command-line interface to search for Bitcoin wallet addresses on a website and query the balanc ...more

Definition of Android and App from a glossary or dictionary.
NEWS
11/12/2020 10:41 pm

The Big Android Dictionary: A Glossary of Terms You Should Know

Android comprises an entire ecosystem of apps, games, functions, and features, so it would only make sense that it has its own lexicon. Words, phrases, and acronyms that didn't exist ten years ago are now used in an off-the-cuff style by developers and support technicians across the web. As the plat ...more

IR Modules Tutorial - Learn to Make Your Own DIY IR Modules
FORUM
11/09/2020 10:47 am

DIY - IR Module

DIY - IR Module A sensor is a device that detects and responds to inputs from the physical environment. The input can be light, heat, motion, moisture, pressure, or any other environmental phenomena. Sensors are very important part of electronics, especially in Robotics and Automations. The output g ...more

Smartphone displaying a command-line interface with a list of processing tasks.
HOW TO
11/02/2020 10:13 pm

How to Root Android 11 on the Pixel 4a — Every Step Covered in Detail

If you live in the US, it's pretty simple: The Google Pixel 4a is the best phone for rooting and modding in 2020. Its price keeps the risk-reward ratio nice and low, and its unlockable bootloader makes it easy to modify virtually any aspect of Android. But recent updates to Android's security system ...more

Network testing equipment connected to a data switch.
HOW TO
10/21/2020 11:35 pm

Use Banner Grabbing to Aid in Reconnaissance

As we've seen with other tools and utilities, administrators typically use certain things to do their job more efficiently, and those things are often abused by attackers for exploitation. After all, hacking is just the process of getting a computer to do things in unexpected ways. Today, we will be ...more

FORUM
10/14/2020 4:56 am

VirtualXposed

VirtualXposed helps non-root Android users to modify their Android smartphones using Xposed modules. Technically, Xposed modules require root access and a module can be described as a small installable Android modification that can modify Android OS or Android apps. For example, you can use the Sams ...more

Close-up of a finger pointing at a data table on a digital screen.
HOW TO
10/08/2020 12:03 am

Brute-Force FTP Credentials & Get Server Access

Hackers often find fascinating files in the most ordinary of places, one of those being FTP servers. Sometimes, luck will prevail, and anonymous logins will be enabled, meaning anyone can just log in. But more often than not, a valid username and password will be required. But there are several meth ...more

Woman with digital data overlay, representing technology and data analysis.
HOW TO
10/07/2020 11:47 pm

Use Gtfo to Search for Abusable Binaries During Post-Exploitation

GTFOBins and LOLBAS are projects with the goal of documenting native binaries that can be abused and exploited by attackers on Unix and Windows systems, respectfully. These binaries are often used for "living off the land" techniques during post-exploitation. In this tutorial, we will be exploring g ...more

Smartphone displaying a user interface with various app icons and settings options.
HOW TO
09/28/2020 8:07 pm

How to Bring Back the 9-Tile Grid in Android 11's Quick Settings

Android 11 has plenty of new features as you'd expect, including a fancy new embedded media player. Rather than a constant notification, your audio controls now get pushed up into the Quick Settings panel when playing music. However, to make way for this new media player functionality, your total nu ...more

Promotional graphic featuring digital artwork with the text "HEY TUE" and instructions in the background.
HOW TO
09/25/2020 12:46 am

10 No-Root Mods for the Galaxy Note 20 That Everyone Should Try

The Snapdragon version of the Galaxy Note 20 and 20 Ultra — the one sold in the US — can't be rooted. Without root, the level of customization is limited. Such a large group of Android users shouldn't miss out on mods, and they don't have to. A number of third-party and Samsung developed apps will h ...more

Business professional adjusting tie in office setting.
HOW TO
09/04/2020 12:00 pm

Become an In-Demand Salesforce Pro with This $25 Bundle

As one of the world's largest and most powerful cloud computing platforms, Salesforce is used by countless companies to manage customer relations, deliver services, and innovate solutions to complex problems. So it should go without saying that if you want to be truly successful and competitive in v ...more

DIY Relay Module Tutorial with image of relay and circuit diagram.
FORUM
08/30/2020 2:21 pm

DIY - Relay Module

DIY - Relay Module Relay modules available in the market are bundled with unlimited useless components. I bet unless you really use them, you may always be thinking of knocking them all out before using them in your project. Well, if you feel the need of having a simple relay module, with just the b ...more

Code snippet of HTML navigation structure.
HOW TO
08/28/2020 11:21 pm

Exploit WebDAV on a Server & Get a Shell

The internet has undoubtedly changed the way we work and communicate. With technological advances, more and more people can collaborate on the web from anywhere in the world. But this remote-friendly environment inherently brings security risks, and hackers are always finding ways to exploit systems ...more

Computer screen displaying a Windows operating system interface and command line interface.
HOW TO
08/27/2020 1:40 am

Evade Detection of Netstat & Tasklist on a Windows 10 Machine

There are countless tutorials online that show how to use Netstat and Tasklist to find an intruder on your computer. But with a few PowerShell functions, it's possible for a hacker to evade detection from the almighty command line. Before we dive into the technical sections, have a look at the follo ...more

Person coding on a laptop with dual monitors displaying programming code.
HOW TO
08/24/2020 9:04 pm

Conduct a Pentest Like a Pro in 6 Phases

Penetration testing, or pentesting, is the process of probing a network or system by simulating an attack, which is used to find vulnerabilities that could be exploited by a malicious actor. The main goal of a pentest is to identify security holes and weaknesses so that the organization being tested ...more

Antivirus software dashboard displaying protection status.
HOW TO
08/19/2020 9:16 pm

How to Identify Antivirus & Firewall Software Installed on Someone's MacBook

Identifying security software installed on a MacBook or other Apple computer is important to hackers and penetration testers needing to compromise a device on the network. With man-in-the-middle attacks, packets leaving the Mac will tell us a lot about what kind of antivirus and firewall software is ...more

Combination lock on a wooden surface.
HOW TO
08/17/2020 9:13 pm

Crack RAR, ZIP, PDF & Linux Shadow Files with Zydra

Everybody knows not to store sensitive information in unencrypted files, right? PDFs and ZIP files can often contain a treasure trove of information, such as network diagrams, IP addresses, and login credentials. Sometimes, even certain files that are encrypted aren't safe from attackers. That's whe ...more

Vintage keys displayed on a wooden surface.
HOW TO
08/11/2020 6:33 pm

Gain SSH Access to Servers by Brute-Forcing Credentials

SSH is one of the most common protocols in use in modern IT infrastructures, and because of this, it can be a valuable attack vector for hackers. One of the most reliable ways to gain SSH access to servers is by brute-forcing credentials. There are a few methods of performing an SSH brute-force atta ...more

Close-up of a laptop screen displaying programming code in green text on a dark background.
HOW TO
08/07/2020 1:27 am

Host a Deep Web IRC Server for More Anonymous Chatting

Internet Relay Chat, or IRC, is one of the most popular chat protocols on the internet. The technology can be connected to the Tor network to create an anonymous and secure chatroom — without the use of public IP addresses. IRC servers allow one to create and manage rooms, users, and automated funct ...more

Laptop keyboard close-up with coding interface in background.
HOW TO
08/03/2020 8:41 pm

Write Your Own Bash Script for Automated Reconnaissance

Automation has been a buzz word for quite some time now, but the principles behind it are as strong as ever. For a hacker or pentester, Bash scripting is one form of automation that cannot be ignored. Virtually any command that can be run from the terminal can be scripted — and should be, in many ca ...more

Smartphone settings interface with icons for Wi-Fi, Bluetooth, Do Not Disturb, Screen Cast, and Airplane Mode.
HOW TO
07/29/2020 6:00 pm

How to Disable the Pull-Down Quick Settings Menu on Your Pixel 4's Lock Screen

On Android, there is a vulnerability that Google doesn't seem to want to fix — anyone can open the Quick Settings panel on your lock screen. GPS, Wi-Fi, and Bluetooth, all toggles accessible in this menu, are vital tools for locating your phone in case it is ever stolen. But thanks to Xposed, you ca ...more

List of usernames and passwords displayed in a digital format.
HOW TO
07/28/2020 3:22 pm

Use Leaked Password Databases to Create Brute-Force Wordlists

To name just a few companies, VK, µTorrent, and ClixSense all suffered significant data breaches at some point in the past. The leaked password databases from those and other online sites can be used to understand better how human-passwords are created and increase a hacker's success when performing ...more

Smartphone screen displaying app icons and customization options.
HOW TO
07/23/2020 11:03 pm

How to Enable 2-Button Navigation on the Pixel 4

There was a period when Google knew they were switching to gesture navigation, but felt users weren't quite ready for it. The result was Android 9's two-button nav bar that you could both tap and swipe. Android 10 has since brought full-on gestures, and that's the version the Pixel 4 shipped with, s ...more

Blue LED strip lights surrounding two blue circuit boards.
HOW TO
07/20/2020 11:36 pm

Program MicroPython Neopixel Holiday Lights

Individually addressable LEDs, also commonly called "NeoPixels" after the popular Adafruit product, are a bright and colorful way to get started with basic Python programming. With an inexpensive ESP8266 or ESP32 microcontroller, it's easy to get started programming your own holiday lighting animati ...more

Smartphone screen displaying settings and controls.
HOW TO
07/20/2020 9:06 pm

How to Customize Your Google Pixel with New Accent Colors

Google lets you change the system-wide accent color on its Pixel devices, but the options are a bit muted. If you'd like something more vibrant, developer Tulsadiver created a mod that will give you a wide selection of punchier colors. The accent colors will theme things like your Quick Settings til ...more

Cloned games shown on a smartphone screen.
HOW TO
07/17/2020 9:24 pm

How to Make Any App Work with OnePlus' Parallel Apps Feature

OnePlus offers a variety of features that you don't get with some other Android phones. Parallel Apps is one of those standout extras you didn't know you might enjoy until you've tried it. It allows you to clone compatible apps installed on your device, which means you can use the same app with two ...more

Blue network cables connected to a server.
HOW TO
07/13/2020 9:28 pm

Use GoScan to Quickly Enumerate Networks & Services

Network enumeration is one of the essential phases of an attack, but it can take a lot of time and effort depending on the size. We've all been spoiled by Nmap and similar tools, and while there is a learning curve involved, they are extremely useful. But there's also GoScan, a tool that builds upon ...more

Magisk Manager app interface on a smartphone, displaying update status.
HOW TO
06/22/2020 12:23 pm

Root Your Pixel 4 with Magisk — The Easy Way

The Pixel 4 is one of the most talked-about phones of 2019, so you know there will be lots of third-party developer support. Mods are already popping up, so you'll want to get Magisk installed as soon as possible to get root access. The current method used to gain root is the quickest way yet, thank ...more

Mobile screen showing advanced settings with options for security checks and payment methods.
HOW TO
06/22/2020 10:31 am

How to Make Your Phone Pass SafetyNet with EdXposed Installed

One of the longest-running cat and mouse games in Android has to be that of Google's SafetyNet feature and specific apps that can trip the flag. Many developers have resorted to using Magisk to create their modules since it can systemlessly pass SafetyNet in most cases. However, EdXposed is having s ...more