WonderHowTo Rules for Community Submissions

Check out the WHT rules before submitting any projects to Null Byte.

27
Kudos

Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 14 (Creating Resource Script Files)

Welcome back, my budding hackers! In this series, I have been trying to familiarize you with the many features of the world's ...

7
Kudos

Assembly Tutorials: Part 1. (Video)

Video: . Happy April Fools guys! I'm sorry if some people are disappointed, but have no fear: the first (real) article will be...

5
Kudos

Coding with Typo: Structured Query Language: (SQL) Part 2: Getting the Essentials

Hi Message: I said quite a while ago I needed a break, and it looks like that break is over, because here I am. I dont want t...

-3
Kudos

How to Hack Windows Administrator Password with Out SAM

Hi, I am Robel, I am here to let you know about how to hack windows admin password with out Sam files, this requires physical access and any boot operating system...I used Kali 1.8 , if it doesn't work make sure you have shuted it down properlyor use backtrack. I have tested ...

10
Kudos

Batch Basics: Understanding the Windows Command Line, Part 1 (Echo and Variables)

Welcome back, everyone! In this lesson, I'm going to go over the use of the echo function and variables, as well as basic synt...

12
Kudos

Networking Foundations: Subnetting Based on Host Requirements

Hello everyone! I hope you are having a great day so far. Today, instead of caring about networks we are going to talk about su...

8
Kudos

Batch Basics: Understanding the Windows Command Line, Part 0 (Introduction)

Welcome, everyone! While Linux distributions are almost always used for exploits, security, pentesting and other stuff covered...

11
Kudos

How to Train Your Python: Part 21, Introduction to Modules

Welcome back everyone! It's been quite a while hasn't it? Today we're going to kick off the second part of the Python training ...

20
Kudos

Security-Oriented C Tutorial 0xF9 - I Spy with My Little... Program - Keylogging 101

Yo yo yo, what's goin' on my devilish fiends? Have you come here to learn how to make a keylogger for malicious intent? You sly...

29
Kudos

Hack Like a Pro: Reconnaissance with Recon-Ng, Part 1 (Getting Started)

Welcome back, my novice hackers! As many of you know, recon is crucial to a successful hack/pentest. In most cases, hackers sp...