Null Byte Forum

Forum Thread: Android Apk Exploit Bind with Image (Auto Install) .

I have created a android APK exploit (persistence) . Is there any way the exploit will auto install when any url is sent to victim. I mean i don't want victim to click on download and make install. Can exploit can be attached to any valid URL and when victim open the Url (exploit apk) start download in background without user notice successfully .

Forum Thread: Kali Linux Question

Hi, I have a live boot of Kali Linux on a USB 8G set up with persistence. My issue is that whenever I boot up Kali, all of my files saved to my desktop move to a single location in the upper left hand corner... How can I stop this from happening to maintain my organized desktop?

Forum Thread: Help with Hacking a School PC

I need help to hack a school pc. They block everyhting (cmd, apps from usb, bat files,bios). All I want to do is gain admin access. I need to get admin access for a reason I can't tell. But if any one has an idea on how to do this, it woulod be great. I kind of figured a way but I don't think it would work. Get linux on a USB, Boot PC press the specfic button (I forgot the button) and chose linux. I really don't think it would work tough. Any ideas? By the way, they use PC's called RM one and...

Forum Thread: What's Happened to OTW's Page ?

Hello null-byte, I tried a few time to click on our beloved OTW's pages to be redirected to his profile page in order to have all his tutorials in one menu. But it appears that /occupythewebotw is for some reason down. Other profiles pages seem to be working so I was wondering why I can't access to the list of one of the biggest contributor I have ever see ?

Forum Thread: Modify Password in WPA2 Capture File?

So I have a few WPA2 capture files which I got using Aircrack-ng on my home network. I was wondering if I can somehow change the password associated with these capture files without changing my home network password and re-capturing. This is so I can experiment with bruteforcing and wordlists etc on different lengths and types of passwords, but still within a real-world like scenario. So in short, I want to change the password in the capture file so that I can attempt to crack lots of differe...

Forum Thread: Macro Mouse Hack

I just got a macro programmable mouse and was thinking that it could be interesting to create a macro so that when run on someone elses computer could allow remote access, or do something else of interest. Any ideas out there? It would have to be some command that could be recorded on the mouses macro. Such as opening a web browser and searching a specific url.

Forum Thread: 24x7 Live Fire Cyber Warfare Range (Free)

From my experience, very few people seem to know about this so I wanted to introduce you all to Arizona Cyber Warfare Range. According to their website, "We are a 24×7 live fire cyber warfare range. Our purpose is to develop a continuous improvement process for cyber warfare and security. We host live fire exercises for beginners through real world operations. Each area is designed to meet the needs of the students education level. With capability for upward progression into the real world of...

Forum Thread: How to Stay Anonymous While Using Metasploit?

Everyone always encourages you to use TOR and a VPN while doing illegal activities online, but how can you stay anonymous with that? For Metasploit, I port-forward so that the LHOST will work outside of my LAN, but what if the attacker is logged on to somebody else's network, and can't port-forward? I know this sounds kinda black-hat, but it's something I've been wondering about.

Forum Thread: My First Site Hack.

Hello peeps, instead of posting in comments I decided to post a new thread in the forum. This way it will be easier to keep it organised. Also this is a site for noobs and sometimes it helps other noobs to see what other noobs are doing and the process they are going through to learn. I myself have been a teacher and have found that most people are afraid of asking questions in fear of looking stupid. Trust me this is not a problem I have. Ok down to business,

Forum Thread: Where Can We Use C?

Hello so i know what we can do in python,but i don't really know what we can do in C. I see a lot of posts saying that with C and assembly you can "read the hardware" and it is for reverse engineering and exploit writing,but is that only it?I am not interested in those sectors (yet),but is C as effective as C++ in creating malware?I know that you can make malware in any language really. Linux is made out ot C and it is open source so i guess we can change it.Could someone point out what we co...