General Discussion
Forum Thread: Does Null Byte Have a Future on WonderHowTo?
I was wondering what your opinions are on the future of Null Byte here on WonderHowTo. Isn't it time to switch to a more code-friendly environment, or maybe even a standalone website with a structure that isn't meant for sharing Android tricks and how to make a cake etc.?
Forum Thread: Dude I Need to Hack an Online Game and Would Like to Change Some Values and UnBan Me from That.
the game is pool live tour and i am permanently banned!
Forum Thread: Raspberry Pi
How can you use raspberry pi for hacking?
Forum Thread: Exploit Payload and Whatnot
Ok so ive been getting a little confused here.. I read that 0day exploits are the best and undetectable by av... I see the word "exploit" and what comes to my mind is that it takes advantage of a vulnerability to install our payload..
Forum Thread: Proxy Chaining !! Anonymity...
Question 1 http://null-byte.wonderhowto.com/how-to/chain-proxies-mask-your-ip-address-and-remain-anonymous-web-0130581/
Forum Thread: Metasploit Handler Won't Bind
Can someone help me?
Forum Thread: How to Hack Fb Account
like password
Forum Thread: Requested Help on My Bash Script Please!
Okay, so first of all, here is the Pastebin link.
Forum Thread: Books Choices
Hello guys,what books do you recomand for hacking? What is opinion about Ghost in the wire by Mitnick?
Forum Thread: Nickname Help
I'm about to get a school jacket with a nickname on the back and I wanted to have something about computers/hacking that very little people know about. So I wanted to hear some of Null Bytes opinions. Only rule is 12 characters maximum.
Forum Thread: The Legal Consequences of Hacking
In our discipline, we may WANT to ignore the legal consequences until they slap us upside the head, but that is not a very prudent strategy. To help all my apprentice hackers better understand what is and is not legal in hacking, I dedicate this forum. The Cyber Crime Law Enforcement
Forum Thread: How to to Fine Someone's Ip Using Kali Linux
hi , i have just the mobile phone number of the person , i want to know how can i find his ip address using kali linux
Forum Thread: Bruteforce Module Features?
I've started making a bruteforce module in python. I was wondering what features you guys would like to see in something like that. So far I have the basics like a dictionary based attack and a whole keyspace attack. What else should I add?
Forum Thread: Hacking Wifi (WPA/WPA2) On Windows
can anyone plz help me to hack wifi on windows… not everybody uses kali linux, also i have a macbook (so i can install kali only in VM and it does not support wifi adapter)
Forum Thread: Arduino?
I've noticed that there is a section in the Kali lInux menu called hardware, with the usage of arduino, hence the arduino IDE.
Forum Thread: Struggling - OS Choice
Hey guys, i found this site by using google to find some "how to's" for Kali.
Forum Thread: Mechanize with Multi-Threading in Python
Hi guys, i am working on a bruteforce script. I have succeeded in making it bruteforce with mechanize but it is very slow, and we all know speed matters. I tried using multi-threading but that doesn't work I think I am doing something wrong, Please let me know if you have any ideas.
Forum Thread: TPPC
Ok so like 5 years ago I used to play this game tppcrpg... now I forgot my password and my brother is begging ne to give him my id cause well I was too ahead...
Forum Thread: Clone Kali Installation to Another Pc
Greetings, null-byte. Say I have a installed luks encrypted kali on a pc, now I decide to buy a new laptop. Because a reinstallation would take long, is there a way of "cloning" my previous hard drive to the new hard drive, with all settings and updates.
Forum Thread: Mr Robot Tv Show Hacking Tutorial
Loving the show and was wondering if anyone would like to show how some of the hacks are done? Purely for educational purposes of course.
Forum Thread: Evade Virus Total Detection
i try msfvenom but some av caught it and try veil evasion but some av caught it too
Forum Thread: How to Save Exploit Generated Website-Files Externally (To a Personally Chosen Directory)?
I need to test variouse Adobe Flash (and other) exploits per website drive-by on VMs... The problem is, that I cannot always let each VM connect to a attacker VM web-server (because when it is automated, this would cause it to be very slow and I dont want any network connections), BUT it seams like Metasploit generates a URL to the exploiting script AND I have no clue how to extract these scripts.
Forum Thread: Meterpreter
Hello guys,i made a file called newyearsgreeting.rtf(from a tutorial made by OTW) and i tried to send to someone.It says it is a virus.I tried to use venom,but i get an error.Can you help me?
Forum Thread: Mozilla Firefox Bans Flash Player
In OTW's article about using Hacking Team's Adobe Flash Player exploit, he said that there were, in total, three zero-day exploits leaked. Since then, Mozilla Firefox has temporarily banned Adobe Flash Player. I just thought this was an interesting and slightly useful tidbit of information. However the newest version, 18.0.0.209, is allowed. So, what do you all think about this? Tell in the comments below and thank you for reading!
Forum Thread: What's the Best Way to Learn JavaScript?
I've recently seen a GitHub's graph on what's the most popular languages for coding (and therefore, the one that has the most job offers that require it), and I'm wondering what's the best book to follow in order to learn JavaScript.
Forum Thread: Evading Detection!
Greetings All! I have 2 questions.
Forum Thread: Camouflage Scanning Techniques
Hi I am working my way through the how-to lessons and am learning about recon. My concern regarding active scanning is inadvertently sending any info from my source to the attack which could compromise my position.
Forum Thread: Next Steps
I want some advice from the experts and more advanced: What should I go about next? If you've read some of my posts I assume you know some of the stuff I understand and some of the stuff I can do. However, here is a compiled list:
Forum Thread: Msfvenom Help?
i want to transfer this command from msfpayload and msfencode to msfvenom msfpayload windows/meterpreter/reversetcp LHOST=ip LPORT=port
Forum Thread: How Do You Stay Motivated?
I've started trying to learn programming ~2 years ago in Python. So far I haven't been able to finish a book even though I really really want to learn and am interested in computers, especially security.
Forum Thread: Payload and AV
So I get it that exploit is just a way to get payload in... So lets just say that we're making a normal exe or apk without an specifying an exploit... that means we r not using an exploit and user is on his/her own installing payload right??
Forum Thread: How to Hide Ur Ip in Kali Linux?
Vpn ,every hacker needs that ,,so if u know how and tried it in linux kali ,please tell ,,thanks :D
Forum Thread: Enter Pc Trough Ip from Email
Good morning to evryone, this is my first post. I'm a very very beginner, and i would like
Forum Thread: Just Got Swatted...
Hi guys,
Forum Thread: How Do I Create an Anonymous C2C Server?
Maybe there are loads of tutorials about this on here and I'm not correctly identifying them as such.
Forum Thread: Metaspoilt Help
Hello guys, After installing a meterpreter in the victim's pc and gaining acces to his computer how can i find out his passwords?Email,steam,gmail,blog,etc.Shouldnt it be in a folder in some hash form?
Forum Thread: Hello! I'm (Sort of) New Here!
My name is AppleDash, and I'm somewhat new here. The reason for "somewhat" is because I've been a lurker, viewing, reading, and learning here on the Null Byte world. (Clever name by the way. I read the post on the world namesake and found it interesting. Link for those of you who haven't read it yet: http://null-byte.wonderhowto.com/how-to/null-byte-injections-work-history-our-namesake-0130141/ )
Forum Thread: How to Upload a Backdoor
Hi everyone, I am trying to learn how to use Weevley, but I don't know how to upload a .php black door to a website that doesn't have a place to upload files. If anyone can tell me how to do this, I would appreciate it.
Forum Thread: Using Sux for Non-Root Access in Kali
Hi peeps - I'm reading a pen testing book and it mentions using the sux wrapper when using a browser. I am confused as I thought you would need root access all the time as a pen tester or is it used to protect me from being hacked? or is it used to stop me from derping a command?