General Discussion
Forum Thread: Bug Hunter!
hey everyone, maybe this is a litlle off topic but im intersted in bug bounty programs so i want to know if anyone here has experience with this,if you do please share it.
Forum Thread: Reverse Shell .Apk Files
I made a reverse shell apk file, but any phone that tries to open it can't. I have enable unknown sources so what's the issue? The file itself?
Forum Thread: Can You Put Persistence on Live Cd/Dvd?
i wanna try using Kali Linux on a live cd/dvd but i wanna put persistence, so is it possible?
Forum Thread: How to Change Nmap Range Like This:0.0.0.0-1.1.1.1 ?
how to change Nmap range like this:0.0.0.0-1.1.1.1 ?
Forum Thread: There Is Someone Out There Who Doesn't Have Anyone to Rely on. Spread the Motivation by Spreading This Python Script
Someone out there has experience depression, a lack of inspiration or motivation. They have nobody to talk to or rely on. Most of them sit in despair. I wrote this little python program in a day inspired to motivate someone. I have had friends who have been depressed or unmotivated. I wrote this program with a intent of someone's day to be better. When you run it gives you a quote on start and you can get more quotes by category. It's very simple, not really that great but words can change pe...
Forum Thread: How to Make/Create a Backdoor Like *RCS* for Android.
Hi guys, it's 23055 here with a very first question on this platform. Before getting to my question i would like to bring you to a video tutorial so please follow below link....
Forum Thread: Beef-Xss Is Showing Error
i tried it on both my laptop and on my android phone (chroot (kali)). but in both places, i get an error...
Forum Thread: Hi Guys! Need Help with Medusa
Hi everybody! I'm trying to use Medusa, but even if i've googled many times, i was not able to find a solution to my problem.
Forum Thread: Creating OS
Hi guys I am new here. I want to ask all of you about creating an os (Any kind of Android or PC) what do i have to do to create an os for my personal use or to sell it to someone (Making it private) .Do i have to create OS only or hardware's too . I am free next month so i am thing of this so please tell me about legality or illegality of this. Sorry if it sounds stupid
Forum Thread: [CVE-2016-3714] ImageMagick Delegate Arbitrary Command Execution Using Metasploit
This module exploits a shell command injection in the way "delegates" (commands for converting files) are processed in ImageMagick versions
Forum Thread: Python Own Tools.
Greetings, I have started learning Python for a lil bit of time now . As of now i do know how to read progams :) But i cant write them myself. ( might be becausei dont have much expierence ) But my question is, how do people actually come up with a progam like " SSH Bruteforce, Server /client attacks, password crackers, trojans,virusses." etc. I do know how to find tutorials but that feels more like just copying ther code and knowing how to read it. But i couldnt write the same code when i cl...
Forum Thread: Can I Use Dmz as Alternarive of Port Forwarding?
Hi, I'm newbie in kali linux. I am reading stuff from here to do tasks. But unfortunately I can't forward my ports because my Internet provider close all ports. I am using cable internet in tenda router. I tried to forwards ports to attack WAN but unsuccesful. I know this because I do attack by armitage and it say all ports closed. I got his main Mikrotik ip while scanning on Unicon scan, I tried to telnet to connect but it requires login info I tried basic login but failed. Today I was doing...
Forum Thread: Until WHT Hires a New Admin.
A few things. Please stop complaining about how the 'community is dead'. There are a few things you can do if you really want to keep this place alive until they find a replacement:
Forum Thread: Quick Poll
Which of the following should I focus on? A 5-6 part series teaching IT hardware fundamentals
Forum Thread: Using Proxychains with TOR and Nmap
Using proxychains4 with TOR browser (as the proxy), I want to perform a Nmap scan of a host. Since Tor is a TCP only proxy, would that mean that a scan that uses other protocols than TCP such as ICMP would not be "encrypted" with TOR? Would anyone know what would happen in this situation as I do not know how to test it.
Forum Thread: Introducing FutariNoSekai
FutariNoSekai is a little Python script I made.It's basically a pentest framework.It's very simple..all it does is execute it's modules which are written in other languages as well,probably not much but check it out! GitHub - rudinskizvonimir/FutariNoSekai: Beginner's Pentest Framework coded in Python with modules in other languages.
Forum Thread: How to Send Link with Meterpreter Backdoor Outside LAN
After preparing Meterpreter exploit how could you send link to the victim if it is outside your LAN?
Forum Thread: How WPS PIN Is Assigned or Calculated?
Can anyone tell that how WPS pin is assigned to a MAC address or how to calculate default WPS pin of MAC address manually?
Forum Thread: How to Exploit Windows 10 Using bf_xor Encoders in Metasploit
The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration testing and IDS signature development.
Forum Thread: How Can I Use?
How can i use internet on my Kali Linux (i'm using live usb)
Forum Thread: How to Hack Wireless Password Using Wifiphisher
hey evey one ! wifiphisher is a powerfull tool phyton writed wich allow you to hack wifi password by tricking the users and not attacking like the other tools.
Forum Thread: About Android Security!
So my mobile lcd got cracked and went to repair it , the guy told me it will take couple of days as the he already had my phone disassembled so i left it there, had a app lock on but still curious to know if someone copies data from your android device is there any way to find out some log or stuff which we can check if the data was copied from your device?
Forum Thread: Just Passed C|EHv9
Just passed the C|EHv9. If anyone is interested in tips, I'd be happy to provide.
Forum Thread: IP Subnet
I'm using metasploit to perform a ssh login scan on a range of ips from 192.168.24.00 and up and I don't know how to write it. For example, I'm trying to scan 192.168.24.01, 192.168.24.02, 192.168.24.03, all the way up to 192.168.24.99. This isn't the actual ip btw, just a made up one. Can someone help please?
Forum Thread: Backdoor Crypter FUD
Does anyone know where i can buy a FUD good crypter that last FUD for 1 to 2 week i am looking to purchase one but everyone that i have purchased so isnt fud or it only last one to 2 days please if you know of a good place let me know asap thank you
Forum Thread: Who Are Best People to Follow on Null-Byte?
I know this is little wired but, following best ethical people will also help us (beginners) toward ethical way and it also help to learn hacking/ pentesting faster.
Forum Thread: Kick Other Devices Off the Wifi with Kali?
A few days ago I saw a tutorial on how to kick other devices off the wifi using a OnePlus X phone. How do I do that with Kali? I know how to deauthenticate devices using aireplay-ng but is there any other tools that work better then airplay-ng?
Forum Thread: Powersploit Opening Session Problem
Ok, so i got the correct version of invoke-shellcode.ps1 loaded onto my computer but now when i attempt to invoke-shellcode the reverse http payload it crashes the powershell on the target computer and the handler i set up gets this message
Forum Thread: STeps of Any Hack^_ ^
Greetings, I'm having some issues if it comes to getting into a system / server. I know it's a easy task if the system hasn't been updated for ages and runs old software. But what do you do when you want to hack a person's pc thousand miles away with a updated Linux / windows OS. or maybe a bank website which has real good security and has been updated good. I know in these cases metasploit wont work since the exploits has been updated, (right?) Lets leave out the social engineering part of "...
Forum Thread: How to Infiltrate Router's Setting Page?
A friend of mine has set up MAC security on his router. I can use MAC spoof to access the internet but since I use Kali Linux in a Virtual environment so accessing internet is not a very good option in Vmware plus I've to game online which is a far fetched idea for a Virtual environment. And as you guys might know that MAC spoofers do NOT really work for windows (they either get stuck, have compatibility issues or just don't work) so I can't have it on windows either, so I'm trying to have ac...
Forum Thread: Getting Started with Bug Hunting!
Hello there, I have just completed basic of hacking and learned some basic of C, C++ and python too. So i want to be a bug hunter and want to make bug hunting as my professional skill.
Forum Thread: Problem Opening Msfconsole or Metasploit in General
When Trying to Open Msfconsole
Forum Thread: Wifi EAP Authentication Hacking
Hi, can somebody help me with hacking eap authentication in wifi?
Forum Thread: Hard Drive Encryption
Hello Null Byte Community,
Forum Thread: Metasploit Dominating?
Is it just me or does metasploit dominate the hacking world? It seems that on this forum its all bout using metasploit to use a exploit or using a reverse shell (payload) to hack a operating system. I thought that his was a newbie tool that doesnt work on anyone with a decent AV .
Forum Thread: I Need Coders for a Hacking Suite I'm Working on. Care to Join?
Hey there, hacker apprentices! Let me start by a introduction of myself. If you don't want to read about me, skip this. I'm a avid hacker, not a newbie, remember. I also expertise in the field of AI, I make robots, or rather war machines, and explosives. I also own Electric Paw Entertainment, a game developing studio.
Forum Thread: Wifi Hotspot Hacking
Ok so i have mobile internet and when i give my friend the hotspot he connects to it, now is there any way of implementing something in his phone or tracking of what he does?
Forum Thread: I Have Problem with Metasploit on KAli Linux 2016?
I am using metasploit v4.11.22 on kali linux 2016 .when i creat a payload with msfvenom by using my external ip address and creat a Listner on msfconsle it took very long time after clicking on backdoor file and when i entered command "sysinfo" it said unkonwn command.then after 15 seconds an error comes ."Meterpreter session will closed : reason died...??
Forum Thread: Question About Viewing Source .!
hello, is viewing a website source and edit it then sell it illegal ?!