Hot Null Byte How-Tos
![iOS 18 Tips, Tricks, How-Tos, News](https://img.wonderhowto.com/img/15/56/63854300537190/0/ios-18-secrets-revealed.600x696.jpg)
![](https://img.wonderhowto.com/img/12/19/63585996443493/0/security-oriented-c-tutorial-0x03-bits-bytes-broken.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x03 - Bits, Bytes, Broken?
Hey there, reader! In this tutorial we are going to explain how values are stored in variables as either signed or unsigned. Try to not get lost!
![](https://img.wonderhowto.com/img/14/68/63585987795291/0/security-oriented-c-tutorial-0x02-variables-data-types.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x02 - Variables && Data Types
Hello again, reader! In this post, we are going to cover some data types and how to declare variables. It shouldn't be too hard so just sit back, relax, grab some popcorn and enjoy the ride (while you still can!).
![](https://img.wonderhowto.com/img/96/23/63586078597548/0/botnets-and-rats-precautionary-measures-and-detection-part-2.1280x600.jpg)
Botnets and RATs : Precautionary Measures and Detection (Part 2)
Hola my fellow hackers! I promised you the tutorials on setting up RAT's and Botnets, but before jumping into those, i want you to know about the precautionary measures and detection of RATs which might be on the system without your prior knowledge. Of course the Anti-virus do most of the job but there are some RATs which slips past the Anti-viruses (This is where Hacker's skill come into play).
![](https://img.wonderhowto.com/img/55/84/63586055233593/0/what-is-arduino-part-1.1280x600.jpg)
How To: What is An Arduino? (Part 1)
I'm back. School's an ass. On my quest for knowledge, which started approximately 3 years ago, I can upon an interesting little artifact. It is called the Arduino.
How To: Increase TxPower Kali Sana Linux 2.0
This is for those using Kali Linux 2.0 that need to edit the CRDA values to get the increase in Txpower
![](https://img.wonderhowto.com/img/09/19/63585982724812/0/security-oriented-c-tutorial-0x01-hello-world.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x01 - Hello, World!
Welcome back, reader! In this tutorial, we will be covering our first program! So let's get to it. We all know the unspoken tradition of the first program when learning a language and of course, here we will respect and complete it. Fire up your favorite text editor (be it vim, emacs, gedit, it's all the same to me, no h8) and try to keep up.
![](https://img.wonderhowto.com/img/44/12/63585979225333/0/security-oriented-c-tutorial-0x00-introduction.1280x600.jpg)
How To: Security-Oriented C Tutorial 0x00 - Introduction
Hello there, reader! If you've clicked on this How-to then it means you are interested in learning some C programming or just generally curious about what this page has to offer. And so I welcome you warmly to the first of many C tutorials!
![](https://img.wonderhowto.com/img/80/81/63585942246015/0/sploit-building-android-applications-for-hackers-part-1-introduction-android.1280x600.jpg)
SPLOIT: Building Android Applications for Hackers : Part 1 : Introduction to Android.
Greetings my fellow aspiring hackers,
![](https://img.wonderhowto.com/img/31/12/63585863121239/0/train-your-python-part-12-logical-and-membership-operators.1280x600.jpg)
How to Train Your Python: Part 12, Logical and Membership Operators
Welcome back! In the last round of python training, we talked about tuples and dictionaries. We'll be diverging again and talking about logical operators as well as membership operators. These are used very similiar to booleans, so if you haven't read that, I suggest you do so first.
![](https://img.wonderhowto.com/img/83/49/63585822355577/0/struggling-connect-wifi-network-kali-linux-2-0-virtualbox.1280x600.jpg)
How To: Struggling to Connect to WiFi Network on Kali Linux 2.0 VirtualBox
Hello y'all! I apologize if this question has been solved somewhere else, but I have looked around on Google, Yahoo, and Null Byte and have not been able to find any working solutions.
![](https://img.wonderhowto.com/img/26/48/63585671607297/0/web-development-for-hackers-1-1-html-css-js.1280x600.jpg)
How To: Web Development for Hackers 1.1: HTML,CSS,JS
hello hackers,newbies and followers of this great community, after some research here in our community, I noticed that there is not even one tutorial that teach Web Development. We have a lot of tutorials on how to hack web site but many do not know exactly how a web site is composed, then I decided, meeting the community's needs, begin to teach people how to develop web sites.
![](https://img.wonderhowto.com/img/57/10/63585402347322/0/cryptocurrency-for-hacker-part-3-why-may-be-bad-idea-for-you.1280x600.jpg)
Cryptocurrency for the Hacker : Part 3 (Why It May Be a Bad Idea for You)
Of course, if it were a perfect form of currency, it would have become the standard by now. But it hasn't. Wanna know why? The story begins with the advent of agriculture, when humans had settled down under groups as units called villages, over 10,000 years ago.
![](https://img.wonderhowto.com/img/36/60/63585337117096/0/displaying-text-from-file-c.1280x600.jpg)
How To: Displaying Text from a File C++
This is a little c++ program that I thought would be handy in the future. Although, I apologize in advance for any errors in the code since I haven't had the chance to compile it yet. Anyway, please if you are a script kiddie please do me a favor and at least read this article fully. :)
![](https://img.wonderhowto.com/img/97/78/63585330979630/0/antisocial-engine.1280x600.jpg)
How To: Antisocial Engine
A.E Hi again this is my second post on nullbyte. The first one was on how to make a remote screenshot captor, now I will give you a presentation for a project of mine(I have named It Antisocial Engine) that It is not something extraordinary but will help many guys.
![](https://img.wonderhowto.com/img/03/26/63585209725232/0/properly-submit-tools-for-null-byte-suite.1280x600.jpg)
How To: Properly Submit Tools for the Null Byte Suite
Hello everyone. I've recently made the annoucement of the Null Byte suite of tools, and we've covered how to download and install it. Now it's time we cover how to submit a tool for inclusion into the suite. It's relatively simple, but we need to get a few ground rules out of the way.
![](https://img.wonderhowto.com/img/18/56/63585166449239/0/learn-elliot-from-mr-robot-hacked-into-his-therapists-new-boyfriends-email-bank-accounts-using-metasploit.1280x600.jpg)
How To: Learn How Elliot from Mr. Robot Hacked into His Therapist's New Boyfriend's Email & Bank Accounts (Using Metasploit)
Social engineering is a pretty important item in a hacker's toolkit. In Mr robot there was a time, we saw Elliot using social engineering to gain access to his therapist's boyfriend's email and bank accounts by calling him and pretending to be someone from his bank, then Elliot asked him for some info that were really useful to gain access to his account, the target believed to be someone from the bank and gave him the info Elliot was looking for. But How Is It in the Real World?
![](https://img.wonderhowto.com/img/86/95/63585166320864/0/download-install-null-byte-suite.1280x600.jpg)
How To: Download & Install the Null Byte Suite
Hello, everyone! If you haven't read the recent announcement on the official release of the Null Byte suite, I suggest you do so. This is going to be a quick tutorial on how to download and install the suite so you can see our communities genius. So, let's get started!
![](https://img.wonderhowto.com/img/39/13/63585092388542/0/c-hash-cracker.1280x600.jpg)
How To: C++ Hash Cracker
This is my first ever how-to so I apologize in advance for any grammar mistakes or spelling errors. Introduction
![](https://img.wonderhowto.com/img/59/30/63584815675559/0/typoguy-explaining-anonymity-choosing-good-vpn.1280x600.jpg)
TypoGuy Explaining Anonymity: Choosing a Good VPN
You want to become anonymous, and dont want your IP to be logged on websites? Well read along here. Continuing This Series:
![](https://img.wonderhowto.com/img/32/20/63584575008876/0/hack-like-pro-create-smartphone-pentesting-lab.1280x600.jpg)
Hack Like a Pro: How to Create a Smartphone Pentesting Lab
Welcome back, my novice hackers! More and more, the world is turning to and adopting the smartphone platform as the digital device of choice. People are not only using smartphones for voice communication, but also web services, email, SMS, chatting, social networking, photography, payment services, and so on.
![](https://img.wonderhowto.com/img/03/11/63584563801426/0/typo-explaining-using-null-byte-properly.1280x600.jpg)
Typo Explaining: Using Null Byte Properly
I have been on Null Byte for a long time, a very long time and. I havent always had an account here, ive like many of you also have, been looking and decided to make a profile to contribute.
![](https://img.wonderhowto.com/img/78/51/63584489738523/0/train-your-python-part-11-tuples-and-dictionaries.1280x600.jpg)
How to Train Your Python: Part 11, Tuples and Dictionaries
Welcome back! In the last iteration of how to train your python, we talked about functions, and we even made our own! We're going to move on to more types of data arrays (much like lists) in today's discussion.
![](https://img.wonderhowto.com/img/37/83/63583840306353/0/cryptocurrency-for-hackers-part-1-introduction.1280x600.jpg)
How To: Cryptocurrency for the Hackers : Part 1 (Introduction)
This is my first tutorial on this website. So, if you think anything to be wrong, just place it in the comments.
![](https://img.wonderhowto.com/img/31/23/63583638561599/0/hack-like-pro-antivirus-software-works-evade-pt-3-creating-malware-signature-clamav.1280x600.jpg)
Hack Like a Pro: How Antivirus Software Works & How to Evade It, Pt. 3 (Creating a Malware Signature in ClamAV)
Welcome back, my budding hackers! In this series, we are trying to understand how AV software works so that we can learn to evade it. To that end, we are working with the open-source AV software, ClamAV. I had previously introduced ClamAV in Part 2 of this series. If you have not installed it yet, go back to that and install it.
How To: Avoid Root Password Reset on Kali Live USB Persistence Boot
For those who doesn't want their root password on Kali Linux live USB persistent login to be reset to the default 'toor',
![](https://img.wonderhowto.com/img/71/40/63583331726619/0/parallel-programming-with-openmp-building-sha-512-password-cracker.1280x600.jpg)
How To: Parallel Programming with OpenMP: Building a SHA-512 Password Cracker
In this article, we will build a parallel password cracker using the techniques explained in the previous part. As SHA-512 is the digest function that Kali (and most modern Linux distributions) use to store our passwords, we will make a SHA-512 password cracker.
![](https://img.wonderhowto.com/img/01/71/63583440234223/0/art-0-day-vulnerabilities-part3-command-injection-and-csrf-vulnerabilities.1280x600.jpg)
How To: The Art of 0-Day Vulnerabilities, Part3: Command Injection and CSRF Vulnerabilities
INTRODUCTION Hello dear null_byters here we go again with our third part of this serie.
![](https://img.wonderhowto.com/img/13/09/63583181934923/0/train-your-python-part-10-making-our-own-functions.1280x600.jpg)
How to Train Your Python: Part 10, Making Our Own Functions
Welcome back! In the last iteration of how to train your python, we covered error detection and handling. Today we'll be diverging from this and discussing functions. More specifically, we'll be creating our own functions. First we'll need to understand exactly what a function is, then we'll get on to making our own! So, let's get started!
![](https://img.wonderhowto.com/img/02/18/63583331167901/0/parallel-programming-with-openmp-quick-introduction.1280x600.jpg)
How To: Parallel Programming with OpenMP: A Quick Introduction
As many of you know, processor's clock frequency improvement got stuck in about 2003, causing the origin of multicore CPU (and other technologies). In this article I'll introduce you on how to run code simultaneously in various processors (I suppose that all of you have a multicore CPU). When you write code without any parallel directive, it only executes in one CPU at the same time (see it below). OpenMP make simple to work with various cores (if not with all of them) , without so much heada...
![](https://img.wonderhowto.com/img/31/72/63582842071751/0/hack-like-pro-metasploit-for-aspiring-hacker-part-10-finding-deleted-webpages.1280x600.jpg)
Hack Like a Pro: Metasploit for the Aspiring Hacker, Part 10 (Finding Deleted Webpages)
Welcome back, my greenhorn hackers! Throughout this series on Metasploit, and in most of my hacking tutorials here on Null Byte that use Metasploit (there are many; type "metasploit" into the search bar and you will find dozens), I have focused primarily on just two types of modules: exploits and payloads. Remember, Metasploit has six types of modules:
![](https://img.wonderhowto.com/img/43/22/63582829832579/0/deleting-your-files-completely.1280x600.jpg)
How To: Deleting Your Files Completely
What you probably don't know is when you remove a file on your system, it is actually still saved, and not entirely removed. Let me tell you how to get rid of it completely.
![](https://img.wonderhowto.com/img/07/75/63582796149298/0/access-deep-web.1280x600.jpg)
How To: Access Deep Web
This is my first tutorial and it is about accessing deep web for total beginner,sorry in advance if I make any mistake plz forgive me.
![](https://img.wonderhowto.com/img/59/42/63582484514913/0/typoguy-explaining-anonymity-hackers-mindset.1280x600.jpg)
TypoGuy Explaining Anonymity: A Hackers Mindset
CEO's of IT companies doesn't know this because they are not a hacker. Only a true hacker can become a successful Security head officer.
![](https://img.wonderhowto.com/img/49/51/63582374998712/0/change-file-metadata-access-modification-date.1280x600.jpg)
How To: Change File Metadata (Access/Modification Date)
In this tutorial I am going to show you how to change some file metadata, this could be very useful if you want to edit or access a file and remove any evidence of your changes.
![](https://img.wonderhowto.com/img/42/30/63582329870451/0/typoguy-explaining-anonymity-your-real-identity.1280x600.jpg)
TypoGuy Explaining Anonymity: Your Real Identity
So, you want to become anonymous? well let me give you everything I know (or at least most of it) to you.
![](https://img.wonderhowto.com/img/74/11/63582309939302/0/turtl-encrypted-cloud-notes.1280x600.jpg)
How To: Turtl - Encrypted Cloud Notes
Hello Everyone! I wanted to share a free and open source note taking tool that I've been using for quite some time now.
![](https://img.wonderhowto.com/img/19/50/63582241378566/0/train-your-python-part-9-basics-error-detection-and-handling.1280x600.jpg)
How to Train Your Python: Part 9, Basics of Error Detection and Handling
Welcome back! In the last iteration of how to train your python, we covered loops, today we'll be covering something that I wish I had learned about much earlier in my scripting career, errors. We all run into them, and they can be frustrating, but there is also a silver lining to them. Today, we'll be discussing why some errors are unavoidable, and what we can do when we run into them. Also, this article will be more of a concept and less of writing actual code, but the information is equall...
![](https://img.wonderhowto.com/img/57/21/63582152536483/0/remove-evidence-from-your-computer.1280x600.jpg)
How To: Remove Evidence from Your Computer
Do you have a file (or many files) that, in the wrong hands, may cause you trouble? Don't worry about it, because I'll show you how to wipe it (or them) from your computer in order to leave no trace behind.
![](https://img.wonderhowto.com/img/32/78/63581968731602/0/train-your-python-part-8-intro-iteration-for-and-while.1280x600.jpg)
How to Train Your Python: Part 8, Intro to Iteration, For, and While
Welcome back! Sorry for being so quiet, I've been rather busy with this project lately! Anyways, in the last iteration of how to train your python, we covered lists. Today we'll be introducing iteration and the two loops python has to offer, for and while. Also, we'll be covering a couple general use functions. So, let's get started!
![](https://img.wonderhowto.com/img/25/58/63581954689774/0/keeping-your-hacking-identity-secret.1280x600.jpg)
How To: Keeping Your Hacking Identity Secret
So, how does someone keep their hacking life completely secret? What This Is: