We're officially seeking Null Byters on a weekly basis who are willing to take the time to educate the community. Contributors will write tutorials, which will be featured on the Null Byte blog, as well as the front page of WonderHowTo (IF up to par, of course). There is no need to be intimidated if you fear you lack the writing skills. I will edit your drafts if necessary and get them looking top-notch! You can write tutorials on any skill level, and about anything you feel like sharing that is related to tech, hacking, psychology and social manipulation—or whatever other life hacks you think mesh with our community.
This isn't inclusive of tutorials, even if you simply post useful links and articles to the corkboard, you are doing the community a huge favor, because at some point, someone will need the information you have provided. Let's continue to make Null Byte the best forum ever by stuffing it with the latest and greatest hacking tutorials and topics.
If you have skills and want to share knowledge on any of the topics below, please leave a response in the comments with which topic you would like to write, post directly to the corkboard, or message me privately. If you have any additional ideas at all, please submit them below.
- How to Nmap from Behind a Proxy—Teach users how to Nmap from behind a proxy to mask traffic. I would also love if you added in BASH proxying, since the two are similar.
- Guide to Asking Questions—Teach the new Null Byters how to ask questions and what we expect before being asked a question (the person researched the topic beforehand, isn't just being lazy, etc).
- How to Make Homemade Napalm (The Bird AndBear, Pending)—Teach users how to make Napalm with home supplies. If you need to know how it's done, just ask me.
- How to Code a War Dialer in Python Using Gvoice API—Again, if anyone needs the concepts, just ask me how and I will tell you how it's done and help you when you need it. Create a program to call people using Google voice and hang up (major points if you can push audio through from a local sound file when they pick up!).
- How to DOS Attack a Windows Media Share—Code an exploit to engage in a DOS attack against a Windows box running a media share. A successful DOS is when legitimate users cannot use the resources. This is simpler than you may think, inquire for details for proof-of-concept.
- Learn How to Make a USB Hacksaw (Mr F)—Make a guide on how to create a USB hacksaw, which is a PnP USB device that copies sensitive files from the host machine automatically.
- Guide to Binary Numbers (Mr F)—This guide should explain how binary works, hex conversion, decimal, and more. Explain the importance of them and their roles in computing.
- A Brief Overview of Hacking History—Drop a few of the big names and people who started it all in a short outline of what hackers are and where they come from. Name some big time exploits and hacking stories to make it interesting.
- Create an SMS Bomber with the Gvoice API—Teach users how to code a SMS spammer/bomber in Python. Bonus points if you make it threaded. You can use libraries, but a tip of my hat to those who don't.
- A Simple Port Scanner in Python—Educate the forum on how to create a port scanner in the Python programming language. You should teach the concepts behind port scanning before you get into the code portion of it. If you add SYN stealth scanning to it, you're extra cool.
- How to Remove Windows Viruses with Linux (Mr F)—Make a tutorial on how to use clamav to remove Windows viruses using Linux. You should explain why we would use this and what situations that this would be helpful in.
- How to Create an Image Uploader in Python—Teach the community how to make a command line image uploader in Python using the Imgur API.
- How to Make a Cantenna—Make a hands-on guide on how to make the infamous cantenna, which is a high-gain Wi-Fi antenna made from a few house-hold supplies—namely, a Pringles can.