Header Banner
Null Byte Logo
Null Byte
Cyber Weapons LabForumMetasploit BasicsFacebook HacksPassword CrackingTop Wi-Fi AdaptersWi-Fi HackingLinux BasicsMr. Robot Hacks Hack Like a Pro Forensics Recon Social Engineering Networking Basics Antivirus Evasion Spy Tactics MitM Advice from a Hacker
nullbyte.png

Null Byte: New


Latest Articles

Adding a Raspberry Pi 5 microcontroller with an active cooler heatsink/fan to an aluminum TFT enclosure.
Feb 7, 2025

If you started your ethical hacking journey with our recommended Raspberry Pi 3 B+ setup, it's time to consider upgrading your beginner's ethical hacking kit to the Raspberry Pi 5 for even better perf ...

Credit card being held in hand.
Jan 12, 2024

When I see the words "free trial," I know I'm probably going to have to whip out my credit card and enter in the number to "not get charged." Then I end up forgetting about the trial and want to kick ...

"How to Hack an Android Device Remotely, to Gain Acces to Gmail, Facebook, Twitter and More" cover image
Jan 10, 2024

There are lots of articles about how to hack facebook account, or gmail account, but it is not easy to hack a facebook or gmail account, since hacking a gmail account means, getting access to individu ...

Raspberry Pi network scanning tool output displayed in terminal.
Sep 11, 2023

When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operating system installs with a widely-known default pa ...

Hands connecting wires to an electronic circuit board.
Jun 22, 2021

The ESP32-CAM is a convenient little camera module with a lot of built-in power, and you can turn one into an inconspicuous spy camera to hide in any room. There's only one issue: it does omit a USB p ...

Business meeting in a modern office with a presenter discussing ideas on a whiteboard while colleagues listen and take notes.
Jun 8, 2021

Project managers — and those hoping to become one — should rejoice at this killer deal. The Project Manager's Essential Certification Bundle Ft. Scrum, Agile & PMP usually runs for $1,990 but is only ...

Xerodeploit logo in stylized text.
Jun 8, 2021

A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. This lets them spy on traffic and even modify certain ...

"Unlock Facial Detection & Recognition on the Inexpensive ESP32-Based Wi-Fi Spy Camera" cover image
May 28, 2021

If you've recently built a Wi-Fi spy camera out of an ESP32-CAM, you can use it for a variety of things. A baby monitor at night, a security camera for catching package thieves, a hidden video streame ...

Woman using a laptop while holding a credit card.
May 28, 2021

The ability to browse the web in coffee shops, libraries, airports, and practically anywhere else you can imagine is more than convenient, but convenience has risks. Using public Wi-Fi allows others t ...

Image series of a hands-on demonstration of an electronic circuit board with battery connections.
May 24, 2021

An ESP32-based microcontroller with a camera is an amazing platform for video, but not all modules are created equal. We'll go over the pros and cons of some of the popular low-cost camera modules you ...

Person typing on a laptop keyboard.
May 22, 2021

Learning different coding languages can be difficult. You spend so much time mastering one and getting used to thinking along the channels you need for it that learning something new can sometimes be ...

Cybersecurity concept with a digital lock and hands on a laptop keyboard.
May 14, 2021

Cybersecurity is an industry that isn't going anywhere. After the mass move to online work, the need for more cybersecurity professionals skyrocketed. That demand isn't going away because more and mor ...

Digital device with display showing options for scan, select, attack, packet monitor, and clock.
May 14, 2021

The Deauther Watch by Travis Lin is the physical manifestation of the Wi-Fi Deauther project by Spacehuhn, and it's designed to let you operate the Deauther project right from your wrist without needi ...

Computer screens displaying code on a blue background.
May 7, 2021

Linux is a diverse and powerful operating system that virtually every IT professional must learn and know well. Whether you realize it or not, you have likely already used a Linux device, and learning ...

A close-up of a pair of binoculars resting on a surface with a sunset in the background.
May 7, 2021

Web applications are ubiquitous in the modern online world, and knowing how to attack them is an increasingly valuable skill. But the key to a successful attack is good recon since it's easier to be f ...

VPN.asia logo on a laptop screen with a VPN connection interface.
Apr 29, 2021

As useful as VPNs are for securing your browsing experience and bypassing frustrating barriers online, it's hard to find the right one among the horde of choices. VPN.asia: 10-Year Subscription is a g ...

Person typing on a laptop keyboard in a professional setting.
Apr 29, 2021

There are tons of tools out there that do all kinds of recon, but it can be hard to narrow down what to use. A great way to be more efficient is by taking advantage of scripting. This doesn't have to ...

Two people collaborating on a coding project, with laptops and coding displayed on screens. A coffee cup is also present.
Apr 23, 2021

Learning to code is difficult, particularly if you're doing it alone. While coding may be among the most valued job skills in many markets, the education is sometimes inaccessible. However, the Introd ...

Kali Linux desktop environment with terminal window open.
Apr 23, 2021

Kali Linux has come a long way since its BackTrack days, and it's still widely considered the ultimate Linux distribution for penetration testing. The system has undergone quite the transformation sin ...

Kali Linux boot menu screen.
Apr 23, 2021

Kali Linux is the go-to Linux distribution for penetration testing and ethical hacking. Still, it's not recommended for day-to-day use, such as responding to emails, playing games, or checking Faceboo ...

Person coding on two computer monitors with a Python logo.
Apr 16, 2021

If you're looking to get started with your training in web development, a natural starting point is learning to code with Python and then saving and sharing your work on Git and GitHub. These are stan ...

Silhouette of a person standing in a dimly lit corridor.
Apr 16, 2021

As a hacker, the final stage of exploitation is covering their tracks, which involves wiping all activity and logs so that they can avoid being detected. It's especially crucial for persistence if the ...

Hands typing on a laptop with a data analytics dashboard displayed, beside a mug and pens.
Apr 10, 2021

Becoming a competitive candidate in IT and Data Science takes more than knowing a few coding languages and being good with computers. To really stand out from the crowd, your knowledge should be exten ...

Business analytics dashboard with charts and graphs on a computer screen.
Mar 27, 2021

Microsoft Excel is one of the most useful tools you can bring into your professional life. However, as useful as Excel is, it can also be difficult to learn on your own. The All-In-One Microsoft Excel ...

ASCII art of a chicken and text representation.
Mar 27, 2021

ESP8266-based microcontrollers can be used to create exciting and legal Wi-Fi hacking games to test your or your friends' Wi-Fi hacking skills. When you first start learning how to hack Wi-Fi, it can ...

Pirate-themed wireless router on a table
Mar 18, 2021

A PirateBox creates a network that allows users to communicate wirelessly, connecting smartphones and laptops even when surrounding infrastructure has been disabled on purpose or destroyed in a disast ...

Code editor displaying programming code on a laptop screen.
Mar 13, 2021

Python is one of the most commonly used programming languages in the world. From data science to game design, Python appears in almost every industry that requires coding of some kind. If you're looki ...

Close-up of a printed circuit board with electronic components.
Mar 13, 2021

Microcontrollers like ESP8266-based boards have built-in Wi-Fi, and that's really cool, but what's even cooler is that certain pro models of the D1 Mini also have a port where you can connect a direct ...

Hand interacting with IoT icons and a globe representation on a digital interface.
Mar 5, 2021

These days, everything is connected. No, really — we mean everything. Your phone, your smart speaker, and even appliances like stoves and refrigerators can be connected and communicate with one anothe ...

Wi-Fi network selection menu on a computer showing available networks.
Mar 5, 2021

There are hidden Wi-Fi networks all around you — networks that will never show up in the list of available unlocked and password-protected hotspots that your phone or computer can see — but are they m ...