I am trying to hack this simple website poll with no security at all,the only thing is my auto clicker code , is slow as it clicks, confirm and loads all again,i get like less than hundreds per min,
Okay, so I've tried out Cyborg, and have come to a conclusion with it. (on the look, feel, and comprehensiveness of it)--------------------------------------------------------------------------------------------------------
Earlier this week, Hacking Team a big company itself was hacked. Over 400-500GBs of data were leaked to the entire internet! The company sells it's 0days to whatever government wants to buy. They have stated multiple times in the past that they do not sell their 0days to 'oppressive countries'.
This has been asked many times, but I think it's finally time to take action. I'm looking to setup a proper IRC or chatroom for this great community, but would like input from you to know what website/service would be the best. Perhaps Chatzy is a suitable website, or Freenode (though it's difficult to set up)? However, it'd be great if OTW could make it on his account, thus the privileges for both places (here and the IRC) stay the same.
So, we all probably know that when you run a trojan made by Metasploit, nothing will appear to happen. This is a sign for me to immediately check my Task Manager, but for an unsuspecting victim, it will just seem like a broken file. It is likely that they will delete this "broken file" once they see that it "doesn't work." In order to prevent this, we need to disguise the trojan.
So im in class 12 and one of founding members or our school's tech club. We are holding a series of competitions for which we will have an inaugration. So I was thinking that during the inaugration there will be judges and students present and it wud be the perfect time to hold out a workshop on hacking for making them aware...
So I've been thinking to myself "How can I improve my learning skills for hacking, while also contributing to the community?", and I came up with the idea of everybody commenting on how they learn and remember the various hacks and such on not only Null Byte, but also all over the web. For example, I have bookmarked a couple of tuts that I run through daily trying to remember how to preform them on my own, then I test myself on it and if I get stuck, I come back to the page. Another way that I...
I've recently seen a GitHub's graph on what's the most popular languages for coding (and therefore, the one that has the most job offers that require it), and I'm wondering what's the best book to follow in order to learn JavaScript.
Okay, so to start off with, I was browsing through the world, and came upon this post and so that got me wondering, so I continue to scroll down through the comments, and I see the comment "Looks like knock off Kali to me. If I went this route I would use C.I.A Kali." by cyberhitchhiker which sparked my interest. I then began "researching" (google C.I.A kali) for this strange operating system and found the github page.
Hello guys,i am from Romania and i want to go to an Ivy league school.How can i increse my chances?What tests should i take?I have some rewards in chess,basketbal,tennis and a few wins on math competitions.My english is average though and my french too.In 2 years i finish highschool.
There are two databases that I'd like to, for lack of a better explanation, download from the websites they are on. Both websites do not give or sell their databases in one big file, but do allow unlimited, free access to ALL of the data, but in an awkward manner (e.g., all names starting with an "A", etc.). Is there a way to "download" all of the data in an efficient way (rather than this "slow boat" method)? Are there companies that do this work for a reasonable price? I can do it myself but...
My name is AppleDash, and I'm somewhat new here. The reason for "somewhat" is because I've been a lurker, viewing, reading, and learning here on the Null Byte world. (Clever name by the way. I read the post on the world namesake and found it interesting. Link for those of you who haven't read it yet: https://null-byte.wonderhowto.com/how-to/null-byte-injections-work-history-our-namesake-0130141/ )
i have tried to boot kali linux as USB persistent and failed.then i try to format my pen drive,but i couldn't get back it to normal.it only shows 2gb (it was 14gb drive) space after formatting.is there any way get it back to normal?
I Have Unlimited Text Messages but for the Last 24 Hours Any Texts I Have Tried to Send Have Failed, Checked Coverage in Area All Is Good, Turned Phone On and Off, Phone Calls Are Working So Was Wondering if It Possible for Someone to Block Me from Sending Messages to Anyone? Any Help Would Be Greatly Appreciated.
iam kinda new to this i have started using kali linux on my laptop in vmware workstation 10 , it all works well but i researched a few times about the wifi connection in vmware people have said to me i need an external wifi adapter with the correct chipset.
Hey guys so I've been using Kali in a virtualbox for awhile now, and have been practising on both Windows 8.1 and Windows 7 Virtual Targets. However, to date, only one attack has EVER worked for me, and it was a basic malicious file created using msfvenom that I managed to use to install meterpreter in Windows 8.1. However, the meterpreter session crashed and I've never been able to perform any other attack successfully, whether it is another malicious file or the Java applet exploit or even...
So I made an apk to get meterpreter on my android device... but everytime it installs... it shows MainActivity as name and no image... which looks kinda fake and bad for social engeneering right??
So, there's this pentest I want to try with my network. I tried bruteforce but it took days and nothing came up even. I believe Rainbow Tables are a convenient way to try and, as there are tables available on Ophcrack's website, that worked well before when I tried with Windows passwords, I wanted to give it a try to know if it's possible and easy to do. They come in .zip format and there is a folder and inside comes a bunch of files with different extensions. (.bin, .start.. etc.)
A while back, I wrote review of my favorite hacking movies of all time. Two of my key criteria were; (1) how realistic was the hacking, and (2) are the hackers portrayed as the "good guys." This past winter, a new hacker movie was released, appropriately named Blackhat starring Chris Hemsworth (from Thor fame) as a blackhat hacker who is released from prison to stop a notorious and destructive hacker that only he can stop.
Things like Heartbleed come to mind, or really any Zero day to be honest. What if I am a company who relies on product X but product X has just been found to have a bad vulnerability and it will probably take a couple days to patch. What do I do? Do I leave it vulnerable and keep myself open or do I shut down?
This community is the most clean and accurate hacking community out there, but recent problems with plagiarism has come to my attention. this is really sad to see, and I don't want it to continue. If you have a good source, please cite your source instead of claiming it's yours. It's not.
There are few tutorial series-es on programming languages for the aspiring hacker (Perl, Python...). I am currently learning a bit of Ruby and was thinking to use Null-byte as one of my learning resources to learning hacking in it. But I couldn't find tutorials that really hold your hand and takes you throw building something meaningful in it.
I tried to get a Meterpreter reverse tcp session in WAN to my own second PC, I used my normal Gateway for the Attack Machine and an mobile W-lan hotspot with an Tablet-PC for the Target Machine.
i was wondering about that issue , can we or not ? we used to be able to hijack facebook session's using a couple of tools and on the same lan ? why aren't we able anymore + would it work on whatsapp ? have anyone tried it ? , i know its based on cookies , but in case they stopped using cookies what are they using in the mean time , thanks :-)
can any kind soul help me on this? I have been living in hell for the past month.someone been remotely control my house network and devices for more than a month. I think it started with my son desktop then one day I notice werid pattern or movement on my ipad. I quickly try to log out my apple id and guess what? the guy on the cloud actually stop me from doing it by placing some kind of firewall on my screen which even I press on the log off button it takes no effect. eventually I lost all my...
Is there anyway you can get some practice doing an entire hack, beginning to end, as realistic as possible, simulated as realistically as possible without doing anything risky and immoral? If you set up your own Virtualbox you know the applications and services, whereas I'm looking for a way where you basically start off blind, do recon, work up from there, etc.
hello hackers! if I have website, we all know that my ip address and all other information can be easily recognized. I want to know if I can add proxy on my website. so that no one can recognize it easily. I am just curious and sometimes for good reasons too we want to protect our workings only that is why I asked it?
Microsoft is developing a new API project called poject "Oxford," and it includes face, speech, and more "smart" API technology. Despite being Microsoft, I actually found this to be very useful. ;)
Welcome back, friends! Many times, businesses, friends, and family will lock their zip files with a password to keep their files secure. It is reasonable, and understandable. Well, thanks to hackers, there are many ways to get past this wall of security.