Tutorials Search Results

How To: Convert Python Script to Exe

There are a lot of great tutorials on Null Byte using Python to create backdoors, reverse shells etc, so I thought it might be worthwhile making a tutorial on how to convert these python scripts to exe files for Windows victim machines.

Hack Like a Pro: Digital Forensics for the Aspiring Hacker, Part 7 (Windows Sysinternals)

Welcome back, my aspiring hackers! In many of my earlier tutorials, I mentioned the complementary nature of hacking and forensics. Both disciplines, hacking and forensics, benefit from a knowledge of the other. In many cases, both disciplines will use the same tool. In this tutorial, we will use another tool that can be used in either discipline—Sysinternals—a suite of tools developed by Mark Russinovich.

Day of the Dead: DIY Sugar Skull Halloween Look with Rick Baker, Horror Makeup FX Master

Day of the Dead, or Día de Muertos, is a Mexican holiday celebrated on November 1 or 2 each year to honor the dead. It's often lumped in with Halloween, and while some people do dress up in costumes, the day is much more focused on remembering the lives of friends and family members who have passed. People who are unfamiliar with the holiday sometimes consider one of its most pervasive symbols, the sugar skull, rather morbid. And special makeup effects artist Rick Baker is no stranger to the ...

Cozy How To: Microsoft Office Ribbon Interface & Work Space

PowerPoint Tutorials for Microsoft PowerPoint presentation software. In this introduction tutorial we will be using PowerPoint 2010 and will focus on the interface workspace by reviewing the ribbon, slide pane and slide tabs. The ribbon is designed much like a website navigation menu bar and has multiple categories to separate all of the tools into an organized bar. By default the Home tab is selected and will include most of the tools that are commonly used when editing and creating a PowerP...

How to Hack Wi-Fi: Getting Started with Terms & Technologies

Welcome back, my hacker trainees! A score of my readers have been begging for tutorials on how to hack Wi-Fi, so with this article, I'm initiating a new series dedicated to Wi-Fi hacks. This will probably be around 6-9 articles, starting with the basics of the technologies. I can hear you all groan, but you need to know the basics before you get into more advanced hacking. Then hopefully, developing your own hacks.

How To: Create Velvet Hearts Nails

This is a very adorable looking nail design that I tried a few days back on my valentines day list of 'nails to do' ! It worked out exactly as I had planned , though during the execution it looked as if it may not, and I was happy enough to post this design online and share it with my viewers!

How To: Do Striped Gradient Nails

This nail design kind of reminds me of sunrise as well as of sunset at the same time! This nail art is not only incredibly stunning, but also so very easy that you would not believe it! I have shared the video link below for you to have a look and decide what you think of this nail polish design in gradient look for yourself!

How To: Make Your Photos More Fun with These DIY Bokeh Effects Lens Filters for Your DSLR

In photography, bokeh refers to the blurry or out-of-focus parts of a shot. Bokeh can be good or bad—it all depends on how you use it. There are tons of ways to create a bokeh effect, whether you go the traditional route with lens filters, digital with Photoshop, or even from your iPhone. With filters, you can use the blurred spaces to produce different shapes and colors. If you have a DSLR and want to experiment with bokeh, this tutorial by Chris Perez over on Apartment Therapy will show you...

How To: Have Your Passwords Ever Been Leaked Online? Find Out with PwnedList

It seems like every other day there's a new security threat or data leak in the news. Whether it's your credit card PIN or your smartphone's apps leaking your email address, no one wants their personal information out there, especially passwords. And if you use the same email address and/or password for more than one site, the effects of someone getting hold of your credentials can be catastrophic.

News: Artist Uses 300 Apples to Power 30 LEDs for 1 Electrified Fruit Battery Science Experiment

You've probably seen the classic fruit battery science experiment a thousand times, but I doubt you've ever seen it turned into an art project! Photographer Caleb Charland uses everyday objects like apples, coins and vinegar to create makeshift batteries, then takes these gorgeous long exposure photos. For the apple tree photo, Charland got about 5 volts for every 10 apples, so he had to wire 300 apples to power the lamp for several hours. He used a zinc-coated galvanized nail and copper wire...

How To: Don't Have Photoshop? Use the Free Web Tool Cropp.me to Crop and Resize Images Easily

Cropping images can be a huge pain if you have a bunch to do at once. Even if you have Photoshop or a similar program, the process of opening each individual photo and cropping them one at a time can take forever. A free web-app called Cropp.me makes that task a lot easier by auto-cropping your photos to whatever size you choose. All you have to do is upload an image, choose what size you want it to be, and click Cropp My Images. You can choose from a list of sizes or input a custom size of y...

News: Hacker Points Out iOS Security Flaw That Allows iPhone Text Spoofing

Security researcher and iPhone hacker pod2g has brought attention to a flaw in Apple's iOS that allows the user to change the reply address of an SMS message. This bug has been a part of the iPhone's SMS since the first iPhone in 2007, but Apple has yet to address it. Basically, there's a section in the text payload called User Data Heading (UDH) that controls some advanced features, one of which is the reply address. By changing the reply address of a text message, you can make someone send ...

How To: The Novice Guide to Teaching Yourself How to Program (Learning Resources Included)

Today's post is a small go-to guide for beginner programmers in Null Byte. With many of our community members picking up programming from our Community Bytes, it only makes sense to lay out a one-stop guide for your reference. Hopefully this guide will help you make an educated and thoughtful choice on what programming languages you want to learn, and how you want to learn said languages.

How To: Build a Beginner Hacking Kit with the Raspberry Pi 3 Model B+

If you want to follow Null Byte tutorials and try out Kali Linux, the Raspberry Pi is a perfect way to start. In 2018, the Raspberry Pi 3 Model B+ was released featuring a better CPU, Wi-Fi, Bluetooth, and Ethernet built in. Our recommended Kali Pi kit for beginners learning ethical hacking on a budget runs the "Re4son" Kali kernel and includes a compatible wireless network adapter and a USB Rubber Ducky.