Uh oh. Looks like your using an ad blocker.
Our site is support by ads that help to pay our hosting costs. Please disable or whitelist us within your ad blocker to help us keep the site online.
All money generate by ads and donations is used to pay the hosting costs of the site.
Articles: Tutorials and How To's
A brief tutorial on direction.
A simple tutorial on NetCat, and some other things you can do with netcat
make urself look awesome
Ever find yourself at school and locked off the internet?
A 'safer' way to inject DLL(s).
it's only math, science, and a lot of logic
An easier JTR tutorial for beginners.
A quick guide and explanation on how to get someone's ip by making them view an 'image'
How to stay anonymous
Basic CSS tutorial for newbies.
The Basics Of Trashing
A few basic HTML samples for new people to HTML
This is aimed at those who struggle with the application challenges. There is a lot of explanation of code, massively over the top for a simple crackme but its an old article I wrote a while ago. Maybe someone will find it useful to start them off.
This is the first version of my tutorial about beating rapidshare. It will outline various ways of getting past many of the Limitations of useing rapidshare. Most of these have been tested and in that situation they worked.
Step by step how to get started in a Information Security . What courses to take and some other primary things to be doing .
A complete guide on building your own working CMS!
how to use Cain & Abel
Another article from my coursework
Let's face it. Matroska video files are a bitch to work with. Let's convert it to something a little more universal!
Cool shapes and buttons on adobe fireworks
Guide to cracking wep keys for BEGINNERS! By: Exidous
Advanced Usage of the encrypt3d SwiSS army K.nife!
These two tutorials will teach you how to data mine some body, but also teach you how to protect yourself from being data mined.
You can't use second glue or nails ;)
Get a bunch of information with in a couple of commands, although it is a hack.
Tutorial for modifying PS CS2 or CS3 splash logos, with an example by me.
Exploiting Dreamweaver to get access to C: - very simple!
Tutorial on how to create your own searchplugin for FireFox
This will teach you how to animate using Flash 8. Step one
How to include your webcam in a flash document
4 freewebhosts are listed here, and 2 subdomains(shorter subdomain).
Some basic ways to get some access on VERY insecure networks...try your school.
Yeah, I tried making a CMS with Go cough Dad cough y. The had me so locked down. I wasn\'t havin\' it. Here\'s How to beat it, and get the privelages needed to do what you want.
When you have admin access...this method will allow you to reveal the login password of any account on the machine including the administrator password...without changing it. Interested? Read on
It will teach you how to get the IPs of your friends on MSN.
Learn how to use Google!
Google Hacking Search Strings For Finding Forbidden Sensitive Information And More
An article on creating Vid-Lessons for HBH. We need a ton more of these!
Step By Step Guide To Hacking Windows Vista Passwords
playing god with the lighting fixtures
The title says it all
This is an article i wrote to help you find the parts you will need to make a sweet new custom computer
Ok, so you want to know how to hide your files so it can never be found. NEWS FLASH: it can always be found, but you can make it damn near impossible for your parents/spouse/etc. to find you. Read on to see how one might hide their files or cover their tracks.
This article explains some basic concepts to store hierarchical data in RDBMSs.
Steps to getting a mission completed
Learn how easy it is to make your own web server using Internet Information Services (IIS).
This willt each you a little about what proxy is and how to use it in firefox. Very useful it even says google.com!
A tutorial on Creating RSS feeds and applying them to your website.
A very early step for understanding Buffer Overflow
This article will teach you how to use a proxy
Check this out!!!
How to add the little picture that goes next to the favorites or the url bar.
For those poor, addicted people that still play it.
Your school blocks nearly every site but that only makes you want to get there more doesnt it. Heres a simple way to get to almost any blocked website.
How does one hack in real-life? Why do you need you read this article? JUST CLICK THE LINK
Have your background as any website in the world wide web!!
Blow your soda
As the title says.
How to rip videos from Youtube
HOW to Turn your Ipod into a a universal infrared remote control
Brute-Forcing Logins on Remote Services.
How to produce hydrogen easier then what our friend AC1D told us.
How to retrieve phone owner names and pinpoint their exact locations.
I helpful introduction to perl, I take no credit for this article, I just found it.
A detailed tutorial about how to use John the Ripper for cracking DES hashes. Specifically geared to those with less experience
A reference for the rest of us! Learn the basics of John and some handy word lists as well.
Detailed tutorial on jtr usage.
A short description of how appearing to be the google bot can grant you access to forums and such without needing to register.
A quick guide to fix that problem.
Using the freeware program AccessDiver to remotely run dictionary attacks on websites.
Mapping Memory Explained & Behind The Scenes
as stated above
Learn how to get your enemies hard drive!
Ever wonder how hackers/spammers/phishers can make their URLs look so...different?
How to make a fake login page and how to get people to login there..
Part 1 in a series of articles designed to help you better understand how a hacker might attack your system or network infrastructure.
Simple/easy RSS tutorial
Disclaimer: I am not responsible for you misusing this tutorial, or any damage brought upon yourself or your computer. This for educational purposes only, and should not be used for illegal music recording or distribution. *who am i kidding?
Forum rules: read this!
How to request a mentor.
Terminology and Logic behind Assembly language and an introduction to Optimization
A live example.
This is just a little collection's of method's ive discovered and learned about getting past school filter's and blocks.
How to become Admin on your school. This way works for most schools.
Direct traffic from other peoples' computer on your network through yours so you can steal logins and passwords (a.k.a. entertainment and/or revenge)!
Setting up Basic Networking in Windows, Linux and MAC
A guide on howto set up Apache
Here is a simple PHP form tutorial to help people whom are just starting PHP
Basic to Intermediate Stealth practices.
In This Artical i try to out line and explaine many tweaks used to speed firefox greately. This is not recomended for dile-up users it would have no affect. It then teaches how to do these tweaks safely a securly
how to make thermite and destroy ANYTHING
A tutorial on how to get the most out of torrents
Learn Here About trojan attacking
A brief introduction in opening xpi files and changing the plugins install file to work with newer versions of Firefox.
Several types of network based attacks, and some network defense basics. (Windows)
Turn a spare mac into a wireless router.
This article explains how to GET and POST data to webpages using PHP's cURL library, as well as some other options.
This is a guide on how to utilize Airmon-ng to be able to place a wireless interface into monitor mode, and be able to successfully use it.
This is a quick guide that will help you understand the OSI model and the TCP/IP model. Both are fundamental when dealing with any kind of networking.
This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng options and syntax.
This is a pretty thorough guide on everything Airodump-ng. It covers the basics and some of the more advanced features that are part of the tool. This part is about the Airodump-ng Results.
This is the introduction to my WiFi Tutorial Series. It is basically just a brief summary of what is to come, and what is to be expected. Please leave feedback!
This section goes over Interfaces, Drivers, and Logs. Depicts what each of the above are, how to view them, and their importance.
This section goes over the common 802.11 protocols, talks about bands and channels, and some common characteristics of antennas. Also talks about world regulartoy domains, and how to set them.
This is just a summary of the various tools that are included with the Aircrack-ng suite. It also goes over the installation process.
This article explains how to gain SYSTEM privileges on a Windows XP Operating System.
this article should explain how to find exactly what you are searching for and how to use google effectively to find topics of interest. a follow-up to spyware's article on mentor requests.
how to put a computer together
what is net send and how to use it at school
this will show you,how to slipstream your windows,and not have to connect to the internet to do it.
how to sniff on a switched network
how to get all of the user agents you'll ever need in under a minute
Most Read Articles