hey dear null-byte hackers & programmers. we all had hard day on our own.some times we got lost our target when we were try to social eng on him/her . most of times we get part of program that bugs it but we cant del it or fix it nor change it with some thing else. some times ...more
ma k's Latest Posts
hey i was thinking of what is best crypting method that decrypt only when decrypter has key of it ( not like md5 and ez crypto types: D) so any idea i personaly like enigma tell me what kind of you like and why you think its good!
hello every one , i was starting up to build my channel on youtube i wanted some advise how to get more viewers on there. (ofc subject of channel gonna be programming / pentesting ) tnx for your answers!.
Forum Thread : Your Review for Mr Robot Series (Might Get Spoild So Dont Come if You Didnt Finish Yet)
so as you all know last episode of Mr robot finished today whats your opinion on this series specially last episode.
hey dear hackers and coders in null -byte so i wanted to have some fun with armitage hacking webservers with it and i assume that you know how to do it and been throw it so as you know if server have exploit it shows shell id and menu that you get interact upload pass session ...more
hey world so as you know when you working on kinda target that close page fast and you have shitty speed cuz you do it over wan its get hard to use moudles you want so i started googling about it and ended up with this http://blog.beefproject.com/2012/08/happy-hooking-beef-au ...more
hey dear hackers and programmers. i wanted to start learning Ruby but i wanted some advise from you guyz i know python - c++ but as i wanted to start writing my own exploities wanted to learn this amazing ruby now where to start good book or youtube channel for it tnx for answ ...more
hi i was thinking how i can hack some one outside of my network via his ip and knowing some of his open ports probebly with metasploit was thinking on search what runs that port and exploit it but lets say i know my target 4444 port is open how to exploit it tnx for answer <3