Null Byte
Ethical hacking, hardware exploits, and network security with a focus on practical tutorials and live demonstrations.
Nutrition Label
Null Byte delivers highly practical cybersecurity content, prioritizing live demonstrations and physical hardware builds over abstract theory. Viewers can expect reliable, step-by-step tutorials that show real-time execution and troubleshooting, though the focus is on applying existing tools rather than discovering new vulnerabilities.
Strengths
- +
- +
- +
Notes
- !Videos frequently promote the creator's own paid courses; check descriptions for affiliation details.
- !Content focuses on executing known exploits and tools rather than theoretical research or novel discovery.
Rating Breakdown
Breakdown across the key dimensions we rate. Methodology →
Recent Videos

Null Byte Wants You!

LoRa for Hackers: Testing Long-Range Remote Control in the Real World

Hacking the Skies: Creating Ghost Drone Swarms with Spoofed IDs for $20

Setting Up an Ethical Hacking Kit with a Raspberry Pi 5

How Hackers Use Xerosploit for Advanced MiTM Attacks
![Use Facial Detection & Recognition on an ESP32 Wi-Fi Camera [Tutorial]](/_next/image?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2FLOqVIe9cnW8%2Fhqdefault.jpg&w=3840&q=75)
Use Facial Detection & Recognition on an ESP32 Wi-Fi Camera [Tutorial]
![Create a Wi-Fi Spy Camera with an ESP32-CAM [Tutorial]](/_next/image?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2Ftx09GFGgVwA%2Fhqdefault.jpg&w=3840&q=75)
Create a Wi-Fi Spy Camera with an ESP32-CAM [Tutorial]
![Use the Deauther Watch Wi-Fi Hacking Wearable [Tutorial]](/_next/image?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2FH0kRS5zR3-w%2Fhqdefault.jpg&w=3840&q=75)
Use the Deauther Watch Wi-Fi Hacking Wearable [Tutorial]
![Fingerprint Web Apps & Servers for Better Recon [Tutorial]](/_next/image?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2FBDsRy9EzBVg%2Fhqdefault.jpg&w=3840&q=75)
Fingerprint Web Apps & Servers for Better Recon [Tutorial]
![Get Started with Kali Linux as a Bootable Live USB [Tutorial]](/_next/image?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2F_PGJ980upPQ%2Fhqdefault.jpg&w=3840&q=75)
Get Started with Kali Linux as a Bootable Live USB [Tutorial]
![Clear the Logs & History on Linux Systems to Delete All Traces You Were There [Tutorial]](/_next/image?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2F1Fs3wFA0C1k%2Fhqdefault.jpg&w=3840&q=75)
Clear the Logs & History on Linux Systems to Delete All Traces You Were There [Tutorial]

Watch Hackers Deploy Ransomware Through Wi-Fi Hacking

Watch Hackers Demonstrate Windows Exploits & Privilege Escalation (ft. Kilian from SecurityFWD)
![Practice Wi-Fi Hacking Legally with ESP8266 CTF Games [Tutorial]](/_next/image?url=https%3A%2F%2Fi.ytimg.com%2Fvi%2FIK0M5ISGevo%2Fhqdefault.jpg&w=3840&q=75)
Practice Wi-Fi Hacking Legally with ESP8266 CTF Games [Tutorial]

Watch Hackers Demonstrate a Ransomware Attack (ft. Kilian from SecurityFWD)
Why this rating
Evidence receipts showing why each dimension is rated the way it is.
“If we look at the app, we can see that there are now 16 drones nearby... we've successfully confused the drone scanner application.”[2:18] →
Demonstrates the exploit working in real-time on a mobile device, validating the code and hardware setup immediately.
“We're going to be using an ESP8266... these cost around $5.”[1:15] →
The video delivers exactly on the promise of creating ghost drones for under $20, showing the specific hardware and code.
“The frame contains a vendor specific element... identified by the OUI or Organizationally Unique Identifier. For Open Drone ID, this is set to FA0BBC.”[0:52] →
Goes beyond surface-level explanation to define the specific byte-level packet structure required for the spoofing attack.