PRINT
PRINT
SEND MAIL
SEND MAIL

Transform your Tablet or Smartphone to Cyber Attack Weapon and Hack with one click!

Transform your smartphone or tablet to a cyber attack weapon with our new hacking tools pack the package includes  the tools listed below and a How-to.txt file to set them all up: Tools List:   Barcode Scanner+ (Plus) 1.12.1 bcmon BlueNMEA Bugtroid Pentesting _v5.0_apkpure.com BusyBox for Android_v6.7.3.0_apkpure.com BusyBox_6.7.3.0 BusyBox_v50_apkpure.com...

Continue reading

Metasploit Cheat Sheet

The Metasploit Project is a computer security project that provides information on vulnerabilities, helping in the development of penetration tests and IDS signatures.Metasploit is a popular tool used by pentest experts.Metasploit :Search for module:ms...

Continue reading

Post Exploitation on Saved Password with LaZagne

This article will be focused on The LaZagne project and its usage in Post Exploitation. Table of Content: Introduction of LaZagne Project Syntax and Parameters Achieve Meterpreter and Upload LaZagne Help Screen Mails Argument Windows Argument Browsers Argument Databases Argument Wi-Fi Argument All Argument oN Parameter Verbose Mode Parameter...

Continue reading

How to Attack and Defend a Prosthetic Arm

Like other IoT devices, the prosthetic arm sends statistics to the cloud, such as movement amplitudes, the arm’s positions, etc. And just like other IoT devices, this valuable invention must be checked for vulnerabilities. In our research, we focused on those attack vectors that can be implemented without the...

Continue reading

©2021 By Cyber Sec Labs

   

CONTACT US

We're not around right now. But you can send us an email and we'll get back to you, asap.

Sending

Log in with your credentials

or    

Forgot your details?

Create Account