Security Trybe Profile picture
Feb 22, 2023 9 tweets 4 min read Read on X
Top 9 Hacker Gadgets

1. Raspberry Pi:

This is a low cost credit card sized desktop computer that runs Linux and it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming.
2. Rubber Ducky USB

The Rubber ducky looks similar to a USB Pen drive, it can be used for variety of attacks, hack a system, inject a keystroke into a system, inject payloads and also steal information and sensitive data.
3. LAN Turtle

The LAN Turtle by Hak5 is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.
4. Crazy Radio

This is a long range open USB radio dongle Radio power amplifier giving 20dBm output power · 1km range LOS with Crazyflie 2.0. It is also a great building block for systems that require longer range than WiFi
5. Cactus WHID (Keylogger)

This is a Keylogger it allows Keystrokes to be sent through WiFi to a target Machine.
The target recognises the Ducky as both a standard HID keyboard and a serial port, allows interactive commands and scripts to be executed on the target remotely.
6. Dstike Wi-Fi Duether

Dstike can kick devices off a network irrespective of whether you are connected to it or not, it scans for nearby networks and selects individuals or networks it wants to kick out then kick it out
7. Magspoof

Magspoof allows its user to store different kind of credit cards and magstripes in one device. The device that can spoof/emulate any magnetic stripe or credit card
8. Ubertooth One

Ubertooth One is a small, open-source USB device with an antenna powered by an ARM Cortex-M3 chip and a CC2400 wireless transceiver. You can sniff and monitor Bluetooth signals from nearby devices
9. Wi-Fi Pineapple

Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.

#cybersecurity #Hacked #Hacker

• • •

Missing some Tweet in this thread? You can try to force a refresh
 

Keep Current with Security Trybe

Security Trybe Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @SecurityTrybe

Jun 4
35 Top Cybersecurity Tools👇 Image
35 Top Cybersecurity Tools Cont. Image
35 Top Cybersecurity Tools Cont. Image
Read 5 tweets
Jun 2
6 Top Tools for Hackers and how the work👇 Image
1. Raspberry Pi:
This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming
2. Rubber Ducky:
The Rubber ducky looks similar to a USB Pen drive, it can be used for variety of attacks, hack a system, inject a keystroke into a system, inject payloads and also steal information and sensitive data
Read 7 tweets
May 24
🚨 Getting Into Cybersecurity: 5 Skills To Learn

With the ever-evolving landscape of digital threats and vulnerabilities, a career in cybersecurity has become more crucial than ever.

Here are skills you would need to have a sucessful career in Cybersecurity👇 Image
1. Scripting:
Scripting stands as a pivotal skill in the realm of cybersecurity, offering professionals the power to automate tasks and construct custom tools.

Cybersecurity analysts frequently encounter repetitive tasks such as log analysis, incident response, and vulnerability assessments. Scripting proves to be the key to liberating these professionals from the drudgery of manual execution of such tasks.
2. Knowledge of Intrusion Detection:
Vigilance in the Digital Realm, at the epicenter of a cybersecurity analyst's mandate lies the critical function of intrusion detection, a linchpin in the defense against potential security breaches.

Intrusion Detection Systems (IDS) emerge as the frontline warriors in the battle against cyber threats, designed to scrutinize network and/or system activities for malicious behavior or security policy violations.
IDS operates in two primary modes: signature-based detection, which identifies known patterns of malicious activity, and anomaly-based detection, which identifies deviations from established baselines.
Read 6 tweets
May 21
Cisco Networking Academy (Netacad) is offering this Certifications and Courses (FREE) 👇

1. Introduction to Cybersecurity

netacad.com/courses/cybers…
Image
2. Cybersecurity Essentials

netacad.com/courses/cybers…
Image
3. Networking Essentials

netacad.com/courses/networ…
Image
Read 4 tweets
May 14
CyberSecurity Study Guide👇

1/6
Foundation (Computer Knowledge)

*Basic Computer Skills
*Basics of Computer Networking
*Computer Hardware Components
*Understand Basics of Popular Suites (Google Suite, iCloud, MS Office)
*Linux (Everything)
*Bash (Terminal, Scripting)
*Windows Powershell
*Networking
*Programming Languages (At least 2 of These)
-Python
-C/C++
-JavaScript
-HTML

2/6
Security Knowledge

The Basics:
*OWASP Framework
*OSINT
*Recon,Scanning & Enumeration
*Exploitation & Attacking Vectors
*Privilege Escalation
*Windows Active Directory
*Exploit Dev & Payloads


Advanced:
*Malwares, Rootkits, Reserve Engineering
*Pivoting and Persistence
(Post Exploitation)


3/6
Read 6 tweets
May 7
Top 9 Hacking Gadgets and Their Uses
👇 Image
1. Flipper Zero:

Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
2. Raspberry Pi:

This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming Image
Read 10 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us!

:(