Home Forums Tips And Tricks Top 9 Hacking Gadgets and Their Uses

Tagged: 

  • Top 9 Hacking Gadgets and Their Uses

    Posted by Mynk0x00  on April 24, 2024 at 7:30 am

    1. Flipper Zero:

    Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.

    2. Raspberry Pi:

    This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming.

    3. Dstike Wi-Fi Duether :

    Dstike can kick devices off a network irrespective of whether you are connected to it or not, it scans for nearby networks and selects individuals or networks it wants to kick out then kick it out.

    4. Crazy Radio 2:

    This is a long range open USB radio dongle Radio power amplifier giving 20dBm output power · 1km range LOS with Crazyflie 2.0. It is also a great building block for systems that require longer range than WiFi.

    5. Magspoof v4:

    Magspoof allows its user to store different kind of credit cards and magstripes in one device. The device that can spoof/emulate any magnetic stripe or credit card.

    6. LAN Turtle:

    The LAN Turtle by Hak5 is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.

    7. Wi-Fi Pineapple:

    Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.

    8. Cactus WHID (Keylogger):

    This is a Keylogger it allows Keystrokes to be sent through WiFi to a target Machine.

    The target recognises the Ducky as both a standard HID keyboard and a serial port, allows interactive commands and scripts to be executed on the target remotely.

    9. USB Rubber Ducky:

    The Rubber ducky looks similar to a USB Pen drive, it can be used for variety of attacks, hack a system, inject a keystroke into a system, inject payloads and also steal information and sensitive data.

    Mynk0x00  replied 6 months ago 1 Member · 0 Replies
  • 0 Replies

Sorry, there were no replies found.

Reply to: Mynk0x00
1. Flipper Zero: Flipper Zero is a toy-like port…
Cancel
Your information:

Start of Discussion
0 of 0 replies June 2018
Now