• Toggle sidebar
Necrum Security Labs logo
  • Blog
  • Portfolio
  • 3 scary tools that use Shodan search engine 3 ways to become root by exploiting the .bashrc file A hidden web shell in the plug-in wireless Planex MZK-DP150N | CVE-2021-37289 Are professional hackers also excellent magicians? Bob’s Cap - CTF Challenge Build your own WiFi Pineapple Tetra for $7. Crack Me 1 - CTF Challenge Crack Me 2 - CTF Challenge CTF Flag Mart - CTF Challenge Damn Cheap Cipher 2 - CTF Challenge Emoji - CTF Challenge Flask Task - CTF Challenge Hacker Kombat (THE GAME) - CTF Challenge Hackermon - CTF Challenge I Love Listings - CTF Challenge JabberJaw - Convert your router in portable network attack device. Not So Simple Cipher - CTF Challenge Pug a Plenty - CTF Challenge Secure any URL or Qr Code with a password! Simple Cipher - CTF Challenge Triva Unsecured - CTF Challenge VPN Ivacy, insecure design vulnerability discovered. Zipper - CTF Challenge
    Show All CTF Cryptography Forensics Hak5 JabberJaw MIPS_24Kc OpenWrt Privacy Reconnaissance Reverse Engineering SharkJack Shell Shodan Tools Web WiFi WiFi Pineapple backdoor bash cve script vulnerability
    JabberJaw - Convert your router in portable network attack device.

    Sunday, January 2nd 2022
    Hak5, JabberJaw, OpenWrt, SharkJack

    In this article I will explain how it is possible to convert any OpenWrt compatible router to a Hak5 Shark Jack device, effectively turning it into ...


    0xSamy_ NeroTeam Security Labs (NSLabs).
    © All right reserved 2023