• Toggle sidebar
Necrum Security Labs logo
  • Home
  • Blog
  • 3 scary tools that use Shodan search engine 3 ways to become root by exploiting the .bashrc file A hidden web shell in the plug-in wireless Planex MZK-DP150N | CVE-2021-37289 Are professional hackers also excellent magicians? Bob’s Cap - CTF Challenge Build your own WiFi Pineapple Tetra for $7. Crack Me 1 - CTF Challenge Crack Me 2 - CTF Challenge Crack Me 3 - CTF Challenge CTF Flag Mart - CTF Challenge Damn Cheap Cipher 2 - CTF Challenge Emoji - CTF Challenge Flask Task - CTF Challenge Hacker Kombat (THE GAME) - CTF Challenge Hackermon - CTF Challenge I Love Listings - CTF Challenge JabberJaw - Convert your router in portable network attack device. Not So Simple Cipher - CTF Challenge Pug a Plenty - CTF Challenge Secure any URL or Qr Code with a password! Simple Cipher - CTF Challenge Triva Unsecured - CTF Challenge VPN Ivacy, insecure design vulnerability discovered. Zipper - CTF Challenge
    Show All CTF Cryptography Forensics Hak5 JabberJaw MIPS_24Kc OpenWrt Privacy Reconnaissance Reverse Engineering SharkJack Shell Shodan Tools Web WiFi WiFi Pineapple backdoor bash cve script vulnerability
    JabberJaw - Convert your router in portable network attack device.

    Blog post cover image


    2022/01/02 - Hak5 , JabberJaw , OpenWrt , SharkJack

    In this article I will explain how it is possible to convert any OpenWrt compatible router to a Hak5 Shark Jack device, effectively turning it into your very own portable ...

    Build your own WiFi Pineapple Tetra for $7.

    Blog post cover image


    2021/11/06 - Hak5 , MIPS_24Kc , OpenWrt , WiFi Pineapple

    Let's talk about the WiFi Pineapple! This little gem normally sells for about $99 that allows cybercriminals pentesters to capture data shared on public WiFi networks. ...

    VPN Ivacy, insecure design vulnerability discovered.

    Blog post cover image


    2021/09/10 - Web , vulnerability

    Few weeks ago, having finally got a real internet connection at home (no more pocket WiFi!), I started looking for a VPN provider to fully enjoy Netflix. In the same ...

    Crack Me 3 - CTF Challenge

    Blog post cover image


    2021/09/01 - CTF , Reverse Engineering

    The challenge involved reverse-engineering a compiled 64-bit ELF PIE executable to extract an encoded flag hidden in memory.

    3 ways to become root by exploiting the .bashrc file

    Blog post cover image


    2021/08/14 - backdoor , bash

    You did it! You have discovered a vulnerability and successfully exploited it. Congratulations, you have gained access to the server. However, as your current user rights ...

    • 1
    • 2
    • 3
    • 4

    0xSamy_.
    © All right reserved 2025