Cyber Weapons Lab

Article cover image
Sep 11, 2023

When setting up a Raspberry Pi, it's easy to overlook changing the default password. Like many IoT devices, the Raspberry Pi's default Raspbian operat ...

Article cover image
Aug 30, 2022

Spoofed phone calls originate from one source that's disguising its phone number as a different one, and you probably get these calls all the time. Ma ...

Article cover image
Jun 22, 2021

The ESP32-CAM is a convenient little camera module with a lot of built-in power, and you can turn one into an inconspicuous spy camera to hide in any ...

Article cover image
Jun 8, 2021

A man-in-the-middle attack, or MitM attack, is when a hacker gets on a network and forces all nearby devices to connect to their machine directly. Thi ...

Article cover image
May 28, 2021

If you've recently built a Wi-Fi spy camera out of an ESP32-CAM, you can use it for a variety of things. A baby monitor at night, a security camera fo ...

Article cover image
May 24, 2021

An ESP32-based microcontroller with a camera is an amazing platform for video, but not all modules are created equal. We'll go over the pros and cons ...

Article cover image
May 14, 2021

The Deauther Watch by Travis Lin is the physical manifestation of the Wi-Fi Deauther project by Spacehuhn, and it's designed to let you operate the De ...

Article cover image
May 7, 2021

Web applications are ubiquitous in the modern online world, and knowing how to attack them is an increasingly valuable skill. But the key to a success ...

Article cover image
Apr 23, 2021

Kali Linux is the go-to Linux distribution for penetration testing and ethical hacking. Still, it's not recommended for day-to-day use, such as respon ...

Article cover image
Apr 16, 2021

As a hacker, the final stage of exploitation is covering their tracks, which involves wiping all activity and logs so that they can avoid being detect ...