Skip to main content

Hacker Gadgets | Hacking Gadgets for Beginners

Sooner or later if you are IT guy, interested in security and hacking, you will start reading about various technologies, devices and electronics used by ethical hackers or penetration testers. I call it toys for boys. I have a few of them and plan to buy more, as you can easily guess, my wife is not very happy about it. These toys are not cheap and you should buy it only when you know you will use it. In any other case, it will be more of a curiosity and just a gadget instead of a work tool. However, with each of them, you will learn something new. If you have a lot of money, I can’t forbid you to buy what you want, even if you don’t need it. I have such a strange feeling that people who made money quickly, they have this as the main rule. Who cares.

Some of things listed below I use at work, some privately and some only for tests or to expand my knowledge. The list is so extensive and some products at a fairly high price that my friends have no problems, when on some occasion they need to buy me a gift. The truth is that I have no friends, no Facebook, no wife and I’m sitting in a dark basement under my mother’s house and I have to buy each gift myself 

The list

Anyway, here is the list of hacker gadgets - I will try to keep it up to date as other my articles, so feel free to get back to this list in the future, I will definitely add something new - if you know any interesting too, let me know in the comments.

ALFA AWUS036ACH


Equipped with 802.11ac wireless standards, and years of field-proven experiences, ALFA AWUS036ACH provides 2.4GHz 300Mbps or 5.0GHz 867Mbps Wi-Fi data transfer speeds for outstanding blah blah blah… best wireless USB network card you need to hack your neighbor WIFI. Recommended to use with Kali, mentioned in any WIFI hacking guide. I have it, works like a charm. You need it! You need it, if you want to test some WIFI security.
TP-LINK TL-WR802N

TL-WR802N-04

300Mbps Wireless N Nano Router. Pocket-size ideal for travel use. I always have it with me on my holiday or business trip. Small and fast. Easy to configure. It provides me with safe use of the Internet in the hotel room. Thanks to this device, your computer is not exposed directly to a publicly available network. This one is popular in my country, but you will probably find similar in place you live. I also recommend GL-iNet products like microuter-N300, Shadow (GL-AR300M Series) or Mango (GL-MT300N-V2).
YubiKey

5nfc-key

The industry’s #1 security key, enabling strong two-factor, multi-factor and passwordless authentication. I am using YubiKey 5 NFC. Best option for two factor authentication. Easy to use with many services and operating systems. NFC function works very well with mobile phones. Yubico company provides many variants of Yubikey, if you are not sure which one you should choose, use their quiz to get suggestion. I sleep more peacefully with this key.
Hardware Wallet

hardware-wallets

If you are a cryptocurrency enthusiast, have a lot of various coins and want to properly secure your funds, you should think about a hardware wallet. There are two popular suppliers of this type of equipment on the market. Trezor and Ledger. Both offer two devices. Trezor One, Trezor Model T and Ledger Nano S, Ledger Nano X. I do not have enough cryptocurrencies to worry about their safe storage, the devices are so expensive that it is not profitable for me to buy them yet. I trust my long strong password stored in KeepassXC and the encryption and backup of the wallets. However, I have one Trezor in mind.
USB killer

USBKill-V4

The USBKill is a device that stress tests hardware. When plugged in, power is taken from a USB-Port, multiplied, and discharged into the data-lines, typically disabling an unprotected device. The new models have the option of remote activation from the phone or after a specified time.
Hardware keylogger

airdrive-keylogger

The AirDrive Keylogger is an innovative ultra-small USB hardware keylogger, only 0.8” (20 mm) in length. It can be accessed with any Wi-Fi device such as a computer, laptop, tablet or smartphone.
Camera cover

camera-cover

The covers for the camera are available in various colors, sizes and made from various materials. They are probably not as popular as they used to be and if someone wanted to use them, should consistently do it on every device not only on laptop. Of course, being watched by a camera on your own laptop is most likely, but also difficult to achieve. Most people who are aware of what they are doing on the network and on their own computer, with an appropriate anti-virus/firewall program, are the least at risk. However, if you know a not responsible computer user, buy him such a cover. It also looks much better than a piece of tape.
Portable Cell Phone Jammers

EO08007

The signal jammer is a cool thing. Be careful, however, because devices of this type should not be used in public spaces. In most places on earth, such devices are considered illegal and their use is forbidden by law. Do not buy cheap Chinese counterfeit products and make sure the radio is adjusted to the wavebands used in your country before buying. From now on, blocking Wifi, GSM, LTE, GPS, Bluetooth is not a problem.
Data Blocker

data-blocker

Simply attach between your USB cable and charger to physically block data transfer or syncing. Charge mobile devices without any risk of hacking or uploading viruses.
Amateur Radio

BAOFENG-UV-5R

An amateur, portable radio can be useful to listen to what is happening on the air. I recommend BAOFENG UV-5R Dual Band Handheld. Not all uniformed services use the new digital and encrypted solutions. Remember not to transmit because a permit is required for this. Do not make what you listen to publicly because it is also regulated by law depending on the country.
Precision Screwdriver Repair Tool Kit

reapir-toolkit

If you often disassemble various types of devices, you definitely need this type of set. It is useful not only for hackers, but also for repairing electronics at home or opening a laptop for cleaning. Personally I am using tool kit from IFIXIT. Very good quality. Previously, I had various types of cheaper sets that always broke and damaged over time because of poor quality. It is worth investing in something better than throwing out the tip with each screw.
Smart Card RFID Reader/Writer NFC

card-reader-writer

Portable and stationary devices for reading and writing various types of access cards. Useful when we have access to, for example, an employee card and would like to clone it. Used for building penetration testing.
Magnetic Card Reader & Writer

magnetic-card-writer

MSR X6 Magnetic Card Reader & Writer is able to read/write/erase on Hi&Lo Coercive cards on track 1/2/3, including credit cards, ATM cards, drivers license, grocery stores, gift cards etc. Perfect for card cloning.
Blockplate

seed-plate


Have you ever wondered how to safely store the seed of your BTC wallet? I don’t mean a program like KeepassXC, but something more offline, in the event of a program, computer or backup failure. It cannot be a piece of paper in a safe, because the paper deteriorates quickly. Until recently, I did not know that such a thing existed. Check Blockplate, Cassette Solo or Capsule Solo. A piece of steel on which you can save your seed and keep it in a safe, without fear that it will be damaged.
Privacy roll stamp

roller-rubber-stamp

I have no idea how this is called, I call it privacy roll stamp and I bought it on Aliexpress, it showed when I was browsing some products as something that might interest me. First time advertisement was useful. If you care about your privacy and the security of your data, you probably have a shredder at home and all documents are properly destroyed before they end up in the trash. If you are fed up with tearing waybills off parcels or bothersome blurring them with a marker pen, you will like this funny roller rubber stamp. You will erase important information quickly and efficiently.
Solar charger

solar-charger

Portable, folding, waterproof solar charger. Sometimes can save your life, if you are in the wild and need to win important auction on eBay.
Lock Pick Set

lockpicks

Lock picking is the practice of unlocking a lock by manipulating the components of the lock device without the original key. Although lock-picking can be associated with criminal intent, it is an essential skill for the legitimate profession of locksmithing, and is also pursued by law-abiding citizens as a useful skill to learn, or simply as a hobby (locksport).
RFID Detector

rfid-detector
With this RFID Detector you can find out frequency and duty cycle of any passive LF (125kHz) / HF (13.56 MHz) reader!
USB Rubber Ducky

rubber-ducky

Imagine plugging in a seemingly innocent USB drive into a computer and installing backdoors, exfiltrating documents, or capturing credentials. Awesome right. Do it like a pro, do it in Mr. Robot style!

Comments

Popular posts from this blog

How to hack wifi in Windows 7/8/8.1/10 without any software | using with cmd

How to Hack Wifi password using cmd Hello Friends, In this article we will share some tricks that can help you to hack wifi password using cmd. Youcan experiment these trick with your neighbors or friends. It’s not necessarily that this trick will work with every wifi because of upgraded hardware. But you can still try this crack with wifi having old modems or routers. 1: WEP: Wired Equivalent Privacy (WEP) is one of the widely used security key in wifi devices. It is also the oldest and most popular key and was added in 1999. WEP uses 128 bit and 256-bit encryption. With the help of this tutorial, you can easily get into 128-bit encryption and Hack WiFi password using CMD. 2: WAP and WAP2: Wi-Fi Protected Access is an another version of WiFi encryption and was first used in 2003. It uses the 256-bit encryption model and is tough to hack. WAP2 is an updated version of WAP and was introduced in 2006. Since then it has replaced WAP and is now been used mostly in offices and colleges w

സുമതിയെ കൊന്ന വളവ് | The real Story of Sumathi valavu

സുമതി വളവ്.. മൈലമൂട് സുമതിയെ കൊന്ന വളവ് എന്ന് കേട്ടാല്‍ കേള്‍ക്കുന്നവരുടെ മനസ്സ് അറിയാതൊന്ന് കിടുങ്ങുന്നകാലമുണ്ടായിരുന്നു .അത്ര കണ്ട് ഭയമാണ് ഈ സ്ഥലത്തെക്കുറിച്ച് നാട്ടുകാരുടെ മനസ്സില്‍ഒരു കാലത്ത് ഉണ്ടായിരുന്നത്. അറുപത് വര്‍ഷം മുമ്പ് കൊല ചെയ്ത സുമതിയെന്ന ഗര്‍ഭിണിയായ യുവതിയുടെ ആത്മാവ് ഗതി കിട്ടാതെ ഇവിടെ അലഞ്ഞ് തിരിഞ്ഞ് നടക്കുന്നുവെന്ന വിശ്വാസമാണ് ഭയത്തിന് കാരണം. തിരുവനന്തപുരം ജില്ലയില്‍ കല്ലറ പാലോട് റോഡില്‍ മൈലമൂട്ടില്‍ നിന്നും അര കിലോമീറ്റര്‍ ദൂരെ വനത്തിനുള്ളിലെ കൊടും വളവാണ് സുമതിയെ കൊന്ന വളവ് എന്ന സ്ഥലം. ഇവിടെ വച്ചാണ് സുമതി കൊല്ലപ്പെട്ടത്. വനപ്രദേശമായതിനാല്‍ സന്ധ്യ മയങ്ങുമ്പോള്‍ തന്നെ ഇരുട്ടിലാകുന്ന സ്ഥലമാണിത്. ഇടതിങ്ങി വളര്‍ന്ന് നില്‍ക്കുന്ന മരങ്ങളുള്ള റോഡില്‍ ഒരുവശം വലിയ ഗര്‍ത്തമാണ്.ഒപ്പം കാടിന്റെ വന്യമായ വിജനതയും. ഇതിനൊപ്പം പൊടിപ്പും തൊങ്ങലും വച്ച് പ്രചരിയ്കുന്ന കഥകള്‍ കൂടിയാകുമ്പോള്‍ എത്ര ധൈര്യശാലിയായാലും ഈ സ്ഥലത്തെത്തുമ്പോള്‍ സുമതിയുടെ പ്രേതത്തെക്കുറിച്ച് അറിയാതെയെങ്കിലും ഓര്‍ത്ത് പോകും.പ്രത്യേകിച്ചും രാത്രി കാലങ്ങളില്‍. സുമതി മരിച്ചിട്ട് ഇപ്പോള്‍ അറുപത് വര്‍ഷം കഴിഞ്ഞു. എന്നിട്ടു

A Beginner’s Guide to Getting Started with Bitcoin

A man looks for Bitcoin Oasis If you have heard about blockchain or cryptocurrency, then the term that initially comes to mind is Bitcoin . Launched 12 years ago, it was the late 2017 bull run that created a media frenzy that propelled Bitcoin into the mainstream and our modern day lexicon. Often labeled as the “original” cryptocurrency, Bitcoin has been the catalyst (directly and/or indirectly) behind many new innovations in the blockchain and digital asset space, most notably Ethereum and Monero . Shortly after the late 2017 bull run lost its steam, interest in these new technologies started to fade ― but here we are in 2021 with Bitcoin having risen like a phoenix from the ashes. As you would assume, an appetite for the blockchain and digital asset space has returned and now it is more important than ever that we understand what exactly is behind this unique asset, Bitcoin. This article is meant to be a guide for individuals who are new to cryptocurren