Cybervelia
Subscribe
Sign in
Home
Cybervelia
Playground
About
New
Top
Graphicator Tool!
Mention of our new GraphQL tool named Graphicator
May 21
•
Theodoros Danos
Share this post
Graphicator Tool!
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
Attack Surface Intelligence? 5 tools to boost your results!
If you are working as a penetration tester, you must be aware of the 5 tools so you can enhance your results. The attack vector to which companies are…
May 17
•
Theodoros Danos
Share this post
Attack Surface Intelligence? 5 tools to boost your results!
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
If you are an indi-developer, a hardware company or a software company, you must be protected against the following vulnerabilities. The following are…
May 17
•
Theodoros Danos
Share this post
Do you develop an IoT product? Read the Top 10 vulnerabilities you should be aware!
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
How skillful are you in BLE Security?
This is a question for all of you reading this article: How good are your skills at pen-testing BLE devices? There are hundred of companies that excel…
May 17
•
Theodoros Danos
Share this post
How skillful are you in BLE Security?
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
Where most IoT products fail?
The Sacrifice of the Queen Most of the IoT products are very small in size, and some of them may not have an interface at all – maybe just a push…
May 17
•
Theodoros Danos
Share this post
Where most IoT products fail?
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
Develop Bluetooth Apps | Fundamentals, Tools & Code
In the Bluetooth world the Bluetooth technology has been evolved to support a sub-protocol of Bluetooth which is more energy aware. So we have Bluetooth…
May 17
•
Theodoros Danos
Share this post
Develop Bluetooth Apps | Fundamentals, Tools & Code
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
Mobile Bug Bounty Hunting? Enter BLE
An overview of BLE Security Vector and Bug Bounty Hunting
May 17
•
Theodoros Danos
Share this post
Mobile Bug Bounty Hunting? Enter BLE
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
Hacking Smartwatches for Spear Phishing
In this article we explain how to hack into a SmartWatch and show a custom text message
May 17
•
Theodoros Danos
Share this post
Hacking Smartwatches for Spear Phishing
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
Testing a mobile app using a device you don’t have
We will go through a BLE Bulb Application and try to make the BLE communication happen without having the actual bulb in our hands
May 17
•
Theodoros Danos
Share this post
Testing a mobile app using a device you don’t have
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
GraphQL exploitation – All you need to know
So you are a tester and you would like to know more about GraphQL Testing. No more sparse information, we cover enough to get you started. This post…
May 16
•
Theodoros Danos
Share this post
GraphQL exploitation – All you need to know
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
April 2023
BLE Course Finally Launched
Cybervelia Playground - BLE Course Launch
Apr 19
•
Theodoros Danos
Share this post
BLE Course Finally Launched
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
March 2023
BLE Security Course!
Hacking BLE mobile apps and BLE devices
Mar 22
•
Theodoros Danos
Share this post
BLE Security Course!
blog.cybervelia.com
Copy link
Facebook
Email
Notes
Other
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts