Tech Tutorials

STEAM Labs’ ethical hacking posts are designed to educate, guide, and demonstrate hacking tools for penetration testing purposes only. We are not responsible for anyone using these skills for illegal or malicious attacks.

VEX V5 Programming – Get started with PROS for beginners | VEX V5 – Push Back

Welcome to Part 1 of our PROS for Beginners series for VEX V5! 🚀 In this video, we’ll guide you through the essential first steps to get started with PROS (the open-source development environment for VEX). Perfect for beginners, this tutorial covers everything from installation to setting up a simple drive base, controlling pneumatics, and testing Push Back performance.

Read More »

Learn how to use Fusion 360 for VEX V5 like a pro!

In this video, we break down the essentials of designing custom parts, assemblies, and mechanisms using Fusion 360 specifically for VEX V5 robotics. Whether you’re a beginner or looking to level up your CAD skills, this step-by-step guide will help you create competition-ready designs faster and smarter.

Read More »

A Closer Look at the Cutting-Edge VEX V5 Robotics System

The VEX V5 Robotics System is a revolutionary platform, empowering future engineers with its state-of-the-art components and advanced programming features. Its modular design and diverse sensor options make it suitable for beginners and experts alike, fostering creativity and innovation in robotics.

Read More »

Cyber security – Basic skills of an ethical hacker

This educational video is tailored for students studying cybersecurity. It covers topics such as Nmap reconnaissance, brute force attacks with Hydra, Wi-Fi password cracking with WiFite, Metasploit exploitation, NTLM hash cracking, and DOS attacks, using tools on Kali Linux and Windows 7.

Read More »

Learn how to make and distribute malware

In this video, learn to set up trojans and viruses using njRAT and JPS Virus Maker. Download njRAT if you lack access to CEH v11 tools. Build a RAT to control a victim’s system and transfer the file for ethical hacking.

Read More »

Metasploit For Beginners

Learn how to use Metasploit to deploy payloads and create malicious .exe files with MSFVenom in this tutorial. Gain remote access to target machines, change user wallpaper, stream videos, prompt fake updates, and escalate privileges.

Read More »

How to hack a Windows 10 webcam (and more)

Learn how to create malicious files for phishing attacks using MSFVenom. Develop payloads to penetrate Windows systems, including creating a backdoor to remotely access a victim’s machine. This tutorial is for educational purposes only.

Read More »