white2hack 📚
12.5K subscribers
4.81K photos
135 videos
1.96K files
2.27K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://xn--r1a.website/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
HacKing Tools Downloader

Downloading HacKing Tools and exporting by categories to $HOME directory

GitHub
https://github.com/Anlominus/HacKing

#hacktools #pentest
🔥5
Vulmap is an open-source online local vulnerability scanner project. It consists of online local vulnerability scanning programs for Windows and Linux operating systems. These scripts can be used for defensive and offensive purposes. It is possible to make vulnerability assessments using these scripts. Also, they can be used for privilege escalation by pentesters/red teamers.

GitHub
https://github.com/vulmon/Vulmap

#hacktools
👍7
This github repository contains a collection of 125+ tools and resources that can be useful for red teaming activities

Some of the tools may be specifically designed for red teaming, while others are more general-purpose and can be adapted for use in a red teaming context.

GitHub

#pentest #hacktools #useful
👍6🔥1
Tool-X – Single Click Installer For 70 Hacking Tools on Android

Tool-X is a kali linux hacking Tool installer for android. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best tools in termux app on android.

In the Tool-X there are almost 70 hacking tools available for termux app and GNURoot Debian terminal. You can install any tool by single click.

GitHub
Source

#hacktools #mobile
🔥5
Hades-C2

Hades is a basic Command & Control framework built using Python. It is currently extremely bare bones, but I plan to add more features soon.

GitHub

#hacktools
👍5
Hackers can remove 0 or add many 0s in IP address (where the octet is 0). This can bypass firewall for SSRF attack. Even decimal & hex can be combined in IP address by using IP-Obfuscator tool. So, cyber defenders should be aware of it.

#hacktools #web
👍3🔥2
PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore.

GitHub
Materials
YouTube demo
PentestGPT on a target VulnHub

Source

#hacktools
🤔5
HackGPT

Leverage OpenAI and ChatGPT to do hackerish things

GitHub
Web site

#hacktools
👍7👏1😢1
GPT Vuln-analyzer

This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python modules and also use customtkinter and tkinter for the GUI version of the code.

This project also has a CLI and a GUI interface, It is capable of doing network vulnerability analysis, DNS enumeration and also subdomain enumeration.

GitHub

#pentest #hacktools
👍4
PentestGPT – A ChatGPT Powered Automated Penetration Testing Too

PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is constructed on top of ChatGPT and works in an interactive way to direct penetration testers during general and particular procedures.

To access the PentestGPT Tool, ChatGPT plus member is required as it relies on GPT-4 model for high-quality reasoning, also no public GPT-4 API yet. To support PentestGPT, a wrapper for ChatGPT sessions has been added.

GItHub

#hacktools #pentest
🔥8😢1
Social Engineering Attacks: Creating a Fake SMS Message

SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.

Let’s take a look at how you can send fake SMS messages.

GitHub
Article

#hacktools
👍5
Above Network Vulnerability Scanner by Caster

Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, and network security engineers. Support DTP, CDP, LLDP, OSPF, EIGRP, VRRP, HSRP, STP, LLMNR, NBT-NS и DHCPv6 protocols

GitHub

#hacktools
👍31
BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool

A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.

GitHub
Review
Awesome Burp Extensions

#web #hacktools
🔥9
PhoneSploit Pro - PhoneSploit with Metasploit Integration

An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.

GitHub

#pentest #hacktools #metasploit #mobile
👍7
Find Secrets such as API keys and Tokens for any domain.

A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors (XSS, Nuclei, SQLi etc...)

GitHub

#hacktools
👍4🤡1
Hack a Drone using Dronesploit

This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.

GitHub

#hacktools
👍5
This media is not supported in your browser
VIEW IN TELEGRAM
YaraToolkit v0.3

DocYara is an LLM assistant trained exclusively with the Yara documentation. It is the perfect companion to help you craft the best Yara rules! You can ask him anything related to Yara

Official page

#hacktools #defensice
👍7
Faraday: Open Source Vulnerability Management Platform

Modern security teams grapple with an overwhelming volume of data generated by various security tools. Analyzing and prioritizing this information is often time-consuming and prone to errors. Furthermore, coordinating remediation efforts across teams and maintaining compliance can be a significant hurdle.

Faraday addresses these challenges by consolidating vulnerability data from over 90 different security tools, normalizing it, and presenting it in a user-friendly interface. It empowers security teams to:

⛳️ Centralize Vulnerability Data: Faraday aggregates data from multiple sources, eliminating the need to switch between tools.
⛳️ Prioritize Vulnerabilities: Faraday’s visualizations help identify critical vulnerabilities, enabling teams to focus on the most pressing issues.
⛳️ Collaborate Effectively: The multi-user environment facilitates seamless communication and coordination between team members.
⛳️ Automate Repetitive Tasks: Faraday’s agents and security engineering features streamline workflows, saving time and resources.
⛳️ Maintain Compliance: Customizable reporting templates ensure compliance with industry standards

❗️GitHub

Дополнительно:
⛳️ Анонс + и еще один
⛳️ Официальный сайт

#defensive #hacktools
👍5🤔3