white2hack 📚
12.5K subscribers
4.81K photos
135 videos
1.96K files
2.27K links
Кибербез. Книги, гайды, how to, ликбез. Аналитика, тренды, карьера, эвенты. Этичный хакинг и защита своих данных

🔊 Связь @w2hack_feed_bot
💬 Чат https://xn--r1a.website/+VdkEIWudTi5m3dsA
💡 Консультация https://forms.gle/iB9iX3BwyxJM4Ktx5
🏛 Обмен -- private --
Download Telegram
Tool-X – Single Click Installer For 70 Hacking Tools on Android

Tool-X is a kali linux hacking Tool installer for android. Tool-X is Developed By Rajkumar Dusad. with the help of Tool-X you can install best tools in termux app on android.

In the Tool-X there are almost 70 hacking tools available for termux app and GNURoot Debian terminal. You can install any tool by single click.

GitHub
Source

#hacktools #mobile
🔥5
Hades-C2

Hades is a basic Command & Control framework built using Python. It is currently extremely bare bones, but I plan to add more features soon.

GitHub

#hacktools
👍5
Hackers can remove 0 or add many 0s in IP address (where the octet is 0). This can bypass firewall for SSRF attack. Even decimal & hex can be combined in IP address by using IP-Obfuscator tool. So, cyber defenders should be aware of it.

#hacktools #web
👍3🔥2
PentestGPT – A ChatGPT Powered Automated Penetration Testing Tool

PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore.

GitHub
Materials
YouTube demo
PentestGPT on a target VulnHub

Source

#hacktools
🤔5
HackGPT

Leverage OpenAI and ChatGPT to do hackerish things

GitHub
Web site

#hacktools
👍7👏1😢1
GPT Vuln-analyzer

This is a Proof Of Concept application that demostrates how AI can be used to generate accurate results for vulnerability analysis and also allows further utilization of the already super useful ChatGPT made using openai-api, python-nmap, dnsresolver python modules and also use customtkinter and tkinter for the GUI version of the code.

This project also has a CLI and a GUI interface, It is capable of doing network vulnerability analysis, DNS enumeration and also subdomain enumeration.

GitHub

#pentest #hacktools
👍4
PentestGPT – A ChatGPT Powered Automated Penetration Testing Too

PentestGPT has been released on GitHub under the operator “GreyDGL,” a Ph.D. student at Nanyang Technological University, Singapore. It is constructed on top of ChatGPT and works in an interactive way to direct penetration testers during general and particular procedures.

To access the PentestGPT Tool, ChatGPT plus member is required as it relies on GPT-4 model for high-quality reasoning, also no public GPT-4 API yet. To support PentestGPT, a wrapper for ChatGPT sessions has been added.

GItHub

#hacktools #pentest
🔥8😢1
Social Engineering Attacks: Creating a Fake SMS Message

SMS messages or commonly referred to as text messages is a protocol originally developed in the 1980-1980s and first implemented on the European mobile standard GSM in the 1990-1990s has since been implemented into nearly every mobile communication protocol. It allows the users to send a short message (SMS is an acronym for short message service) of less than 160 characters from one person to another over the mobile network. It has become a ubiquitous feature of mobile communication in the 21st century.

Let’s take a look at how you can send fake SMS messages.

GitHub
Article

#hacktools
👍5
Above Network Vulnerability Scanner by Caster

Automates the search for network vulnerabilities, designed for pentesters, Red Team operators, and network security engineers. Support DTP, CDP, LLDP, OSPF, EIGRP, VRRP, HSRP, STP, LLMNR, NBT-NS и DHCPv6 protocols

GitHub

#hacktools
👍31
BurpGPT – ChatGPT Powered Automated Vulnerability Detection Tool

A Burp Suite extension that integrates OpenAI's GPT to perform an additional passive scan for discovering highly bespoke vulnerabilities, and enables running traffic-based analysis of any type.

GitHub
Review
Awesome Burp Extensions

#web #hacktools
🔥9
PhoneSploit Pro - PhoneSploit with Metasploit Integration

An all-in-one hacking tool written in Python to remotely exploit Android devices using ADB (Android Debug Bridge) and Metasploit-Framework.

GitHub

#pentest #hacktools #metasploit #mobile
👍7
Find Secrets such as API keys and Tokens for any domain.

A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vectors (XSS, Nuclei, SQLi etc...)

GitHub

#hacktools
👍4🤡1
Hack a Drone using Dronesploit

This CLI framework is based on sploitkit and is an attempt to gather hacking techniques and exploits especially focused on drone hacking. For the ease of use, the interface has a layout that looks like Metasploit.

GitHub

#hacktools
👍5
This media is not supported in your browser
VIEW IN TELEGRAM
YaraToolkit v0.3

DocYara is an LLM assistant trained exclusively with the Yara documentation. It is the perfect companion to help you craft the best Yara rules! You can ask him anything related to Yara

Official page

#hacktools #defensice
👍7
Faraday: Open Source Vulnerability Management Platform

Modern security teams grapple with an overwhelming volume of data generated by various security tools. Analyzing and prioritizing this information is often time-consuming and prone to errors. Furthermore, coordinating remediation efforts across teams and maintaining compliance can be a significant hurdle.

Faraday addresses these challenges by consolidating vulnerability data from over 90 different security tools, normalizing it, and presenting it in a user-friendly interface. It empowers security teams to:

⛳️ Centralize Vulnerability Data: Faraday aggregates data from multiple sources, eliminating the need to switch between tools.
⛳️ Prioritize Vulnerabilities: Faraday’s visualizations help identify critical vulnerabilities, enabling teams to focus on the most pressing issues.
⛳️ Collaborate Effectively: The multi-user environment facilitates seamless communication and coordination between team members.
⛳️ Automate Repetitive Tasks: Faraday’s agents and security engineering features streamline workflows, saving time and resources.
⛳️ Maintain Compliance: Customizable reporting templates ensure compliance with industry standards

❗️GitHub

Дополнительно:
⛳️ Анонс + и еще один
⛳️ Официальный сайт

#defensive #hacktools
👍5🤔3
Изменения в облаке тегов:

[+] Добавлены новые теги:

#management - все для CISO, BISO, Lead Team, менеджмент ИБ в компании, управление командой, оценка ИБ продукта, от красноглазого батрака до белого воротничка
#architecture - безопасное проектирование, secure by design, архитектурное ревью ИТ инфраструктуры, STRIDE, Zero trust, Shift left концепции
#HR -поиск, вербовка, удержание кадров в ИТ\ИБ, специфика найма ИТ\ИБ-спецов, методы оценки кандидатов, прохождение интервью, мотивация, современный стэк технологий

[/] Изменение существующих тегов:
#great - все материалы по мотивации, вдохновению, саморазвитию, финансовой грамотности, инвестициям, все лучшее от автора w2hack переходит к новому тегу от прежнего #info
👍9👀2🫡2🤔1
💻 Awesome Burp Extensions

A curated list of amazingly awesome Burp Extensions

❗️GItHub

See also:
Free and commercial addons catalog
Habr (Rus)
Top 2023 (Rus)

#web #hacktools
Please open Telegram to view this post
VIEW IN TELEGRAM
👍3🔥3
This media is not supported in your browser
VIEW IN TELEGRAM
Evil-Cardputer - Wi-Fi Spycam detection and CCTV Toolkit

Ever wanted a pocket-size toolkit with Wi-Fi Spycam detection and CCTV Toolkit? 📸

A major update that brings CCTV Toolkit 🎥 directly on the device. You can now check for your badly configured camera and check for hidden one with direct stream view when found !!!

Key features (v1.4.3)
💎CCTV Toolkit: LAN/WAN IP-camera recon → port scan, brand fingerprint + CVE hints, login finder, default-creds test, stream discovery, reporting.
💎MJPEG Viewer: cycle through discovered MJPEG streams, adjust resolution/compression.
💎Spycam Detector: detect hidden Wi-Fi cameras via SSID/OUI heuristics that know for being SpyCamera.

Enjoy & hack responsibly! 🎉🥳🔥

➡️ GitHub
📱 Wiki
📔 Official page

#privacy #hacktools
Please open Telegram to view this post
VIEW IN TELEGRAM
4😁2😱1
AutoExploits by AI

Welcome to AutoExploit AI, the modern engine for create exploit by AI

💀 Source

#AI #hacktools
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥7👍2😱1